SlideShare a Scribd company logo
Mobile Transport Layer
Introduction
●

●

Mobility support on only lower layer is not
enough to provide mobility support for
applications.
As application is directly communicates
with transport Layer only.
Traditional TCP
Congestion Control
●

●

●

●

●

TCP designed for fixed n/w with fixed end-systems.
Congestion may appear from time to time even in carefully
designed networks.
Sender notices the missing ACK for the lost packet and
assumes a packet loss due to congestion.
Retransmitting the missing packets , might only increase the
congestion.
Solution – TCP show down the transmission rate
dramatically.
Traditional TCP
Slow start
●

●

Sender always calculates a congestion
window for a receiver.
The start size of the congestion window is
one segment.

●

Double the window size after receiving ACK.

●

Maintain the congestion threshold.
Traditional TCP
Fast retransmit/fast recovery
●

Two things lead to a reduction of the
congestion threshold :–

Fast retransmit – continious receving of ACK for
the same packet.

–

Fast recovery – receipt of ACK shows that there
is no congestion to justify slow start. The sender
perform fast recovery from the packet loss.
Implication on mobility
●

Slow start is not a solution in case of mobility

●

The reason for this is of using wrong assumptions.

●

●

●

●

Error rate on wireless links are higher as compare
to wired links.
Retransmittion may increase duplicates at layer 2 and
more connection are end-to-end encryption.
Mobility itself cause packet loss.
TCP detects missing ACK via time-outs and concluding
packet loss due to congestion control only.
Classical TCP improvements

Indirect TCP
●

●

I-TCP segments a TCP connection into a fixed part and a wireless part.
Standard TCP is used between the fixed computer and the access
point/FA.

●

Now access point/FA terminates the standard TCP connection.

●

It means access point/FA now seen as the mobile host for the fixed host.

●

Access point/FA work as a proxy.

●

●

If the packet is lost on the wireless link, the mobile hosts notice this much
faster due to much lower RTT.
In case of handover , AP/FA act as a proxy buffering packets for
retransmission after the handover to the new AP/FA.
Advantages of I-TCP
●

●

●

●

Does not require any change in the TCP protocol.
Due to strict partitioning into two connections,
transmission error on wireless link cannot
propogate into the fixed network.
Short delay between mobile node and AP/FA,
independent of other traffice streams.
Partitioning of two connection allow us to use
different TCP.
Disadvantages of I-TCP
●
●

●

Loss of end-to-end functionality of TCP.
If sender receive the ACK it means AP/FA
receive the packet.
Foreign agent must be a trusted entity
Snooping TCP

●

●

●

●

●

This method based on end-to-end TCP semantic.
Objective – is to buffer data close to the mobile host to
perform fast local retransmission in cse of packet loss.
FA/AP buffers all packets with destination mobile host
and additionally 'snoop' the packet flow in both
directions.
FA not ACK data to the corresponent host.
FA/AP will retransmits the packet to mobile host directly
form the buffer.
Snooping TCP
●

Data transfer from the mobile host with
destination correspondent host
–

FA snoops into packet stream to detect gaps in the
seq. no. of TCP.

–

If FA detect missing packet,

–

then , it return a NACK to the mobile host.

–

Now mobile host retransmit the missing packet
immediately.
Advantage/Disadvantage of
Snooping TCP

●

Advantage
–
–

●

End-to-End TCP semantic is preserved.
Need no modification on FA/AP and correspondent node

Disadvantage
–

It takes some time until the FA/AP can successfully
retransmit a packet from its buffer due to problem in
wireless link.

–

Have to manage time-out at FA/AP and correspondent
Node

–

If sender using end-to-end encryption scheme then
TCP protocol header will be encrypted – this
approach will not work.
Mobile TCP
●

●

●

Dropping of packets due to a handover or higher bit error
rate is not the only problem occurs.
The occurence of lengthy and/or frequent
disconnections in another problem.
I-TCP when mobile disconnected:–

●

Has to buffer more and more data – need more buffer.

Snooping TCP when mobile disconnected:–

Mobile will not able to send ACK.
Working of Mobile TCP
●

●

●

●

It splits the TCP connection into two parts as ITCP
An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used
on the SH-MH connection.
Assumption – M-TCP assumes low bit error rate
on wireless link.
M-TCP does not perform caching/retransmission
of data.
Working of Mobile TCP (Cont.)
●

●

●

●

SH monitors all packets sent to the MH and
ACKs returned from the MH.
If the SH does not receive an ACK for some
time , it assumes that the MH is disconnected.
It chokes the sender by setting the sender's
windows size 0.
It means sender will not retrasmit data.

More Related Content

What's hot

WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi712
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
Vishal Tandel
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
Midhun S
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
Raj vardhan
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
RMK ENGINEERING COLLEGE, CHENNAI
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
Dilum Bandara
 

What's hot (20)

WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
IntServ & DiffServ
IntServ & DiffServIntServ & DiffServ
IntServ & DiffServ
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Dsdv
DsdvDsdv
Dsdv
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Error control
Error controlError control
Error control
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 

Viewers also liked

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
Sushant Kushwaha
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Unit 4
Unit 4Unit 4
Unit 2
Unit 2Unit 2

Viewers also liked (6)

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 

Similar to Mobile transportlayer

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
junnubabu
 
Cs8601 4
Cs8601 4Cs8601 4
Mobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdfMobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdf
ABaasitShaikh
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
RituParna42
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
Vikram Nandini
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
babuece
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
singhram281982
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
Maulik Patel
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
trupti patil
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
IDES Editor
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
SonaliAjankar
 
Raj
RajRaj
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
IJCNCJournal
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
RSathyaPriyaCSEKIOT
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 

Similar to Mobile transportlayer (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Mobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdfMobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdf
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Mcseminar
McseminarMcseminar
Mcseminar
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Raj
RajRaj
Raj
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 

More from Rahul Hada

P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
Rahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
Rahul Hada
 
Inheritance
InheritanceInheritance
Inheritance
Rahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
Rahul Hada
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installation
Rahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
Rahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
Rahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
Quality planning
Quality planningQuality planning
Quality planning
Rahul Hada
 
Risk
RiskRisk

More from Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Mobile transportlayer

  • 2. Introduction ● ● Mobility support on only lower layer is not enough to provide mobility support for applications. As application is directly communicates with transport Layer only.
  • 3. Traditional TCP Congestion Control ● ● ● ● ● TCP designed for fixed n/w with fixed end-systems. Congestion may appear from time to time even in carefully designed networks. Sender notices the missing ACK for the lost packet and assumes a packet loss due to congestion. Retransmitting the missing packets , might only increase the congestion. Solution – TCP show down the transmission rate dramatically.
  • 4. Traditional TCP Slow start ● ● Sender always calculates a congestion window for a receiver. The start size of the congestion window is one segment. ● Double the window size after receiving ACK. ● Maintain the congestion threshold.
  • 5. Traditional TCP Fast retransmit/fast recovery ● Two things lead to a reduction of the congestion threshold :– Fast retransmit – continious receving of ACK for the same packet. – Fast recovery – receipt of ACK shows that there is no congestion to justify slow start. The sender perform fast recovery from the packet loss.
  • 6. Implication on mobility ● Slow start is not a solution in case of mobility ● The reason for this is of using wrong assumptions. ● ● ● ● Error rate on wireless links are higher as compare to wired links. Retransmittion may increase duplicates at layer 2 and more connection are end-to-end encryption. Mobility itself cause packet loss. TCP detects missing ACK via time-outs and concluding packet loss due to congestion control only.
  • 7. Classical TCP improvements Indirect TCP ● ● I-TCP segments a TCP connection into a fixed part and a wireless part. Standard TCP is used between the fixed computer and the access point/FA. ● Now access point/FA terminates the standard TCP connection. ● It means access point/FA now seen as the mobile host for the fixed host. ● Access point/FA work as a proxy. ● ● If the packet is lost on the wireless link, the mobile hosts notice this much faster due to much lower RTT. In case of handover , AP/FA act as a proxy buffering packets for retransmission after the handover to the new AP/FA.
  • 8. Advantages of I-TCP ● ● ● ● Does not require any change in the TCP protocol. Due to strict partitioning into two connections, transmission error on wireless link cannot propogate into the fixed network. Short delay between mobile node and AP/FA, independent of other traffice streams. Partitioning of two connection allow us to use different TCP.
  • 9. Disadvantages of I-TCP ● ● ● Loss of end-to-end functionality of TCP. If sender receive the ACK it means AP/FA receive the packet. Foreign agent must be a trusted entity
  • 10. Snooping TCP ● ● ● ● ● This method based on end-to-end TCP semantic. Objective – is to buffer data close to the mobile host to perform fast local retransmission in cse of packet loss. FA/AP buffers all packets with destination mobile host and additionally 'snoop' the packet flow in both directions. FA not ACK data to the corresponent host. FA/AP will retransmits the packet to mobile host directly form the buffer.
  • 11. Snooping TCP ● Data transfer from the mobile host with destination correspondent host – FA snoops into packet stream to detect gaps in the seq. no. of TCP. – If FA detect missing packet, – then , it return a NACK to the mobile host. – Now mobile host retransmit the missing packet immediately.
  • 12. Advantage/Disadvantage of Snooping TCP ● Advantage – – ● End-to-End TCP semantic is preserved. Need no modification on FA/AP and correspondent node Disadvantage – It takes some time until the FA/AP can successfully retransmit a packet from its buffer due to problem in wireless link. – Have to manage time-out at FA/AP and correspondent Node – If sender using end-to-end encryption scheme then TCP protocol header will be encrypted – this approach will not work.
  • 13. Mobile TCP ● ● ● Dropping of packets due to a handover or higher bit error rate is not the only problem occurs. The occurence of lengthy and/or frequent disconnections in another problem. I-TCP when mobile disconnected:– ● Has to buffer more and more data – need more buffer. Snooping TCP when mobile disconnected:– Mobile will not able to send ACK.
  • 14. Working of Mobile TCP ● ● ● ● It splits the TCP connection into two parts as ITCP An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used on the SH-MH connection. Assumption – M-TCP assumes low bit error rate on wireless link. M-TCP does not perform caching/retransmission of data.
  • 15. Working of Mobile TCP (Cont.) ● ● ● ● SH monitors all packets sent to the MH and ACKs returned from the MH. If the SH does not receive an ACK for some time , it assumes that the MH is disconnected. It chokes the sender by setting the sender's windows size 0. It means sender will not retrasmit data.