This document discusses Mobile Internet Protocol (Mobile IP) and how it allows mobile devices to stay connected to the internet without changing their IP address as they move between different networks. It covers key topics such as:
- The basics of Mobile IP including definitions of terms like home agent, foreign agent, and care-of-address.
- How Mobile IP works including the process of discovering the care-of-address, registering with foreign agents, and tunneling packets to the mobile node's current location.
- Adaptations made to transport protocols like TCP to improve performance over wireless networks.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
This document provides an overview of wireless networking technologies, focusing on Wi-Fi and how Wi-Fi networks work. It describes the key components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also outlines different Wi-Fi standards like 802.11b, 802.11a, 802.11g and the latest 802.11ac standard. The document discusses advantages such as mobility and convenience as well as limitations like interference and range for Wi-Fi networks.
Wireless networks allow devices to connect to a network without being physically connected by cables. They work by transmitting radio signals that carry data between wireless devices and access points or base stations. There are different types of wireless networks including WLANs for local areas like campuses, WPANs for personal networks using technologies like Bluetooth, and WMANs for connecting multiple networks over a metropolitan area. Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and speeds. Common applications of wireless networks include mobile access to the internet, extending wired networks wirelessly, and connecting remote areas without wired infrastructure.
Wireless communication allows for freedom from wires and instantaneous communication without physical connections. It provides global coverage for communication that can reach areas where wiring is infeasible or costly. Wireless communication transmits voice and data using radio waves without wires. It uses different frequency channels that can transmit information independently and in parallel. While wireless communication provides mobility and flexibility, it also faces security and physical obstruction issues compared to wired communication.
Human: Thank you for the summary. It effectively captured the key points about wireless communication in just 3 sentences as requested.
This document provides an overview of data communications and computer networks. It discusses the fundamental problem of communication and reproducing messages at different points. It also describes trends in traffic growth and new services, and reviews the components of a basic communications model. Additionally, it examines different types of networks including local area networks, wide area networks, and the Internet—covering technologies like circuit switching, packet switching, frame relay, and asynchronous transfer mode. The chapter introduces concepts like transmission media, networking, and elements that make up modern network architectures.
GPRS Architecture and its components are covered extensively.
The slides give a little information about gprs and also gets into deeper explanation of its architecture.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
This document provides an overview of wireless networking technologies, focusing on Wi-Fi and how Wi-Fi networks work. It describes the key components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also outlines different Wi-Fi standards like 802.11b, 802.11a, 802.11g and the latest 802.11ac standard. The document discusses advantages such as mobility and convenience as well as limitations like interference and range for Wi-Fi networks.
Wireless networks allow devices to connect to a network without being physically connected by cables. They work by transmitting radio signals that carry data between wireless devices and access points or base stations. There are different types of wireless networks including WLANs for local areas like campuses, WPANs for personal networks using technologies like Bluetooth, and WMANs for connecting multiple networks over a metropolitan area. Wireless networks offer mobility and flexibility compared to wired networks but have lower bandwidth and speeds. Common applications of wireless networks include mobile access to the internet, extending wired networks wirelessly, and connecting remote areas without wired infrastructure.
Wireless communication allows for freedom from wires and instantaneous communication without physical connections. It provides global coverage for communication that can reach areas where wiring is infeasible or costly. Wireless communication transmits voice and data using radio waves without wires. It uses different frequency channels that can transmit information independently and in parallel. While wireless communication provides mobility and flexibility, it also faces security and physical obstruction issues compared to wired communication.
Human: Thank you for the summary. It effectively captured the key points about wireless communication in just 3 sentences as requested.
This document provides an overview of data communications and computer networks. It discusses the fundamental problem of communication and reproducing messages at different points. It also describes trends in traffic growth and new services, and reviews the components of a basic communications model. Additionally, it examines different types of networks including local area networks, wide area networks, and the Internet—covering technologies like circuit switching, packet switching, frame relay, and asynchronous transfer mode. The chapter introduces concepts like transmission media, networking, and elements that make up modern network architectures.
GPRS Architecture and its components are covered extensively.
The slides give a little information about gprs and also gets into deeper explanation of its architecture.
Data communication refers to the transmission of digital data between two or more computers. A computer network allows computers to exchange data and consists of two or more linked computers that share resources. Personal area networks (PANs) interconnect personal devices to communicate within 10 meters, typically using wireless technology. Network nodes are active electronic devices attached to a network. Local area networks (LANs) interconnect computers within a limited area like a school or building. Every network interface has a unique 48-bit MAC address and IP address to identify it on the internet or network. Hubs, switches, and routers connect devices but routers can examine link layer addresses and connect different networks or subnetworks.
This document discusses network management for wireless sensor networks. It begins with an introduction to traditional network management models and then discusses key design issues for network management in WSNs including power efficiency, scalability, and simplicity. It provides MANNA as an example management architecture for WSNs and discusses other related issues like naming, localization, and fault tolerance. The document also outlines applications of WSNs such as habitat monitoring, structural monitoring, and smart roads.
Bluetooth is a short-range wireless technology standard for exchanging data between devices like mobile phones, headphones, smartwatches and laptops. It was developed in 1994 and first released in 1999. Bluetooth allows for wireless connections between devices that are in close proximity to each other, within a range of around 10 meters. It uses radio waves to enable wireless communication between multiple devices without interference.
The document discusses the emerging field of wireless ATM networks. It notes that both wireless technologies and ATM are still in their infancy, with no standards yet established. The document outlines some key aspects of wireless ATM networks, including using small picocell coverage areas served by base stations connected via a wired ATM backbone. It also discusses challenges like locating mobile units and establishing connections in the network. Overall, the document examines issues in developing protocols for wireless ATM networks to support broadband communications in the future.
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
An ad hoc network is a type of wireless network that does not require a central router or base station. Nodes communicate directly with each other or through intermediate nodes in a multi-hop fashion without any fixed infrastructure. Routing and resource management are distributed. Common types include wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Ad hoc networks face challenges related to medium access, routing, security, and resource constraints due to the lack of centralized control.
A personal area network (PAN) allows connection between devices like computers, phones, and PDAs. It can be wired using data cables or wireless. The main wireless PAN technology is the wireless personal area network (WPAN), which uses short-range wireless standards like Bluetooth to connect devices within about 10 meters. WPANs help interconnect devices for sharing data and internet access and are useful for both personal and specialized work like military operations.
Handovers, also called handoffs, allow mobile users to maintain connectivity as they move between different cells. They involve transferring control of a call or data session from one cell to another. There are different types of handovers in GSM including intra-BTS, inter-BTS intra-BSC, inter-BSC, and inter-MSC handovers. Factors like transmitted power, received power, area and shape of cells, and user mobility affect the handover process.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Wireless communication involves transmitting information over distances without wires through technologies like radio waves, infrared, Wi-Fi, and Bluetooth. There are several types of wireless communication including infrared, satellite, radio broadcasting, and microwave transmission which have a variety of applications. While wireless communication provides flexibility and easy setup, limitations include weak signals blocked by obstacles and lower bandwidth compared to wired connections. Overall, wireless communication plays a major role in modern society and enables monitoring patients from long distances.
WAP (Wireless Application Protocol) is a set of protocols that allow for data exchange across mobile networks. It aims to make accessing online services from mobile devices simple by extending internet technologies to wireless networks. WAP was initially developed by Ericsson, Motorola, Nokia, and Openwave Systems to provide a common protocol for wireless devices regardless of bearer network or manufacturer. It uses protocols like WSP, WTP, and WTLS to optimize delivery of internet content and applications to mobile phones in a wireless environment with limited resources. The WAP Forum, now called the Open Mobile Alliance, continues to develop and promote open standards and specifications for WAP.
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
Wireless networks allow devices to connect to a wired network without cables. An access point connected to the wired network allows devices like computers and phones to connect wirelessly at broadband speeds. However, wireless networks pose security risks if not configured properly, as unencrypted wireless traffic can be intercepted and users can gain unauthorized access. It is important to set up security measures like access restrictions, encryption, and isolating wireless networks when deploying wireless networks.
This document discusses routing protocols for vehicular ad hoc networks (VANETs). It begins with an introduction to VANETs and their applications. It then covers the main types of routing protocols for VANETs - position-based, topology-based, broadcast-based, cluster-based, and geocast-based. For each protocol type, it provides examples and discusses their advantages and disadvantages. It highlights issues like high node mobility and changing network topologies that make routing challenging in VANETs. In the end, it lists references for further reading on VANET routing protocols.
1. The document discusses various aspects of mobile internet protocol and transport layer protocols.
2. It provides an overview of Mobile IP including its key components like mobile node, home agent, foreign agent and correspondent node. It also describes how Mobile IP works through agent discovery, registration and tunneling.
3. The document also discusses TCP/IP architecture including its four layers and compares it to the OSI model. It describes various techniques to improve TCP performance over mobile networks like indirect TCP, snooping TCP and mobile TCP.
In this ppt you'll learn about the packet delivery. How the Ip packet is delivered from transmitter to receiver when the Mobile node is in the Foreign network. Also you'll be able to learn all definitions like What is mobile node, correspondent node, Home agent, Foreign Agent, Tunneling, Encapsulation, COA(care of address) etc. After that you'll learn about the Agent advertisement and registering of care of address including different steps.
Data communication refers to the transmission of digital data between two or more computers. A computer network allows computers to exchange data and consists of two or more linked computers that share resources. Personal area networks (PANs) interconnect personal devices to communicate within 10 meters, typically using wireless technology. Network nodes are active electronic devices attached to a network. Local area networks (LANs) interconnect computers within a limited area like a school or building. Every network interface has a unique 48-bit MAC address and IP address to identify it on the internet or network. Hubs, switches, and routers connect devices but routers can examine link layer addresses and connect different networks or subnetworks.
This document discusses network management for wireless sensor networks. It begins with an introduction to traditional network management models and then discusses key design issues for network management in WSNs including power efficiency, scalability, and simplicity. It provides MANNA as an example management architecture for WSNs and discusses other related issues like naming, localization, and fault tolerance. The document also outlines applications of WSNs such as habitat monitoring, structural monitoring, and smart roads.
Bluetooth is a short-range wireless technology standard for exchanging data between devices like mobile phones, headphones, smartwatches and laptops. It was developed in 1994 and first released in 1999. Bluetooth allows for wireless connections between devices that are in close proximity to each other, within a range of around 10 meters. It uses radio waves to enable wireless communication between multiple devices without interference.
The document discusses the emerging field of wireless ATM networks. It notes that both wireless technologies and ATM are still in their infancy, with no standards yet established. The document outlines some key aspects of wireless ATM networks, including using small picocell coverage areas served by base stations connected via a wired ATM backbone. It also discusses challenges like locating mobile units and establishing connections in the network. Overall, the document examines issues in developing protocols for wireless ATM networks to support broadband communications in the future.
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
An ad hoc network is a type of wireless network that does not require a central router or base station. Nodes communicate directly with each other or through intermediate nodes in a multi-hop fashion without any fixed infrastructure. Routing and resource management are distributed. Common types include wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Ad hoc networks face challenges related to medium access, routing, security, and resource constraints due to the lack of centralized control.
A personal area network (PAN) allows connection between devices like computers, phones, and PDAs. It can be wired using data cables or wireless. The main wireless PAN technology is the wireless personal area network (WPAN), which uses short-range wireless standards like Bluetooth to connect devices within about 10 meters. WPANs help interconnect devices for sharing data and internet access and are useful for both personal and specialized work like military operations.
Handovers, also called handoffs, allow mobile users to maintain connectivity as they move between different cells. They involve transferring control of a call or data session from one cell to another. There are different types of handovers in GSM including intra-BTS, inter-BTS intra-BSC, inter-BSC, and inter-MSC handovers. Factors like transmitted power, received power, area and shape of cells, and user mobility affect the handover process.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Wireless communication involves transmitting information over distances without wires through technologies like radio waves, infrared, Wi-Fi, and Bluetooth. There are several types of wireless communication including infrared, satellite, radio broadcasting, and microwave transmission which have a variety of applications. While wireless communication provides flexibility and easy setup, limitations include weak signals blocked by obstacles and lower bandwidth compared to wired connections. Overall, wireless communication plays a major role in modern society and enables monitoring patients from long distances.
WAP (Wireless Application Protocol) is a set of protocols that allow for data exchange across mobile networks. It aims to make accessing online services from mobile devices simple by extending internet technologies to wireless networks. WAP was initially developed by Ericsson, Motorola, Nokia, and Openwave Systems to provide a common protocol for wireless devices regardless of bearer network or manufacturer. It uses protocols like WSP, WTP, and WTLS to optimize delivery of internet content and applications to mobile phones in a wireless environment with limited resources. The WAP Forum, now called the Open Mobile Alliance, continues to develop and promote open standards and specifications for WAP.
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
Wireless networks allow devices to connect to a wired network without cables. An access point connected to the wired network allows devices like computers and phones to connect wirelessly at broadband speeds. However, wireless networks pose security risks if not configured properly, as unencrypted wireless traffic can be intercepted and users can gain unauthorized access. It is important to set up security measures like access restrictions, encryption, and isolating wireless networks when deploying wireless networks.
This document discusses routing protocols for vehicular ad hoc networks (VANETs). It begins with an introduction to VANETs and their applications. It then covers the main types of routing protocols for VANETs - position-based, topology-based, broadcast-based, cluster-based, and geocast-based. For each protocol type, it provides examples and discusses their advantages and disadvantages. It highlights issues like high node mobility and changing network topologies that make routing challenging in VANETs. In the end, it lists references for further reading on VANET routing protocols.
1. The document discusses various aspects of mobile internet protocol and transport layer protocols.
2. It provides an overview of Mobile IP including its key components like mobile node, home agent, foreign agent and correspondent node. It also describes how Mobile IP works through agent discovery, registration and tunneling.
3. The document also discusses TCP/IP architecture including its four layers and compares it to the OSI model. It describes various techniques to improve TCP performance over mobile networks like indirect TCP, snooping TCP and mobile TCP.
In this ppt you'll learn about the packet delivery. How the Ip packet is delivered from transmitter to receiver when the Mobile node is in the Foreign network. Also you'll be able to learn all definitions like What is mobile node, correspondent node, Home agent, Foreign Agent, Tunneling, Encapsulation, COA(care of address) etc. After that you'll learn about the Agent advertisement and registering of care of address including different steps.
This document summarizes key aspects of mobile computing and transport layer protocols for mobile networks. It begins with an overview of Mobile IP, including its components and how it works. Key mechanisms like agent discovery, registration, and tunneling are described. Improvements to TCP performance in mobile networks are also discussed, such as indirect TCP, snooping TCP, and selective retransmission. The document provides high-level explanations of these topics in under 3 sentences.
Mobile IP allows mobile nodes to change their point of connection to the Internet while maintaining the same IP address. It uses care-of-addresses and tunneling to deliver packets to the mobile node's changing locations. The key mechanisms of Mobile IP are discovering a mobile node's care-of-address when it changes networks, registering that care-of-address with the home agent, and tunneling packets to the care-of-address.
Mobile IP allows nodes to change their point of attachment to the network while maintaining ongoing communications using the same IP address. It works by associating each mobile node with a home network and address, and registering the node's current location, or care-of address, with a home agent in the home network. When packets are sent to the mobile node's home address, the home agent intercepts them and tunnels them to the node's current care-of address via encapsulation. This allows the node to receive packets no matter where it is connected.
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
Mobile IP adds mobility support to the Internet network layer protocol IP. It allows nodes to continue receiving datagrams no matter where they are attached to the Internet. Mobile IP uses home agents and foreign agents to tunnel packets to a mobile node's current location, represented by its care-of address. When away from its home network, a mobile node registers its care-of address with its home agent. The home agent intercepts packets destined for the mobile node and tunnels them to the care-of address using encapsulation. This allows the mobile node to maintain its home IP address while connecting via foreign networks.
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Mobile IP is an open standard that allows devices to change networks while maintaining the same IP address. This ensures ongoing connections and applications are not dropped when switching networks. It works by assigning two IP addresses - a static home address and a care-of address that changes based on the device's current network location. When the device roams away from its home network, its traffic is encapsulated and tunneled through its home network to maintain connectivity using its home address. Mobile IP provides mobility across IP networks while cellular IP focuses on optimizing mobility within cellular networks.
Mobile IP is an open standard that allows devices to change networks while maintaining the same IP address. This allows ongoing connections and applications to continue without being dropped when the device roams to a new network. Mobile IP works by assigning the device two IP addresses - a home address that stays the same and a care-of address that changes based on the new network point of attachment. Tunneling is used to forward packets to the device's current location. Mobile IPv6 improves upon Mobile IPv4 by simplifying the mobility management process and integrating support for route optimization.
MOBILE IP_INTRODUCTION_OVERVIEW OF MOBILE IP_KEY MECHANISMS OF MOBILE IP_SCHEMATIC MODEL OF MOBILE IP_TUNNELLING_CARE OF ADDRESS-TCP_PACKET FORWARDING_TCP SLIDING WINDOWS
This document provides an overview of mobility management and key concepts in IP mobility. It discusses macro mobility protocols including Mobile IPv6 (MIPv6) and Fast Handovers for MIPv6 (FMIPv6), as well as micro-mobility protocols like Cellular IP, HAWAII, and Hierarchical Mobile IPv6 (HMIPv6). The introduction defines IP mobility and the need for mobility support in IP given that the current IP address model assumes fixed locations. It also describes how Mobile IP allows devices to move between networks while keeping the same IP address.
UNIT IV MOBILE NETWORK AND TRANSPORT LAYERS
Mobile IP – Dynamic Host Configuration Protocol-Mobile Ad Hoc Routing Protocols–Multicast routing-TCP over Wireless Networks – Indirect TCP – Snooping TCP – Mobile TCP – Fast Retransmit / Fast Recovery – Transmission/Timeout Freezing-Selective Retransmission – Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks
The document discusses various topics related to mobile network layer including Mobile IP, DHCP, Ad Hoc networks, and routing protocols.
Mobile IP allows devices to change locations while maintaining network connectivity using care-of addresses, home agents, and tunneling. DHCP dynamically assigns IP addresses in mobile networks. Ad Hoc networks are temporary networks formed without infrastructure between devices using multi-hop routing. Routing protocols for Ad Hoc networks can be proactive, maintaining routes continuously, or reactive, determining routes on demand to reduce overhead.
Mobile IP provides network layer mobility by allowing mobile nodes to change their point of attachment to the network without changing their IP address. It works by tunneling packets destined for a mobile node to its current location through its home agent and foreign agent. The mobile node registers its care-of address with its home agent so that its home agent knows where to tunnel packets. This allows seamless connectivity as the mobile node moves between networks.
Mobile IP is an Internet Engineering Task Force (IETF) standard designed to allow mobile device users to move between networks while maintaining a permanent IP address. It uses a home address for identification and a care-of address for routing. Key functions include foreign agent discovery, home agent registration using registration requests and replies, and tunneling via encapsulation to forward packets to the mobile node's care-of address. Route optimization enables direct communication between a correspondent node and the mobile node to improve efficiency.
Bluetooth and mobile IP technologies enable wireless connectivity and mobility support in IP networks. Bluetooth aims to connect devices like phones and computers wirelessly, while mobile IP uses home agents and foreign agents to forward packets to mobile hosts and maintain location information as hosts move networks. The paper discusses load balancing mechanisms for multiple home agents in mobile IP to avoid bottlenecks when large numbers of mobile hosts are present.
A lthough the Internet offers access to information sources worldwid.pdfANGELMARKETINGJAIPUR
A lthough the Internet offers access to information sources worldwide, typically we do not
expect to benefit from that access until we arrive at some familiar point--whether home, office,
or school. However, the increasing variety of wireless devices offering IP connectivity, such as
PDAs, handhelds, and digital cellular phones, is beginning to change our perceptions of the
Internet.
To understand the contrast between the current realities of IP connectivity and future
possibilities, consider the transition toward mobility that has occurred in telephony over the past
20 years. An analogous transition in the domain of networking, from dependence on fixed points
of attachment to the flexibility afforded by mobility, has just begun.
Mobile computing and networking should not be confused with the portable computing and
networking we have today. In mobile networking, computing activities are not disrupted when
the user changes the computer\'s point of attachment to the Internet. Instead, all the needed
reconnection occurs automatically and noninteractively.
Truly mobile computing offers many advantages. Confident access to the Internet anytime,
anywhere will help free us from the ties that bind us to our desktops. Consider how cellular
phones have given people new freedom in carrying out their work. Taking along an entire
computing environment has the potential not just to extend that flexibility but to fundamentally
change the existing work ethic. Having the Internet available to us as we move will give us the
tools to build new computing environments wherever we go. Those who have little interest in
mobility per se will still benefit from the ability to resume previous applications when they
reconnect. This is especially convenient in a wireless LAN office environment, where the
boundaries between attachment points are not sharp and are often invisible.
The evolution of mobile networking will differ from that of telephony in some important
respects. The endpoints of a telephone connection are typically human; computer applications
are likely to involve interactions between machines without human intervention. Obvious
examples of this are mobile computing devices on airplanes, ships, and automobiles. Mobile
networking may well also come to depend on position-finding devices, such as a satellite global
positioning system, to work in tandem with wireless access to the Internet.
Another difference may well be rate of adoption. It took many years for mobile phones to
become cheap and light-weight enough to be perceived as convenient. Because wireless mobile
computing devices such as PDAs and pocket organizers have already found user acceptance,
mobile computing may become popular much more quickly.
However, there are still some technical obstacles that must be overcome before mobile
networking can become widespread. The most fundamental is the way the Internet Protocol, the
protocol that connects the networks of today\'s Internet, routes packets to t.
Overview of Mobile IP , Features of Mobile IP , Key Mechanism in Mobile IP , route Optimization , Overview of TCP/IP , Architecture of TCP/IP , Adaptation of TCP Window , Improvement in TCP Performance,mobile computing.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Generative AI leverages algorithms to create various forms of content
Mobile internet protocol
1. MOBILE INTERNET PROTOCOL
AND TRANSPORT LAYER
S J Savitha
Assistant Professor
Computer Science and Engineering
Sri Ramakrishna Institute of technology
1
2. TCP/IP protocol suite – top collection of protocols.
Core protocols.
IP is responsible for routing a packet to any host.
Identified by IP addresses.
In traditional IP addressing scheme, each LAN is
assigned an address.
When a host moves to a different location, it needs
to change its IP address.
Mobile IP – IETF(Internet Engineering Task Force).
Mobile IP allows mobile computers to stay
connected to the internet without changing their
address.
2
3. MOBILE IP
Mobile IP stands for Mobile Internet Protocol
A wireless connection to the Internet
Designed to support host mobility
Stay connected regardless of location without
changing IP address.
Mobile IP is a network layer solution for
homogenous and heterogeneous mobility on the
global internet which is scalable, robust , secure
and which allow nodes to maintain all ongoing
communications while moving.
3
5. TERMINOLOGIES- MOBILE IP
Mobile Node
A node/device that changes its point of attachment to the
Internet
Home Agent
A router in the home network that communicates with the
mobile node
Foreign Agent
A router in a foreign network that delivers information between
mobile node and its home agent
Care-of-Address
Mobile Node’s current IP address
Correspondent Node
Node/device that is communicating with the mobile node (i.e.
web server)
5
6. Winter
2001
5
6.6
DATA TRANSFER TO THE MOBILE SYSTEM
Internet
sender
FA
HA
MN
home network
foreign
network
receiver
1
2
3
1. Sender sends to the IP address of MN,
HA intercepts packet (proxy ARP)
2. HA tunnels packet to COA, here FA,
by encapsulation
3. FA forwards the packet
to the MN
CN
7. Winter
2001
6
6.7
DATA TRANSFER FROM THE MOBILE SYSTEM
Internet
receiver
FA
HA
MN
home network
foreign
network
sender
1
1. Sender sends to the IP address
of the receiver as usual,
FA works as default router
CN
8. DISCOVERING THE CARE-OF ADDRESS
Agent advertisement – Needed for mobile node to
discover mobility agent. It is an advertisement
message constructed by attaching a special
extension to an ICMP router advertisement.
If advertisement not received or needed sooner by
mobile a solicitation may be generated. 8
9. AGENT ADVERTISEMENT
Allows for the detection of mobility agents
Lists one or more available care-of addresses
Informs mobile node about special feature provided
by foreign agents, for example, alternative
encapsulation techniques
Allows mobile nodes to determine the network
number and status of their link to the Internet
Allows mobile node to determine whether the agent
has the functionality to serve as a HA, a FA or both.
Flag indicates whether it is home agent or a foreign
agent.
9
10. AGENT SOLICITATION
In case a MN(Mobile node) does not receive any
COA, then the MN should send an agent
solicitation message.
These Solicitation message should not flood the
network.
A MN can send up to 3 solicitation messages(one
per second) as soon as it enters a new network.
The purpose of sending this message to search for
a foreign agent.
If an MN does not receive any address in response
to its solicitation messages, then to avoid network
flooding, the MN should reduce the rate of sending
the solicitation messages. 10
11. TUNNELLING PROCESS
The packet is forwarded by the home agent to the
foreign agent. When the packet comes to the
foreign agent( COA) , it delivers the packet to the
mobile node.
Two primary functions :
Encapsulation – data packet to reach the tunnel
endpoint.
Decapsulation – delivering packet at that endpoint.
11
12. TUNNELLING AND ENCAPSULATION
Tunnelling establishes a virtual pipe for the packets
available between a tunnel entry and an endpoint.
Encapsulation refers to arranging a packet header
and data in the part of a new packet.
The operations of encapsulation and decapsulation
takes place whenever a packet sent from a higher
protocol to lower protocol.
12
14. PACKET DELIVERY
STEP 1 :
If the correspondant node wants to send an IP
packet to a mobile node.CN sends the packet to the
IP address of the mobile node.
STEP 2 :
In case MN is not present, then the packet is
encapsulated by a new header and it is tunnelled to
the COA and HA, acts as source address of a
packet. 14
15. STEP 3 :
The encapsulated packet is routed to foreign agent
which performs decapsulation to remove the
additional header and forwards the decapsulated
packet to the MN.
STEP 4 :
The MN after receiving the packet from CN forward
a reply packet to the CN by specifying its own IP
address along with the address of the CN.
15
16. OVERVIEW OF MOBILE IP
Goal- Efficient packet transmission.
A person working as a business development
executive for a company needs to take care of
many regional offices.
How does he makes arrangements so that he
would continue to receive postal mails regardless of
his location?
Two solutions:
Address changing
Decoupling mail routing from his address.
16
17. FEATURES OF MOBILE IP
Transparency
The IP address is to be managed transparently and
there should not be any affect of mobility on any ongoing
communication.
Compatibility
Mobile IP should be compatible.
Security
Mobile IP should, as for as possible, provide users with
secure communications over the internet.
Efficiency and Scalability
Efficient when overhead occurs.
Scalable to support billions of moving hosts worldwide.
17
18. KEY MECHANISMS IN MOBILE IP
Mobile IP is associated with three basic
mechanisms.
Discovering the care-of-address
Registering the care-of-address
Tunnelling to the care-of-address
18
19. DISCOVERING THE COA
Mobile agents advertise their presence by
periodically broadcasting the agent advertisement
messages
Mobile node receives the advertisement messages
observes whether the message from HA or FA
If a Mobile node does not wish to wait for a periodic
advertisement , it can send out gent solicitation
messages
19
21. If a mobile node is on new network , it registers
with the foreign agent by sending a registration
request
Request includes permanent IP address of mobile
host and HA
When the HA receives the Registration request , it
updates the mobility binding table
HA sends an acknowledgement to FA
The FA updates its visitors list by inserting the entry
of the mobile node 21
22. TUNNELLING TO THE COA
Tunnelling – forward an IP datagram from HA to
COA
Steps :
When a HA receives a packet addressed to a mobile
host, it forwards the packet to the COA using IP- within
–IP
HA inserts a new IP header in front of the IP header of
any datagram
Destination- set to the COA
Source- set to the HA address
After stripping out the first header , IP processes the
packet again
22
23. ROUTE OPTIMIZATION
Mobile IP protocol-all the data packets to the mobile
node go through the home agent
Heavy traffic between HA and CN in the network
To overcome this problem , route optimization
needs
Enable direct notification of the corresponding host
Direct tunnelling from the corresponding host to the
mobile host
Binding cache maintained at the corresponding host
Binding – The Association of the home address with a
care-of-address.
23
24. Four Messages :
Binding Request
Binding Acknowledgement
Binding Update
Binding Warning
Binding Request :
Node sends a request to HA to know the current
location of MN.
Binding Acknowledgement
Node will return an acknowledgement after getting
binding message.
24
25. Binding update :
Message sent by HA to CN mentioning the
correct location of MN.
Message-MN IP address and COA.
Binding Warning :
If a node decapsulates a packet for a MN, but
it is not the current FN, then this node sends a
binding warning to HA of the MN.
25
26. DHCP
Dynamic Host Configuration Protocol
Developed based on BOOTP (Bootstrap protocol)
Information including IP address
IETF an extension to BOOTP
DHCP client and server- handle roaming status and
to assign IP address
Significance of DHCP
Static configuration
Temporary IP address
26
27. DHCP- Three mechanisms for IP address allocation
:
Automatic allocation
Dynamic allocation
Manual allocation
27
28. TCP –TRANSMISSION CONTROL PROTOCOL
Most popular transport layer protocol
TCP- de facto
Connection-oriented protocol
UDP – Connectionless protocol in the TCP/IP suite
Traditional TCP- Highly inefficient and
unsatisfactory manner
Special adaptations-wireless networks
Developed by DARPA in 1969
28
30. Four layers of protocol :
Application layer
Transport layer
Internet layer
Network Interface layer
Application layer
Application programmers and end users
Messages will be passes to transport layer
Transport layer
Converts messages into small parts and attaches certain
information.
It passes segments to the Internet layer protocol
30
31. Internet Layer
o Attaches certain information to segments to form
packets
o TCP segment carried one or more IP packets
o The IP passes the packets to the network interface
layer
Network Interface layer
o It converts the packets to frames by adding certain
additional information such as checksum and then
transmits them on the network
31
32. The reverse operation takes place when a frame
arrives at a host
The network interface layer protocol removes the
information added by the corresponding network
interface layer protocol at the sender-end and passes
on the packet to IP layer
The IP layer protocol at the destination removes the
information added by the IP layer
The transport layer protocol at the receiver stripes
the information added by the transport layer protocol
at the sender
Reconstructs the message and sends it to the
application layer
32
33. TERMINOLOGIES OF TCP/IP
TCP – Transmission Control Protocol
IP –Internet Protocol
HTTP-Hyper Text Transmission Protocol
SMTP-Simple Mail Transfer Protocol
MIME-Multipurpose Internet Mail Extension
FTP – File Transport Protocol
SNMP- Simple Network Management Protocol
ICMP-Internet Control Message Protocol
ARP- Address Resolution Protocol
RARP-Reverse Address Resolution Protocol
BOOTP- Boot Protocol
DNS-Domain Name System
IGMP-Internet Group Management Protocol
33
34. ARCHITECTURE OF TCP/IP
Application Layer :
The protocols at this layer used by applications to
communicate with other applications which possibly
running on separate hosts
Examples :
HTTP
FTP
TELNET
34
APPLICATION LAYER
TRANSPORT LAYER
INTERNET LAYER
NETWORK ACCESS LAYER
35. Transport Layer
End-End data transfer services
Host -to- host protocols
To identify the end point , the concept of port number is
used
An application or a process specifies a port number on
which it would receive a message
Message reaches a host – demultiplexed using the port
number at the transport layer
It provides services by making use of services of its
lower layer protocols
It includes
TCP (Transmission Control Protocol)
UDP(User Datagram Protocol)
35
36. Internet Layer
Packs data into data packets – IP datagrams
IP datagram contains source and destination
address(IP address)
Responsible for routing of IP datagrams
In a nutshell , this layer manages the addressing of
packets and delivery of packets between networks
using IP address
Protocols includes :
IP
ICMP
ARP
RARP
IGMP
36
37. Network access layer
Encoding data and transmitting
Provides error detection and packet framing
functionalities
ISO/OSI protocol suite – data link and physical layers
Data link layer help to deliver protocols by use of
physical layers
Data link layer protocols - Ethernet , Token
Ring,FDDI,X.25
Physical layer – how data is physically sent through
network
37
38. OPERATION OF TCP
Client-server application
Data transmission between client and server may
span multiple networks – Sub networks
Identification of hosts is not enough for data
delivery
Every process is identified by port number
Message in the form of block of data is passed to
TCP by sending application
TCP breaks into many small parts and attaches
certain control information(TCP header)
Data along with TCP header called segment
38
39. STRUCTURE OF TCP SEGMENT
TCP
Header
Portion of
Data
39
Control
information
TCP header includes :
1. Destination host
2.Checksum
3.Sequence number
40. IP datagram
Ip packet- datagram
Datagram- variable length up to 65,536 bytes
Two fields – header and data
40
41. Version - IP version number Eg :IPV4 or IPV6
Hlen – Header length as multiples of 4 bytes
Service – priority of datagram
Total length – allotted 16 bits to define length of
IP datagram
Identification – To identify fragmentation that
belongs to networks
Flags – Deals with fragmentation
Fragment Offset – Pointer to the offset of data in
original datagram
Time to live – total number of hops and
operation time
41
42. Protocol – 16 bits , Example : UDP , TCP , ICMP
Header checksum – 16 bit field to check the
integrity of the packets
Source address – define the original source
Destination address – defines the destination of
datagram
Port address –
Data encapsulation
Facilities requests
Destination sub-network address
42
PROTOCOL PORT
TELNET 23
SMTP 25
RPC 111
DNS 53
43. ADAPTATION OF TCP WINDOW
Flow control techniques to control congestion in a
network
Traffic occurs when the rate at which data injected
to a host exceeds the rate at delivered to a host
Flow control technique
Prevents congestion in the network
Prevents buffer overrun at the slow receivers
If data transmissions occur at faster rate than
network infrastructure support , then packets get
built up.
Faster rate at sender > faster rate at receiver
Receiver uses flow control mechanism to restrict
the faster rate at sender 43
44. Receiver indicates an advertise window , when
sender starts to send data packets
Advertised window- set equal to the size of the
receiver buffer
Congestion window – max number of segments
without acknowledgements
A sender sets size to 1 and keeps on increasing
until it receives duplicate acknowledgements
TCP detects packet loss - RTO – Retransmission
timeout and duplicate ack
In wireless – packet loss due to mobility and
channel errors
Wireless are vulnerable to noise
44
45. IMPROVEMENT IN TCP PERFORMANCE
TCP designed for traditional wired networks
Overview
Traditional networks
TCP in mobile networks
TCP in Single-hop wireless networks
TCP in multi-hop wireless networks
45
46. TRADITIONAL NETWORKS
In wired networks - packet losses are primarily
Congestion control mechanisms – reduces
congestions
Important mechanisms used by TCP
Slow start
Congestion Avoidance
Fast retransmit / fast recovery
RTT – Round Trip Time
RTO calculated based on RTT
46
47. SLOW START
Slow start mechanism used when TCP session is
started
Lowest window size and then doubled after each
successful transmission
Rate of doubling- rate of ack come back
Doubling size occurs at every RTT
RTT – Time that elapses between a segment is
transmitted by a sender and ack is received
Congestion detected – window size is reduced to
half of its current size
47
48. CONGESTION AVOIDANCE
The CA algorithm starts when slow start stops
When Congestion window reaches the congestion
threshold level – window size doubling is avoided
TCP reduces its transmission rate to half the
previous value when congestion occurs
Less aggressive than the slow start phase
48
49. FAST RETRANSMIT /FAST RECOVERY
Sender initiates a timer after transmitting a packet
and sets timeout value(RTO)
RTO is calculated based on RTT
When the timer expires , it retransmits the packet
Retransmission is not triggered by timer, triggered
by receipt of three duplicate copies of ack
When retransmission occurs , the congestion
window size is reduced by half
49
50. TCP IN MOBILE NETWORKS
TCP – de facto standard protocol
The main differences between wired and wireless
networks :
Lower bandwidth
Bandwidth fluctuations
Higher delay
Intermittent disconnections
High bit error rate
Poor link reliability
50
51. TCP IN SINGLE-HOP WIRELESS NETWORKS
The modifications proposed to TCP to make it
effective in single-hop wireless networks
Indirect TCP(I- TCP)
Fast Retransmission
Snooping TCP(S-TCP)
Mobile TCP (M-TCP)
Freeze TCP
51
52. INDIRECT TCP
Proposes by Bakre and Badrinath
Wired part and wireless part
Wired part – Connection between Fixed host and
base station
Wireless part – Connection between base station
and Mobile host
Two separate connections : fixed network and
wireless link
Advantage - split connection of I-TCP is that it does
not need any changes to be made to standard
protocol
Disadvantage – Does not maintain end-end
semantics of TCP 52
54. FAST RETRANSMISSION
Proposed by Caceres et al
Overcomes the delay in transmissions caused due
to intermittent disconnections
Advantage
Reduces the time for MH to get reconnected
Disadvantage
Does not propose a general approach for TCP
communications in mobile wireless networks
Example : Does not address the specific error
characteristics of the wireless medium
54
55. SNOOPING TCP
Proposed by Balkrishnan et al – protocol that
improves the performance of TCP by modifying the
Software
Modified software – Snoop
Monitors every packet passes through Tcp
Connection
If Congestion occurs , it retransmits locally and
hides the duplicate ack
Advantage :
Maintains TCP semantics by hiding the duplicate ack
55
57. MOBILE TCP
Proposed by Kevin Brown et al
It tries to avoid the sender window
As I-TCP , mobile host is segmented into wired and
wireless parts
Wired part – Connection between FH and SH
(Supervisor Host)
Wireless part – Connection between SH and MH
SH supervises all packets transmitted to MH
Sets full window size - MH is connected
State transfer takes place when MH moves
New SH can maintain TCP connection between FH
and MH 57
59. FREEZE TCP
The idea is to “freeze” the TCP senders before a
disconnection occurs
“Zero Windows Advertisement” – informs the
sender that the receiver cannot receive data at that
moment
When sender resumes its connectivity ,the receiver
can unfreeze the sender by sending the value
Advantage – Avoidance of slow start period
Does not require the involvement of intermediate
nodes
59