Wireless &Mobile Communications
Chapter 7: Mobile Transport Layer
 Motivation
 TCP-mechanisms
 Indirect TCP
 Snooping TCP
 Mobile TCP
 Fast retransmit/recovery
 Transmission freezing
 Selective retransmission
 Transaction oriented TCP
7.2
Motivation I
 Transport protocols typically designed for
 Fixed end-systems
 Fixed, wired networks
 Research activities
 Performance
 Congestion control
 Efficient retransmissions
 TCP congestion control
 packet loss in fixed networks typically due to (temporary)
overload situations
 routers have to discard packets as soon as the buffers are full
 TCP recognizes congestion only indirectly via missing (I.e.,
timed out) acknowledgements
 Immediate retransmissions unwise, they would only contribute
to the congestion and make it even worse
 slow-start algorithm is used as a reactive action to reduce the
network load
7.3
Motivation II
 TCP slow-start algorithm
 sender calculates/negotiates a congestion window threshold for a
receiver
 start with a congestion window size equal to one segment
 exponential increase of the congestion window up to the congestion
threshold, then linear increase
 missing acknowledgement causes the reduction of the congestion
threshold to one half of the current congestion window
 congestion window starts again with one segment
 TCP fast retransmit/fast recovery
 TCP sends an acknowledgement only after receiving a packet
 if a sender receives several acknowledgements for the same packet,
this is due to a gap in received packets at the receiver
 It indicates that the receiver got all packets up to the gap and is
actually receiving packets, but some are missing (hence gap)
 Sender concludes that packet loss is not due to congestion, continue
with current congestion window (do not use slow-start), just
retransmit all packets from beginning of reported gap (go back N).
7.4
Influences of mobility on TCP-mechanisms
 TCP assumes congestion if packets are dropped
 typically wrong in wireless networks, here we often have
packet loss due to transmission errors
 furthermore, mobility itself can cause packet loss, if e.g. a
mobile node roams from one access point (e.g. foreign agent
in Mobile IP) to another while there are still packets in transit
to the old access point and forwarding from old to new access
point is not possible for some reason
 The performance of an unmodified (I.e., as is) TCP degrades
severely
 note that TCP cannot be changed fundamentally due to the
large base of installation in the fixed network, TCP for mobility
has to remain compatible
 the basic TCP mechanisms keep the whole Internet together
7.5
Proposals to modify TCP to work in mobile environments
Approach
Indirect TCP
Snooping TCP
M-TCP
Fast retransmit/
fast recovery
Transmission/
time-out freezing
Selective
retransmission
Transaction
oriented TCP
7.6
1. Indirect TCP I
 Indirect TCP or I-TCP segments the connection
 no changes to the basic TCP protocol for hosts connected to
the wired Internet, millions of computers use this protocol (or
slight variants of it)
 optimized TCP protocol for mobile hosts
 splitting of the TCP connection at, e.g., the foreign agent into 2
TCP connections, no real end-to-end connection any longer
 hosts in the fixed part of the net do not notice the
characteristics of the wireless part
mobile host
access point
(foreign agent) „wired“ Internet
„wireless“ TCP standard TCP
7.7
I-TCP socket and state migration
mobile host
access point2
Internet
access point1
socket migration
and state transfer
7.8
Indirect TCP II
 Advantages
 no changes in the fixed network necessary, no changes for the
hosts (TCP protocol) necessary, all current optimizations to TCP
(Reno, Vegas, etc.) still work
 transmission errors on the wireless link do not propagate into the
fixed network
 simple to control, mobile TCP is used only for one hop between,
e.g., a foreign agent and mobile host
 therefore, very fast retransmission of packets is possible, the
short delay on the mobile hop is known
 Disadvantages
 loss of end-to-end semantics, an acknowledgement to a sender
does now not any longer mean that a receiver really got a packet,
foreign agents might crash
 higher latency possible due to buffering of data within the foreign
agent and forwarding to a new foreign agent
7.9
2. Snooping TCP I
 „Transparent“ extension of TCP within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign agent,
respectively (so called “local” retransmission)
 the foreign agent therefore “snoops” the packet flow and
recognizes acknowledgements in both directions, it also filters
ACKs
 changes to the basic TCP only within the foreign agent
„wired“ Internet
buffering of data
end-to-end TCP connection
local retransmission correspondent
host
foreign
agent
mobile
host
snooping of ACKs
7.10
Snooping TCP II
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects
packet loss via duplicated ACKs or time-out
 fast retransmission possible, transparent for the fixed network
 Data transfer from the mobile host
 FA detects packet loss on the wireless link via sequence
numbers, FA answers directly with a NACK to the MH
 MH can now retransmit data with only a very short delay
 Integration of the MAC layer
 MAC layer often has similar mechanisms to those of TCP
 thus, the MAC layer can already detect duplicated packets due
to retransmissions and discard them
 Problems
 snooping TCP does not isolate the wireless link as good as I-
TCP
 snooping might be useless depending on encryption schemes
7.11
3. Mobile TCP
 Special handling of lengthy and/or frequent disconnections
 M-TCP splits as I-TCP does
 unmodified TCP fixed network to supervisory host (SH)
 optimized TCP SH to MH
 Supervisory host
 no caching, no retransmission
 monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
 old or new SH reopen the window
 Advantages
 maintains semantics, supports disconnection, no buffer
forwarding
 Disadvantages
 loss on wireless link propagated into fixed network
 adapted TCP on wireless link
7.12
4. Fast retransmit/fast recovery
 Change of foreign agent often results in packet loss
 TCP reacts with slow-start although there is no congestion
 Forced fast retransmit
 as soon as the mobile host has registered with a new foreign
agent, the MH sends duplicated acknowledgements on
purpose
 this forces the fast retransmit mode at the communication
partners
 additionally, the TCP on the MH is forced to continue sending
with the actual window size and not to go into slow-start after
registration
 Advantage
 simple changes result in significant higher performance
 Disadvantage
 further mix of IP and TCP, no transparent approach
7.13
5. Transmission/time-out freezing
 Mobile hosts can be disconnected for a longer time
 no packet exchange possible, e.g., in a tunnel, disconnection
due to overloaded cells or mux. with higher priority traffic
 TCP disconnects after time-out completely
 TCP freezing
 MAC layer is often able to detect interruption in advance
 MAC can inform TCP layer of upcoming loss of connection
 TCP stops sending, but does now not assume a congested
link
 MAC layer signals again if reconnected
 Advantage
 scheme is independent of data
 Disadvantage
 TCP on mobile host has to be changed, mechanism depends
on MAC layer
7.14
6. Selective retransmission
 TCP acknowledgements are often cumulative
 ACK n acknowledges correct and in-sequence receipt of
packets up to n
 if single packets are missing quite often a whole packet
sequence beginning at the gap has to be retransmitted (go-
back-n), thus wasting bandwidth
 Selective retransmission as one solution
 RFC2018 allows for acknowledgements of single packets, not
only acknowledgements of in-sequence packet streams
without gaps
 sender can now retransmit only the missing packets
 Advantage
 much higher efficiency
 Disadvantage
 more complex software in a receiver, more buffer needed at
the receiver
7.15
7. Transaction oriented TCP
 TCP phases
 connection setup, data transmission, connection release
 using 3-way-handshake needs 3 packets for setup and release,
respectively
 thus, even short messages need a minimum of 7 packets!
 Transaction oriented TCP
 RFC1644, T-TCP, describes a TCP version to avoid this
overhead
 connection setup, data transfer and connection release can be
combined
 thus, only 2 or 3 packets are needed
 Advantage
 efficiency
 Disadvantage
 requires changed TCP
 mobility not longer transparent
7.16
Comparison of different approaches for “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection
into two connections
isolation of wireless
link, simple
loss of TCP semantics,
higher latency at
handover
Snooping TCP “snoops” data and
acknowledgements, local
retransmission
transparent for end-to-
end connection, MAC
integration possible
problematic with
encryption, bad isolation
of wireless link
M-TCP splits TCP connection,
chokes sender via
window size
Maintains end-to-end
semantics, handles
long term and frequent
disconnections
Bad isolation of wireless
link, processing
overhead due to
bandwidth management
Fast retransmit/
fast recovery
avoids slow-start after
roaming
simple and efficient mixed layers, not
transparent
Transmission/
time-out freezing
freezes TCP state at
disconnect, resumes
after reconnection
independent of content
or encryption, works for
longer interrupts
changes in TCP
required, MAC
dependant
Selective
retransmission
retransmit only lost data very efficient slightly more complex
receiver software, more
buffer needed
Transaction
oriented TCP
combine connection
setup/release and data
transmission
Efficient for certain
applications
changes in TCP
required, not transparent

More Related Content

PPT
transport protocols
PPTX
mobile transport layer in mobile computing.pptx
PDF
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
PPTX
mobile_transport_layer (1).pptx
PPT
Wireless Networks: Transport Protocols Lecture
PPTX
Mobile transport layer .
PPT
dawdw dwadawdwa dawrf af ae faef efae fae
PPTX
Mobile transport layer - traditional TCP
transport protocols
mobile transport layer in mobile computing.pptx
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
mobile_transport_layer (1).pptx
Wireless Networks: Transport Protocols Lecture
Mobile transport layer .
dawdw dwadawdwa dawrf af ae faef efae fae
Mobile transport layer - traditional TCP

Similar to Ch7-Transport_Protocols.ppt (20)

PDF
Mobile transport layer
PPT
C10 transport protocols
PDF
PPTX
Mobile Transport layer
PDF
PPT
Mobile transport layer
PPTX
Mcseminar
PDF
Transport protocols
PDF
PDF
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
PDF
A throughput analysis of tcp in adhoc networks
PDF
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
PDF
Mobile Computing - Mobile Transport Layer.pptx.pdf
PDF
Mobile transportlayer
PDF
transport protocols
PPTX
Mobile Transpot Layer
PDF
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
PDF
Improving Performance of TCP in Wireless Environment using TCP-P
PDF
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
PDF
TCP over wireless slides
Mobile transport layer
C10 transport protocols
Mobile Transport layer
Mobile transport layer
Mcseminar
Transport protocols
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
A throughput analysis of tcp in adhoc networks
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
Mobile Computing - Mobile Transport Layer.pptx.pdf
Mobile transportlayer
transport protocols
Mobile Transpot Layer
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Improving Performance of TCP in Wireless Environment using TCP-P
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
TCP over wireless slides
Ad

Recently uploaded (20)

PDF
Manifestation and the End of Poverty_ A Vision for Human Potential.pdf
PDF
Cybersecurity: Understanding Threats, Attacks, and Protective Measures in the...
PPTX
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
PPT
Expect The Impossiblesssssssssssssss.ppt
PPTX
LiFi Technology an effective way of Communication
PDF
Technical SEO Explained: How To Make Your Website Search-Friendly
PPTX
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
PPTX
Hartpury电子版毕业证哈特伯瑞大学成绩单激光标100%复刻Hartpury学生证
PDF
Associate Degree Programmers for Allama Iqbal University
PPTX
Talking Baby AI Video Generator by Revid AI
PPTX
Cyber Bullying - How to deal with Cyber bullying pptx
PPT
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
PPTX
MAIN PARTS OF COMPUTER- COMPUTER SYSTEM.pptx
PDF
Strategic Crisis Communication & Policy Advocacy for Indian Industry Association
PPTX
Data Flows presentation hubspot crm.pptx
PPTX
Git Presentation with diagram that show the main functionality
PPTX
materi minggu ke 5.ppt mata kuliah mobile
PPTX
Going_to_Greece presentation Greek mythology
PDF
Information Technology practical assignment
DOCX
Audio to Video AI Technology Revolutiona
Manifestation and the End of Poverty_ A Vision for Human Potential.pdf
Cybersecurity: Understanding Threats, Attacks, and Protective Measures in the...
日本横滨国立大学毕业证书文凭定制YNU成绩单硕士文凭学历认证
Expect The Impossiblesssssssssssssss.ppt
LiFi Technology an effective way of Communication
Technical SEO Explained: How To Make Your Website Search-Friendly
REE IN CARBONATITE EEPOSIT AND INCLUDE CASE STUDY ON AMBADUNGAR
Hartpury电子版毕业证哈特伯瑞大学成绩单激光标100%复刻Hartpury学生证
Associate Degree Programmers for Allama Iqbal University
Talking Baby AI Video Generator by Revid AI
Cyber Bullying - How to deal with Cyber bullying pptx
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
MAIN PARTS OF COMPUTER- COMPUTER SYSTEM.pptx
Strategic Crisis Communication & Policy Advocacy for Indian Industry Association
Data Flows presentation hubspot crm.pptx
Git Presentation with diagram that show the main functionality
materi minggu ke 5.ppt mata kuliah mobile
Going_to_Greece presentation Greek mythology
Information Technology practical assignment
Audio to Video AI Technology Revolutiona
Ad

Ch7-Transport_Protocols.ppt

  • 1. Wireless &Mobile Communications Chapter 7: Mobile Transport Layer  Motivation  TCP-mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing  Selective retransmission  Transaction oriented TCP
  • 2. 7.2 Motivation I  Transport protocols typically designed for  Fixed end-systems  Fixed, wired networks  Research activities  Performance  Congestion control  Efficient retransmissions  TCP congestion control  packet loss in fixed networks typically due to (temporary) overload situations  routers have to discard packets as soon as the buffers are full  TCP recognizes congestion only indirectly via missing (I.e., timed out) acknowledgements  Immediate retransmissions unwise, they would only contribute to the congestion and make it even worse  slow-start algorithm is used as a reactive action to reduce the network load
  • 3. 7.3 Motivation II  TCP slow-start algorithm  sender calculates/negotiates a congestion window threshold for a receiver  start with a congestion window size equal to one segment  exponential increase of the congestion window up to the congestion threshold, then linear increase  missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window  congestion window starts again with one segment  TCP fast retransmit/fast recovery  TCP sends an acknowledgement only after receiving a packet  if a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver  It indicates that the receiver got all packets up to the gap and is actually receiving packets, but some are missing (hence gap)  Sender concludes that packet loss is not due to congestion, continue with current congestion window (do not use slow-start), just retransmit all packets from beginning of reported gap (go back N).
  • 4. 7.4 Influences of mobility on TCP-mechanisms  TCP assumes congestion if packets are dropped  typically wrong in wireless networks, here we often have packet loss due to transmission errors  furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the old access point and forwarding from old to new access point is not possible for some reason  The performance of an unmodified (I.e., as is) TCP degrades severely  note that TCP cannot be changed fundamentally due to the large base of installation in the fixed network, TCP for mobility has to remain compatible  the basic TCP mechanisms keep the whole Internet together
  • 5. 7.5 Proposals to modify TCP to work in mobile environments Approach Indirect TCP Snooping TCP M-TCP Fast retransmit/ fast recovery Transmission/ time-out freezing Selective retransmission Transaction oriented TCP
  • 6. 7.6 1. Indirect TCP I  Indirect TCP or I-TCP segments the connection  no changes to the basic TCP protocol for hosts connected to the wired Internet, millions of computers use this protocol (or slight variants of it)  optimized TCP protocol for mobile hosts  splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer  hosts in the fixed part of the net do not notice the characteristics of the wireless part mobile host access point (foreign agent) „wired“ Internet „wireless“ TCP standard TCP
  • 7. 7.7 I-TCP socket and state migration mobile host access point2 Internet access point1 socket migration and state transfer
  • 8. 7.8 Indirect TCP II  Advantages  no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP (Reno, Vegas, etc.) still work  transmission errors on the wireless link do not propagate into the fixed network  simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  therefore, very fast retransmission of packets is possible, the short delay on the mobile hop is known  Disadvantages  loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash  higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent
  • 9. 7.9 2. Snooping TCP I  „Transparent“ extension of TCP within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission)  the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs  changes to the basic TCP only within the foreign agent „wired“ Internet buffering of data end-to-end TCP connection local retransmission correspondent host foreign agent mobile host snooping of ACKs
  • 10. 7.10 Snooping TCP II  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  fast retransmission possible, transparent for the fixed network  Data transfer from the mobile host  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay  Integration of the MAC layer  MAC layer often has similar mechanisms to those of TCP  thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them  Problems  snooping TCP does not isolate the wireless link as good as I- TCP  snooping might be useless depending on encryption schemes
  • 11. 7.11 3. Mobile TCP  Special handling of lengthy and/or frequent disconnections  M-TCP splits as I-TCP does  unmodified TCP fixed network to supervisory host (SH)  optimized TCP SH to MH  Supervisory host  no caching, no retransmission  monitors all packets, if disconnection detected set sender window size to 0 sender automatically goes into persistent mode  old or new SH reopen the window  Advantages  maintains semantics, supports disconnection, no buffer forwarding  Disadvantages  loss on wireless link propagated into fixed network  adapted TCP on wireless link
  • 12. 7.12 4. Fast retransmit/fast recovery  Change of foreign agent often results in packet loss  TCP reacts with slow-start although there is no congestion  Forced fast retransmit  as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose  this forces the fast retransmit mode at the communication partners  additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration  Advantage  simple changes result in significant higher performance  Disadvantage  further mix of IP and TCP, no transparent approach
  • 13. 7.13 5. Transmission/time-out freezing  Mobile hosts can be disconnected for a longer time  no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic  TCP disconnects after time-out completely  TCP freezing  MAC layer is often able to detect interruption in advance  MAC can inform TCP layer of upcoming loss of connection  TCP stops sending, but does now not assume a congested link  MAC layer signals again if reconnected  Advantage  scheme is independent of data  Disadvantage  TCP on mobile host has to be changed, mechanism depends on MAC layer
  • 14. 7.14 6. Selective retransmission  TCP acknowledgements are often cumulative  ACK n acknowledges correct and in-sequence receipt of packets up to n  if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go- back-n), thus wasting bandwidth  Selective retransmission as one solution  RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps  sender can now retransmit only the missing packets  Advantage  much higher efficiency  Disadvantage  more complex software in a receiver, more buffer needed at the receiver
  • 15. 7.15 7. Transaction oriented TCP  TCP phases  connection setup, data transmission, connection release  using 3-way-handshake needs 3 packets for setup and release, respectively  thus, even short messages need a minimum of 7 packets!  Transaction oriented TCP  RFC1644, T-TCP, describes a TCP version to avoid this overhead  connection setup, data transfer and connection release can be combined  thus, only 2 or 3 packets are needed  Advantage  efficiency  Disadvantage  requires changed TCP  mobility not longer transparent
  • 16. 7.16 Comparison of different approaches for “mobile” TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection into two connections isolation of wireless link, simple loss of TCP semantics, higher latency at handover Snooping TCP “snoops” data and acknowledgements, local retransmission transparent for end-to- end connection, MAC integration possible problematic with encryption, bad isolation of wireless link M-TCP splits TCP connection, chokes sender via window size Maintains end-to-end semantics, handles long term and frequent disconnections Bad isolation of wireless link, processing overhead due to bandwidth management Fast retransmit/ fast recovery avoids slow-start after roaming simple and efficient mixed layers, not transparent Transmission/ time-out freezing freezes TCP state at disconnect, resumes after reconnection independent of content or encryption, works for longer interrupts changes in TCP required, MAC dependant Selective retransmission retransmit only lost data very efficient slightly more complex receiver software, more buffer needed Transaction oriented TCP combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent