SlideShare a Scribd company logo
1 of 18
Download to read offline
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.1
Mobile Communications
Chapter 9: Mobile Transport Layer
q Motivation
q TCP-mechanisms
q Classical approaches
q Indirect TCP
q Snooping TCP
q Mobile TCP
q PEPs in general
q Additional optimizations
q Fast retransmit/recovery
q Transmission freezing
q Selective retransmission
q Transaction oriented TCP
q TCP for 2.5G/3G wireless
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.2
Transport Layer
E.g. HTTP (used by web services)
typically uses TCP
q Reliable transport between client and
server required
TCP
q Steam oriented, not transaction
oriented
q Network friendly: time-out
è congestion
è slow down transmission
Well known – TCP wrongly assumes
congestion in wireless and mobile
networks when
q Packet losses due to transmission
errors
q Packet loss due to change of network
Result
q Severe performance degradation
Client Server
Connection
setup
Data
transmission
Connection
release
TCP SYN
TCP SYN/ACK
TCP ACK
HTTP request
HTTP response
GPRS: 500ms!
>15 s
no data
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.3
Motivation I
Transport protocols typically designed for
q Fixed end-systems
q Fixed, wired networks
Research activities
q How to improve TCP performance in wireless networks
q Maintain congestion control behavior
q Efficient retransmissions
TCP congestion control in fixed networks
q Timeouts/Packet loss typically due to (temporary) overload
q Routers discard packets when buffers are full
q TCP recognizes congestion only indirectly via missing ACKs,
retransmissions unwise, since they increase congestion
q slow-start algorithm as reaction
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.4
Motivation II
TCP slow-start algorithm
q sender calculates a congestion window for a receiver
q start with a congestion window size equal to one segment (packet)
q Exponentially increase congestion window till congestion threshold,
then linear increase
q Timeout/missing acknowledgement causes reduction of congestion
threshold to half of the current congestion window
q congestion window starts again with one segment
TCP fast retransmit/fast recovery
q TCP sends an ACK only after receiving a packet
q If sender receives duplicate ACKs, this is due to gap in received
packets at the receiver
q Receiver got all packets up to the gap and is actually receiving
packets
q Conclusion: packet loss not due to congestion, retransmit,
continue with current congestion window (do not use slow-start)
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.5
Influences of Wireless/mobility on TCP-mechanisms
TCP assumes congestion if packets are dropped
q typically wrong in wireless networks, here we often have packet
loss due to transmission errors
q furthermore, mobility can cause packet loss, if e.g. a mobile node
roams from one access point (e.g. foreign agent in Mobile IP) to
another while packets in transit to the old access point and
forwarding is not possible
The performance of an unchanged TCP degrades severely
q TCP cannot be changed fundamentally due to large installed base
in the fixed network, TCP for mobility has to remain compatible
q the basic TCP mechanisms keep the whole Internet together
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.6
Early approach: Indirect TCP I
Indirect TCP or I-TCP segments the connection
q no changes to the TCP protocol for hosts connected to the wired
Internet, millions of computers use (variants of) this protocol
q optimized TCP protocol for mobile hosts
q splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
q hosts in the fixed part of the net do not notice the characteristics of
the wireless part
mobile host
access point
(foreign agent) „wired“ Internet
„wireless“ TCP standard TCP
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.7
I-TCP socket and state migration
mobile host
access point2
Internet
access point1
socket migration
and state transfer
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.8
Indirect TCP II
Advantages
q No changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
q Wireless link transmission errors isolated from those in fixed network
q simple to control, mobile TCP is used only for one hop between, e.g.,
a foreign agent and mobile host
q therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known
Disadvantages
q loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
q higher latency possible due to buffering of data within the foreign
agent and forwarding to a new foreign agent
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.9
Early approach: Snooping TCP I
„Transparent“ extension of TCP within the foreign agent
q buffering of packets sent to the mobile host
q lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign agent,
respectively (so called “local” retransmission)
q the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
q changes of TCP only within the foreign agent
„wired“ Internet
buffering of data
end-to-end TCP connection
local retransmission correspondent
hostforeign
agent
mobile
host
snooping of ACKs
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.10
Snooping TCP II
Data transfer to the mobile host
q FA buffers data until it receives ACK of the MH, FA detects packet
loss via duplicated ACKs or time-out
q fast retransmission possible, transparent for the fixed network
Data transfer from the mobile host
q FA detects packet loss on the wireless link via sequence numbers,
FA answers directly with a NACK to the MH
q MH can now retransmit data with only a very short delay
Integration with MAC layer
q MAC layer often has similar mechanisms to those of TCP
q thus, the MAC layer can already detect duplicated packets due to
retransmissions and discard them
Problems
q snooping TCP does not isolate the wireless link as good as I-TCP
q snooping might be tough if packets are encrypted
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.11
Early approach: Mobile TCP
Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
q unmodified TCP fixed network to supervisory host (SH)
q optimized TCP SH to MH
Supervisory host
q no caching, no retransmission
q monitors all packets, if disconnection detected
l set sender window size to 0
l sender automatically goes into persistent mode
q old or new SH reopen the window
Advantages
q maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
q loss on wireless link propagated into fixed network
q adapted TCP on wireless link
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.12
Fast retransmit/fast recovery
Change of foreign agent often results in packet loss
q TCP reacts with slow-start although there is no congestion
Forced fast retransmit
q as soon as the mobile host has registered with a new foreign agent,
the MH sends duplicated acknowledgements on purpose
q this forces the fast retransmit mode at the communication partners
q additionally, the TCP on the MH is forced to continue sending with
the actual window size and not to go into slow-start after
registration
Advantage
q simple changes result in significant higher performance
Disadvantage
q Cooperation required between IP and TCP, no transparent
approach
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.13
Transmission/time-out freezing
Mobile hosts can be disconnected for a longer time
q no packet exchange possible, e.g., in a tunnel, disconnection due
to overloaded cells or mux. with higher priority traffic
q TCP disconnects after time-out completely
TCP freezing
q MAC layer is often able to detect interruption in advance
q MAC can inform TCP layer of upcoming loss of connection
q TCP stops sending, but does now not assume a congested link
q MAC layer signals again if reconnected
Advantage
q scheme is independent of data
Disadvantage
q TCP on mobile host has to be changed, mechanism depends on
MAC layer
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.14
Selective retransmission
TCP acknowledgements are often cumulative
q ACK n acknowledges correct and in-sequence receipt of packets
up to n
q if single packets are missing quite often a whole packet sequence
beginning at the gap has to be retransmitted (go-back-n), thus
wasting bandwidth
Selective retransmission as one solution
q RFC2018 allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps
q sender can now retransmit only the missing packets
Advantage
q much higher efficiency
Disadvantage
q more complex software in a receiver, more buffer needed at the
receiver
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.15
Transaction oriented TCP
TCP phases
q connection setup, data transmission, connection release
q using 3-way-handshake needs 3 packets for setup and release,
respectively
q thus, even short messages need a minimum of 7 packets!
Transaction oriented TCP
q RFC1644, T-TCP, describes a TCP version to avoid this overhead
q connection setup, data transfer and connection release can be
combined
q thus, only 2 or 3 packets are needed
Advantage
q efficiency
Disadvantage
q requires changed TCP
q mobility not longer transparent
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.16
Comparison of different approaches for a “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection
into two connections
isolation of wireless
link, simple
loss of TCP semantics,
higher latency at
handover
Snooping TCP “snoops” data and
acknowledgements, local
retransmission
transparent for end-to-
end connection, MAC
integration possible
problematic with
encryption, bad isolation
of wireless link
M-TCP splits TCP connection,
chokes sender via
window size
Maintains end-to-end
semantics, handles
long term and frequent
disconnections
Bad isolation of wireless
link, processing
overhead due to
bandwidth management
Fast retransmit/
fast recovery
avoids slow-start after
roaming
simple and efficient mixed layers, not
transparent
Transmission/
time-out freezing
freezes TCP state at
disconnect, resumes
after reconnection
independent of content
or encryption, works for
longer interrupts
changes in TCP
required, MAC
dependant
Selective
retransmission
retransmit only lost data very efficient slightly more complex
receiver software, more
buffer needed
Transaction
oriented TCP
combine connection
setup/release and data
transmission
Efficient for certain
applications
changes in TCP
required, not transparent
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.17
TCP Improvements I
Initial research work
q Indirect TCP, Snoop TCP, M-TCP, T/TCP, SACK,
Transmission/time-out freezing, …
TCP over 2.5/3G wireless networks
q Fine tuning today’s TCP
q Learn to live with
l Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also
up to 1000 (broadcast systems), periodic allocation/release of channels
l High latency, high jitter, packet loss
q Suggestions
l Large (initial) sending windows, large maximum transfer unit, selective
acknowledgement, explicit congestion notification, time stamp, no
header compression
q Already in use
l i-mode running over FOMA
l WAP 2.0 (“TCP with wireless profile”)
pRTT
MSS
BW
*
*93.0
≤
• max. TCP BandWidth
• Max. Segment Size
• Round Trip Time
• loss probability
Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.18
TCP Improvements II
Performance enhancing proxies (PEP, RFC 3135)
q Transport layer
l Local retransmissions and acknowledgements
q Additionally on the application layer
l Content filtering, compression, picture downscaling
l E.g., Internet/WAP gateways
l Web service gateways?
q Big problem: breaks end-to-end semantics
l Disables use of IP security
l Choose between PEP and security!
More open issues
q RFC 3150 (slow links)
l Recommends header compression, no timestamp
q RFC 3155 (links with errors)
l States that explicit congestion notification cannot be used
q In contrast to 2.5G/3G recommendations!
Mobile system
PEP
Comm. partner
wireless
Internet

More Related Content

What's hot

EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
Lecture1, TCP/IP
Lecture1, TCP/IPLecture1, TCP/IP
Lecture1, TCP/IPcsyuhk
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)mashiur
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design reportAbhishek Datta
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design reportRaj Gupta
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...MINTUKAN RABHA
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 

What's hot (19)

Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Umts 18 19
Umts 18 19Umts 18 19
Umts 18 19
 
Telephony
TelephonyTelephony
Telephony
 
I Pv6 Nd
I Pv6 NdI Pv6 Nd
I Pv6 Nd
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
network security
network securitynetwork security
network security
 
Lecture1, TCP/IP
Lecture1, TCP/IPLecture1, TCP/IP
Lecture1, TCP/IP
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Razin Kabir (063452556)
Razin Kabir (063452556)Razin Kabir (063452556)
Razin Kabir (063452556)
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
CS 6390 Project design report
CS 6390 Project design reportCS 6390 Project design report
CS 6390 Project design report
 
I pv4 and ipv6
I pv4 and ipv6I pv4 and ipv6
I pv4 and ipv6
 
lis508p02a-10.ppt
lis508p02a-10.pptlis508p02a-10.ppt
lis508p02a-10.ppt
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
An Efficient Black Hole Attack Securing Mechanism in Ad Hoc On Demand Distanc...
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 

Similar to Transport protocols

Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)NYversity
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 

Similar to Transport protocols (20)

Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)
 
C25008013
C25008013C25008013
C25008013
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Transport protocols

  • 1. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.1 Mobile Communications Chapter 9: Mobile Transport Layer q Motivation q TCP-mechanisms q Classical approaches q Indirect TCP q Snooping TCP q Mobile TCP q PEPs in general q Additional optimizations q Fast retransmit/recovery q Transmission freezing q Selective retransmission q Transaction oriented TCP q TCP for 2.5G/3G wireless
  • 2. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.2 Transport Layer E.g. HTTP (used by web services) typically uses TCP q Reliable transport between client and server required TCP q Steam oriented, not transaction oriented q Network friendly: time-out è congestion è slow down transmission Well known – TCP wrongly assumes congestion in wireless and mobile networks when q Packet losses due to transmission errors q Packet loss due to change of network Result q Severe performance degradation Client Server Connection setup Data transmission Connection release TCP SYN TCP SYN/ACK TCP ACK HTTP request HTTP response GPRS: 500ms! >15 s no data
  • 3. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.3 Motivation I Transport protocols typically designed for q Fixed end-systems q Fixed, wired networks Research activities q How to improve TCP performance in wireless networks q Maintain congestion control behavior q Efficient retransmissions TCP congestion control in fixed networks q Timeouts/Packet loss typically due to (temporary) overload q Routers discard packets when buffers are full q TCP recognizes congestion only indirectly via missing ACKs, retransmissions unwise, since they increase congestion q slow-start algorithm as reaction
  • 4. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.4 Motivation II TCP slow-start algorithm q sender calculates a congestion window for a receiver q start with a congestion window size equal to one segment (packet) q Exponentially increase congestion window till congestion threshold, then linear increase q Timeout/missing acknowledgement causes reduction of congestion threshold to half of the current congestion window q congestion window starts again with one segment TCP fast retransmit/fast recovery q TCP sends an ACK only after receiving a packet q If sender receives duplicate ACKs, this is due to gap in received packets at the receiver q Receiver got all packets up to the gap and is actually receiving packets q Conclusion: packet loss not due to congestion, retransmit, continue with current congestion window (do not use slow-start)
  • 5. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.5 Influences of Wireless/mobility on TCP-mechanisms TCP assumes congestion if packets are dropped q typically wrong in wireless networks, here we often have packet loss due to transmission errors q furthermore, mobility can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while packets in transit to the old access point and forwarding is not possible The performance of an unchanged TCP degrades severely q TCP cannot be changed fundamentally due to large installed base in the fixed network, TCP for mobility has to remain compatible q the basic TCP mechanisms keep the whole Internet together
  • 6. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.6 Early approach: Indirect TCP I Indirect TCP or I-TCP segments the connection q no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol q optimized TCP protocol for mobile hosts q splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer q hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) „wired“ Internet „wireless“ TCP standard TCP
  • 7. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.7 I-TCP socket and state migration mobile host access point2 Internet access point1 socket migration and state transfer
  • 8. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.8 Indirect TCP II Advantages q No changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work q Wireless link transmission errors isolated from those in fixed network q simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host q therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known Disadvantages q loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash q higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent
  • 9. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.9 Early approach: Snooping TCP I „Transparent“ extension of TCP within the foreign agent q buffering of packets sent to the mobile host q lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission) q the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs q changes of TCP only within the foreign agent „wired“ Internet buffering of data end-to-end TCP connection local retransmission correspondent hostforeign agent mobile host snooping of ACKs
  • 10. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.10 Snooping TCP II Data transfer to the mobile host q FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out q fast retransmission possible, transparent for the fixed network Data transfer from the mobile host q FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH q MH can now retransmit data with only a very short delay Integration with MAC layer q MAC layer often has similar mechanisms to those of TCP q thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them Problems q snooping TCP does not isolate the wireless link as good as I-TCP q snooping might be tough if packets are encrypted
  • 11. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.11 Early approach: Mobile TCP Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does q unmodified TCP fixed network to supervisory host (SH) q optimized TCP SH to MH Supervisory host q no caching, no retransmission q monitors all packets, if disconnection detected l set sender window size to 0 l sender automatically goes into persistent mode q old or new SH reopen the window Advantages q maintains semantics, supports disconnection, no buffer forwarding Disadvantages q loss on wireless link propagated into fixed network q adapted TCP on wireless link
  • 12. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.12 Fast retransmit/fast recovery Change of foreign agent often results in packet loss q TCP reacts with slow-start although there is no congestion Forced fast retransmit q as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose q this forces the fast retransmit mode at the communication partners q additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration Advantage q simple changes result in significant higher performance Disadvantage q Cooperation required between IP and TCP, no transparent approach
  • 13. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.13 Transmission/time-out freezing Mobile hosts can be disconnected for a longer time q no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic q TCP disconnects after time-out completely TCP freezing q MAC layer is often able to detect interruption in advance q MAC can inform TCP layer of upcoming loss of connection q TCP stops sending, but does now not assume a congested link q MAC layer signals again if reconnected Advantage q scheme is independent of data Disadvantage q TCP on mobile host has to be changed, mechanism depends on MAC layer
  • 14. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.14 Selective retransmission TCP acknowledgements are often cumulative q ACK n acknowledges correct and in-sequence receipt of packets up to n q if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth Selective retransmission as one solution q RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps q sender can now retransmit only the missing packets Advantage q much higher efficiency Disadvantage q more complex software in a receiver, more buffer needed at the receiver
  • 15. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.15 Transaction oriented TCP TCP phases q connection setup, data transmission, connection release q using 3-way-handshake needs 3 packets for setup and release, respectively q thus, even short messages need a minimum of 7 packets! Transaction oriented TCP q RFC1644, T-TCP, describes a TCP version to avoid this overhead q connection setup, data transfer and connection release can be combined q thus, only 2 or 3 packets are needed Advantage q efficiency Disadvantage q requires changed TCP q mobility not longer transparent
  • 16. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.16 Comparison of different approaches for a “mobile” TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection into two connections isolation of wireless link, simple loss of TCP semantics, higher latency at handover Snooping TCP “snoops” data and acknowledgements, local retransmission transparent for end-to- end connection, MAC integration possible problematic with encryption, bad isolation of wireless link M-TCP splits TCP connection, chokes sender via window size Maintains end-to-end semantics, handles long term and frequent disconnections Bad isolation of wireless link, processing overhead due to bandwidth management Fast retransmit/ fast recovery avoids slow-start after roaming simple and efficient mixed layers, not transparent Transmission/ time-out freezing freezes TCP state at disconnect, resumes after reconnection independent of content or encryption, works for longer interrupts changes in TCP required, MAC dependant Selective retransmission retransmit only lost data very efficient slightly more complex receiver software, more buffer needed Transaction oriented TCP combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent
  • 17. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.17 TCP Improvements I Initial research work q Indirect TCP, Snoop TCP, M-TCP, T/TCP, SACK, Transmission/time-out freezing, … TCP over 2.5/3G wireless networks q Fine tuning today’s TCP q Learn to live with l Data rates: 64 kbit/s up, 115-384 kbit/s down; asymmetry: 3-6, but also up to 1000 (broadcast systems), periodic allocation/release of channels l High latency, high jitter, packet loss q Suggestions l Large (initial) sending windows, large maximum transfer unit, selective acknowledgement, explicit congestion notification, time stamp, no header compression q Already in use l i-mode running over FOMA l WAP 2.0 (“TCP with wireless profile”) pRTT MSS BW * *93.0 ≤ • max. TCP BandWidth • Max. Segment Size • Round Trip Time • loss probability
  • 18. Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 9.18 TCP Improvements II Performance enhancing proxies (PEP, RFC 3135) q Transport layer l Local retransmissions and acknowledgements q Additionally on the application layer l Content filtering, compression, picture downscaling l E.g., Internet/WAP gateways l Web service gateways? q Big problem: breaks end-to-end semantics l Disables use of IP security l Choose between PEP and security! More open issues q RFC 3150 (slow links) l Recommends header compression, no timestamp q RFC 3155 (links with errors) l States that explicit congestion notification cannot be used q In contrast to 2.5G/3G recommendations! Mobile system PEP Comm. partner wireless Internet