SlideShare a Scribd company logo
1 of 31
 Motivation
 TCP-mechanisms
 Classical approaches
 Indirect TCP
 Snooping TCP
 Mobile TCP
 PEPs in general
Mobile Transport Layer
 Additional optimizations
 Fast retransmit/recovery
 Transmission freezing
 Selective retransmission
 Transaction oriented TCP
Motivation
 Transport layer responsible for
 Fixed end-end systems
 Fixed, wired networks
 Error recovery
 Flow control
 Congestion control
 Ensuring complete data transfer in TCP
 Efficient retransmissions
 TCP congestion control
 packet loss in fixed networks typically due to
(temporary) overload situations
 router have to discard packets as soon as the
buffers are full
 TCP recognizes congestion only indirect via
missing acknowledgements, retransmissions
unwise, they would only contribute to the
congestion and make it even worse
 slow-start algorithm as reaction
 TCP slow-start algorithm
 sender calculates a congestion window for a
receiver
 start with a congestion window size equal to one
segment
 exponential increase of the congestion window up
to the congestion threshold, then linear increase
 Linear increase Continues until a time-out at The
sender occurs due to a missing
acknowledgement, or until the sender detects a
gap in transmitted Data because of Continuous
acknowledgements for The same packet.
 missing acknowledgement causes the reduction of
the congestion threshold to one half of the current
congestion window
 congestion window starts again with one segment
 TCP fast retransmit/fast recovery
 If a sender receives several acknowledgements for the
same packet, this is due to a gap in received packets
at the receiver or missing acknowledgements
 The sender can now retransmit the missing packet(s)
before the timer expires. This behavior is called fast
retransmit.
 It is an early enhancement for preventing slow-start to
trigger on losses not caused by congestion.
 The receipt of acknowledgements shows that there is
no congestion to justify a slow start.
 The sender can continue with the current congestion
window. The sender performs a fast recovery from
the packet loss.
 therefore, packet loss is not due to congestion,
continue with current congestion window (do not use
slow-start)
Influences of mobility on TCP-mechanisms
 Slow Start mechanism in fixed networks decreases the
efficiency of TCP if used with mobile receivers or
senders.
 Error rates on wireless links are orders of magnitude
higher compared to fixed fiber or copper links. This
makes compensation for packet loss by TCP quite
difficult.
 Mobility itself can cause packet loss. There are many
situations where a soft handover from one access point
to another is not possible for a mobile end-system.
 Standard TCP reacts with slow start if
acknowledgements are missing, which does not help in
the case of transmission errors over wireless links and
Early approach: Indirect TCP
 Indirect TCP or I-TCP segments the connection
 no changes to the TCP protocol for hosts connected to the wired
Internet, millions of computers use (variants of) this protocol
 optimized TCP protocol for mobile hosts
 splitting of the TCP connection at, e.g., the foreign agent into 2
TCP connections, no real end-to-end connection any longer
 hosts in the fixed part of the net do not notice the characteristics
of the wireless part
mobile host
access point
(foreign agent) „wired“ Internet
„wireless“ TCP standard TCP
Indirect TCP
 Advantages
 no changes in the fixed network necessary, no changes
for the hosts (TCP protocol) necessary, all current
optimizations to TCP still work
 transmission errors on the wireless link do not propagate
into the fixed network
 simple to control, mobile TCP is used only for one hop
between, e.g., a foreign agent and mobile host
 therefore, a very fast retransmission of packets is
possible, the short delay on the mobile hop is known
 Disadvantages
 loss of end-to-end semantics, an acknowledgement to a
sender does now not any longer mean that a receiver
really got a packet, foreign agents might crash
 higher latency possible due to buffering of data within the
foreign agent and forwarding to a new foreign agent
Snooping TCP
 „Transparent“ extension of TCP within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be retransmitted
immediately by the mobile host or foreign agent, respectively (so called
“local” retransmission)
 the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
 changes of TCP only within the foreign agent
„wired“ Internet
buffering of data
end-to-end TCP connection
local retransmission correspondent
hostforeign
agent
mobile
host
snooping of ACKs
Snooping TCP
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects
packet loss via duplicated ACKs or time-out
 fast retransmission possible, transparent for the fixed network
 Data transfer from the mobile host
 FA detects packet loss on the wireless link via sequence
numbers, FA answers directly with a NACK to the MH
 MH can now retransmit data with only a very short delay
 Integration of the MAC layer
 MAC layer often has similar mechanisms to those of TCP
 thus, the MAC layer can already detect duplicated packets
due to retransmissions and discard them
 Problems
 snooping TCP does not isolate the wireless link as good as I-
TCP
 snooping might be useless depending on encryption schemes
Advantages
 The end-to-end TCP semantic is preserved.
 Most of the enhancements are done in the foreign
agent itself which keeps correspondent host
unchanged.
 Handover of state is not required as soon as the
mobile host moves to another foreign agent. Even
though packets are present in the buffer, time out
at the CH occurs and the packets are transmitted
to the new COA.
 No problem arises if the new foreign agent uses
the enhancement or not. If not, the approach
automatically falls back to the standard solution.
Disadvantages
 Snooping TCP does not isolate the behavior of the
wireless link as well as I-TCP.
 Transmission errors may propagate till CH.
 Using negative acknowledgements between the
foreign agent and the mobile host assumes additional
mechanisms on the mobile host. This approach is no
longer transparent for arbitrary mobile hosts.
 Snooping and buffering data may be useless if certain
encryption schemes are applied end-to-end between
the correspondent host and mobile host. If encryption
is used above the transport layer, (eg. SSL/TLS),
snooping TCP can be used.
MOBILE TCP
Mobile TCP - Motivation
 Dropping packets due to a handover or higher bit
error rates is not the only phenomenon of wireless
links and mobility – the occurrence of lengthy and/or
frequent disconnections is another problem.
 A TCP sender tries to retransmit data controlled by a
retransmission timer that doubles with each
unsuccessful retransmission attempt, up to a
maximum of one minute
 What happens in the case of I-TCP if the mobile is
disconnected? The proxy has to buffer more and
more data, so the longer the period of disconnection,
the more buffer is needed.
 The snooping approach also suffers from being
disconnected. The mobile will not be able to send
ACKs so, snooping cannot help in this situation.
Objective – M-TCP
 To prevent the sender window from shrinking if
bit errors or disconnection but not congestion
cause current problems.
 To improve overall throughput, to lower the delay,
to maintain end-to-end semantics of TCP, and to
provide a more efficient handover.
 Adapted to the problems arising from lengthy or
frequent disconnections
Mobile TCP
 The M-TCP splits up the connection into two parts:
 An unmodified TCP is used on the Standard host-
Supervisory Host section
 An optimized TCP is used on the Supervisory Host-
Mobile Host section.
 The Supervisory Host (SH) adorns the same role as
the proxy (Foreign Agent) in I-TCP.
 The SH is responsible for exchanging data to both the
Standard host and the Mobile host.
 Here in this approach, we assume that the error bit
rate is less as compared to other wireless links.
 So if any packet is lost, the retransmission has to
occur from the original sender and not by the SH.
(This also maintains the end-to-end TCP semantic)
Mobile TCP
 The SH monitors the ACKs (ACK means
acknowledgement) being sent by the MH. If for a long
period ACKs have not been received, then the SH
assumes that the MH has been disconnected (maybe
due to failure or moved out of range, etc...).
 If so the SH chokes the sender by setting its window
size to 0.
 Because of this the sender goes into persistent mode
i.e. the sender’s state will not change no matter how
long the receiver is disconnected.
 This means that the sender will not try to retransmit
the data.
 Now when the SH detects a connectivity established
again with the MH (the old SH or new SH if
handover), the window of the sender is restored to
Advantages:
 Maintains the TCP end-to-end semantics. (No
failed packet retransmission is done by the SH
.All job handled by original sender)
 Does not require the change in the sender’s TCP.
 If MH disconnected, it doesn’t waste time in
useless transmissions and shrinks the window
size to 0.
 No need to send old buffer data to new SH in
case of handover (as in I-TCP).
Disadvantages:
 M-TCP assumes low bit error which is not always
true. So, any packet loss due to bit-errors
occurring, then its propagated to the sender.
 Modifications are required for the MH protocol
software.
Fast retransmit/fast recovery
 Change of foreign agent often results in packet loss
 TCP reacts with slow-start although there is no
congestion
 Forced fast retransmit
 as soon as the mobile host has registered with a new
foreign agent, the MH sends duplicated
acknowledgements on purpose
 this forces the fast retransmit mode at the
communication partners
 additionally, the TCP on the MH is forced to continue
sending with the actual window size and not to go into
slow-start after registration
 Advantage
 simple changes result in significant higher performance
 Disadvantage
 further mix of IP and TCP, no transparent approach
Transmission/time-out freezing
 Mobile hosts can be disconnected for a longer time
 no packet exchange possible, e.g., in a tunnel, disconnection due to
overloaded cells or mux. with higher priority traffic
 TCP disconnects after time-out completely
 TCP freezing
 MAC layer is often able to detect interruption in advance
 MAC can inform TCP layer of upcoming loss of connection
 TCP stops sending, but does now not assume a congested link
 MAC layer signals again if reconnected
Advantage
 scheme is independent of data
 It offers a way to resume TCP connections even after long
interruptions of the connection.
 It can be used together with encrypted data as it is independent of
other TCP mechanisms such as sequence no or acknowledgements
Disadvantage
 Lots of changes have to be made in software of MH, CH and FA.
Selective retransmission
 TCP acknowledgements are often cumulative
 ACK n acknowledges correct and in-sequence
receipt of packets up to n
 if single packets are missing quite often a whole
packet sequence beginning at the gap has to be
retransmitted (go-back-n), thus wasting bandwidth
 Selective retransmission as one solution
 RFC2018 allows for acknowledgements of single
packets, not only acknowledgements of in-
sequence packet streams without gaps
 sender can now retransmit only the missing
packets
Transaction oriented TCP
 TCP phases
 connection setup, data transmission, connection
release
 using 3-way-handshake needs 3 packets for setup
and release, respectively
 thus, even short messages need a minimum of 7
packets!
 Transaction oriented TCP
 RFC1644, T-TCP, describes a TCP version to avoid
this overhead
 connection setup, data transfer and connection
release can be combined
 thus, only 2 or 3 packets are needed
 Advantage
 efficiency
 Disadvantage
 requires changed TCP
 mobility not longer transparent
Comparison of different approaches for a “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection
into two connections
isolation of wireless
link, simple
loss of TCP semantics,
higher latency at
handover
Snooping TCP “snoops” data and
acknowledgements, local
retransmission
transparent for end-to-
end connection, MAC
integration possible
problematic with
encryption, bad isolation
of wireless link
M-TCP splits TCP connection,
chokes sender via
window size
Maintains end-to-end
semantics, handles
long term and frequent
disconnections
Bad isolation of wireless
link, processing
overhead due to
bandwidth management
Fast retransmit/
fast recovery
avoids slow-start after
roaming
simple and efficient mixed layers, not
transparent
Transmission/
time-out freezing
freezes TCP state at
disconnect, resumes
after reconnection
independent of content
or encryption, works for
longer interrupts
changes in TCP
required, MAC
dependant
Selective
retransmission
retransmit only lost data very efficient slightly more complex
receiver software, more
buffer needed
Transaction
oriented TCP
combine connection
setup/release and data
transmission
Efficient for certain
applications
changes in TCP
required, not transparent

More Related Content

What's hot

Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overviewIshraq Al Fataftah
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCPselvakumar_b1985
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 

What's hot (20)

Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Publish subscribe model overview
Publish subscribe model overviewPublish subscribe model overview
Publish subscribe model overview
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 

Similar to Mobile Transport layer

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolstrupti patil
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
transport protocols
 transport protocols  transport protocols
transport protocols aibad ahmed
 

Similar to Mobile Transport layer (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Unit 4
Unit 4Unit 4
Unit 4
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Tcp
TcpTcp
Tcp
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
transport protocols
 transport protocols  transport protocols
transport protocols
 

More from Pallepati Vasavi

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
MOBILE COMPUTING Unit-3,Mobile IP
MOBILE COMPUTING Unit-3,Mobile IPMOBILE COMPUTING Unit-3,Mobile IP
MOBILE COMPUTING Unit-3,Mobile IPPallepati Vasavi
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMPallepati Vasavi
 
Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Pallepati Vasavi
 
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...Pallepati Vasavi
 
Mobile Application Development,J2ME,UNIT-4-JNTU
Mobile Application Development,J2ME,UNIT-4-JNTUMobile Application Development,J2ME,UNIT-4-JNTU
Mobile Application Development,J2ME,UNIT-4-JNTUPallepati Vasavi
 
Mobile Application Development MAD J2ME UNIT 2
Mobile Application Development  MAD J2ME UNIT 2Mobile Application Development  MAD J2ME UNIT 2
Mobile Application Development MAD J2ME UNIT 2Pallepati Vasavi
 
Mobile Application Development MAD J2ME
Mobile Application Development  MAD J2MEMobile Application Development  MAD J2ME
Mobile Application Development MAD J2MEPallepati Vasavi
 

More from Pallepati Vasavi (8)

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
MOBILE COMPUTING Unit-3,Mobile IP
MOBILE COMPUTING Unit-3,Mobile IPMOBILE COMPUTING Unit-3,Mobile IP
MOBILE COMPUTING Unit-3,Mobile IP
 
Mobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSMMobile computing-Unit 1,GSM
Mobile computing-Unit 1,GSM
 
Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5Mobile Application Devlopement-Database connections-UNIT-5
Mobile Application Devlopement-Database connections-UNIT-5
 
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...
JDBC,Types of JDBC,Resultset, statements,PreparedStatement,CallableStatements...
 
Mobile Application Development,J2ME,UNIT-4-JNTU
Mobile Application Development,J2ME,UNIT-4-JNTUMobile Application Development,J2ME,UNIT-4-JNTU
Mobile Application Development,J2ME,UNIT-4-JNTU
 
Mobile Application Development MAD J2ME UNIT 2
Mobile Application Development  MAD J2ME UNIT 2Mobile Application Development  MAD J2ME UNIT 2
Mobile Application Development MAD J2ME UNIT 2
 
Mobile Application Development MAD J2ME
Mobile Application Development  MAD J2MEMobile Application Development  MAD J2ME
Mobile Application Development MAD J2ME
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Mobile Transport layer

  • 1.  Motivation  TCP-mechanisms  Classical approaches  Indirect TCP  Snooping TCP  Mobile TCP  PEPs in general Mobile Transport Layer  Additional optimizations  Fast retransmit/recovery  Transmission freezing  Selective retransmission  Transaction oriented TCP
  • 2. Motivation  Transport layer responsible for  Fixed end-end systems  Fixed, wired networks  Error recovery  Flow control  Congestion control  Ensuring complete data transfer in TCP  Efficient retransmissions
  • 3.  TCP congestion control  packet loss in fixed networks typically due to (temporary) overload situations  router have to discard packets as soon as the buffers are full  TCP recognizes congestion only indirect via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse  slow-start algorithm as reaction
  • 4.  TCP slow-start algorithm  sender calculates a congestion window for a receiver  start with a congestion window size equal to one segment  exponential increase of the congestion window up to the congestion threshold, then linear increase  Linear increase Continues until a time-out at The sender occurs due to a missing acknowledgement, or until the sender detects a gap in transmitted Data because of Continuous acknowledgements for The same packet.  missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window  congestion window starts again with one segment
  • 5.
  • 6.  TCP fast retransmit/fast recovery  If a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver or missing acknowledgements  The sender can now retransmit the missing packet(s) before the timer expires. This behavior is called fast retransmit.  It is an early enhancement for preventing slow-start to trigger on losses not caused by congestion.  The receipt of acknowledgements shows that there is no congestion to justify a slow start.  The sender can continue with the current congestion window. The sender performs a fast recovery from the packet loss.  therefore, packet loss is not due to congestion, continue with current congestion window (do not use slow-start)
  • 7. Influences of mobility on TCP-mechanisms  Slow Start mechanism in fixed networks decreases the efficiency of TCP if used with mobile receivers or senders.  Error rates on wireless links are orders of magnitude higher compared to fixed fiber or copper links. This makes compensation for packet loss by TCP quite difficult.  Mobility itself can cause packet loss. There are many situations where a soft handover from one access point to another is not possible for a mobile end-system.  Standard TCP reacts with slow start if acknowledgements are missing, which does not help in the case of transmission errors over wireless links and
  • 8.
  • 9. Early approach: Indirect TCP  Indirect TCP or I-TCP segments the connection  no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol  optimized TCP protocol for mobile hosts  splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer  hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) „wired“ Internet „wireless“ TCP standard TCP
  • 10.
  • 11. Indirect TCP  Advantages  no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work  transmission errors on the wireless link do not propagate into the fixed network  simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known  Disadvantages  loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash  higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent
  • 12.
  • 13. Snooping TCP  „Transparent“ extension of TCP within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission)  the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs  changes of TCP only within the foreign agent „wired“ Internet buffering of data end-to-end TCP connection local retransmission correspondent hostforeign agent mobile host snooping of ACKs
  • 14.
  • 15. Snooping TCP  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  fast retransmission possible, transparent for the fixed network  Data transfer from the mobile host  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay  Integration of the MAC layer  MAC layer often has similar mechanisms to those of TCP  thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them  Problems  snooping TCP does not isolate the wireless link as good as I- TCP  snooping might be useless depending on encryption schemes
  • 16. Advantages  The end-to-end TCP semantic is preserved.  Most of the enhancements are done in the foreign agent itself which keeps correspondent host unchanged.  Handover of state is not required as soon as the mobile host moves to another foreign agent. Even though packets are present in the buffer, time out at the CH occurs and the packets are transmitted to the new COA.  No problem arises if the new foreign agent uses the enhancement or not. If not, the approach automatically falls back to the standard solution.
  • 17. Disadvantages  Snooping TCP does not isolate the behavior of the wireless link as well as I-TCP.  Transmission errors may propagate till CH.  Using negative acknowledgements between the foreign agent and the mobile host assumes additional mechanisms on the mobile host. This approach is no longer transparent for arbitrary mobile hosts.  Snooping and buffering data may be useless if certain encryption schemes are applied end-to-end between the correspondent host and mobile host. If encryption is used above the transport layer, (eg. SSL/TLS), snooping TCP can be used.
  • 19. Mobile TCP - Motivation  Dropping packets due to a handover or higher bit error rates is not the only phenomenon of wireless links and mobility – the occurrence of lengthy and/or frequent disconnections is another problem.  A TCP sender tries to retransmit data controlled by a retransmission timer that doubles with each unsuccessful retransmission attempt, up to a maximum of one minute  What happens in the case of I-TCP if the mobile is disconnected? The proxy has to buffer more and more data, so the longer the period of disconnection, the more buffer is needed.  The snooping approach also suffers from being disconnected. The mobile will not be able to send ACKs so, snooping cannot help in this situation.
  • 20. Objective – M-TCP  To prevent the sender window from shrinking if bit errors or disconnection but not congestion cause current problems.  To improve overall throughput, to lower the delay, to maintain end-to-end semantics of TCP, and to provide a more efficient handover.  Adapted to the problems arising from lengthy or frequent disconnections
  • 21. Mobile TCP  The M-TCP splits up the connection into two parts:  An unmodified TCP is used on the Standard host- Supervisory Host section  An optimized TCP is used on the Supervisory Host- Mobile Host section.  The Supervisory Host (SH) adorns the same role as the proxy (Foreign Agent) in I-TCP.  The SH is responsible for exchanging data to both the Standard host and the Mobile host.  Here in this approach, we assume that the error bit rate is less as compared to other wireless links.  So if any packet is lost, the retransmission has to occur from the original sender and not by the SH. (This also maintains the end-to-end TCP semantic)
  • 22. Mobile TCP  The SH monitors the ACKs (ACK means acknowledgement) being sent by the MH. If for a long period ACKs have not been received, then the SH assumes that the MH has been disconnected (maybe due to failure or moved out of range, etc...).  If so the SH chokes the sender by setting its window size to 0.  Because of this the sender goes into persistent mode i.e. the sender’s state will not change no matter how long the receiver is disconnected.  This means that the sender will not try to retransmit the data.  Now when the SH detects a connectivity established again with the MH (the old SH or new SH if handover), the window of the sender is restored to
  • 23. Advantages:  Maintains the TCP end-to-end semantics. (No failed packet retransmission is done by the SH .All job handled by original sender)  Does not require the change in the sender’s TCP.  If MH disconnected, it doesn’t waste time in useless transmissions and shrinks the window size to 0.  No need to send old buffer data to new SH in case of handover (as in I-TCP).
  • 24. Disadvantages:  M-TCP assumes low bit error which is not always true. So, any packet loss due to bit-errors occurring, then its propagated to the sender.  Modifications are required for the MH protocol software.
  • 25. Fast retransmit/fast recovery  Change of foreign agent often results in packet loss  TCP reacts with slow-start although there is no congestion  Forced fast retransmit  as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose  this forces the fast retransmit mode at the communication partners  additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration  Advantage  simple changes result in significant higher performance  Disadvantage  further mix of IP and TCP, no transparent approach
  • 26. Transmission/time-out freezing  Mobile hosts can be disconnected for a longer time  no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic  TCP disconnects after time-out completely  TCP freezing  MAC layer is often able to detect interruption in advance  MAC can inform TCP layer of upcoming loss of connection  TCP stops sending, but does now not assume a congested link  MAC layer signals again if reconnected Advantage  scheme is independent of data  It offers a way to resume TCP connections even after long interruptions of the connection.  It can be used together with encrypted data as it is independent of other TCP mechanisms such as sequence no or acknowledgements Disadvantage  Lots of changes have to be made in software of MH, CH and FA.
  • 27. Selective retransmission  TCP acknowledgements are often cumulative  ACK n acknowledges correct and in-sequence receipt of packets up to n  if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth  Selective retransmission as one solution  RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in- sequence packet streams without gaps  sender can now retransmit only the missing packets
  • 28. Transaction oriented TCP  TCP phases  connection setup, data transmission, connection release  using 3-way-handshake needs 3 packets for setup and release, respectively  thus, even short messages need a minimum of 7 packets!
  • 29.  Transaction oriented TCP  RFC1644, T-TCP, describes a TCP version to avoid this overhead  connection setup, data transfer and connection release can be combined  thus, only 2 or 3 packets are needed
  • 30.  Advantage  efficiency  Disadvantage  requires changed TCP  mobility not longer transparent
  • 31. Comparison of different approaches for a “mobile” TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection into two connections isolation of wireless link, simple loss of TCP semantics, higher latency at handover Snooping TCP “snoops” data and acknowledgements, local retransmission transparent for end-to- end connection, MAC integration possible problematic with encryption, bad isolation of wireless link M-TCP splits TCP connection, chokes sender via window size Maintains end-to-end semantics, handles long term and frequent disconnections Bad isolation of wireless link, processing overhead due to bandwidth management Fast retransmit/ fast recovery avoids slow-start after roaming simple and efficient mixed layers, not transparent Transmission/ time-out freezing freezes TCP state at disconnect, resumes after reconnection independent of content or encryption, works for longer interrupts changes in TCP required, MAC dependant Selective retransmission retransmit only lost data very efficient slightly more complex receiver software, more buffer needed Transaction oriented TCP combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent