SlideShare a Scribd company logo
1 of 19
Download to read offline
Presented by-
TandelVishal P.
 Motivation
 TCP-mechanisms
 Indirect TCP
 Snooping TCP
 Mobile TCP
 Fast retransmit/recovery
 Transmission freezing
 Selective retransmission
 Transaction oriented TCP
 Transport protocols typically designed for
 Fixed end-systems
 Fixed, wired networks
 Research activities
 Performance
 Congestion control
 Efficient retransmissions
 TCP congestion control
 packet loss in fixed networks typically due to (temporary) overload
situations
 routers have to discard packets as soon as the buffers are full
 TCP recognizes congestion only indirectly via missing (I.e., timed out)
acknowledgements
 Immediate retransmissions unwise, they would only contribute to the
 TCP slow-start algorithm
 sender calculates/negotiates a congestion window threshold for a receiver
 start with a congestion window size equal to one segment
 exponential increase of the congestion window up to the congestion threshold, then
linear increase
 missing acknowledgement causes the reduction of the congestion threshold to one half
of the current congestion window
 congestion window starts again with one segment
 TCP fast retransmit/fast recovery
 TCP sends an acknowledgement only after receiving a packet
 if a sender receives several acknowledgements for the same packet, this is due to a gap
in received packets at the receiver
 It indicates that the receiver got all packets up to the gap and is actually receiving
packets, but some are missing (hence gap)
 Sender concludes that packet loss is not due to congestion, continue with current
 TCP assumes congestion if packets are dropped
 typically wrong in wireless networks, here we often have packet
loss due to transmission errors
 furthermore, mobility itself can cause packet loss, if e.g. a mobile
node roams from one access point (e.g. foreign agent in Mobile IP)
to another while there are still packets in transit to the old access
point and forwarding from old to new access point is not possible
for some reason
 The performance of an unmodified (I.e., as is) TCP degrades
severely
 note that TCP cannot be changed fundamentally due to the large
 Indirect TCP or I-TCP segments the connection
 no changes to the basic TCP protocol for hosts connected to the wired Internet,
millions of computers use this protocol (or slight variants of it)
 optimized TCP protocol for mobile hosts
 splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections,
no real end-to-end connection any longer
 hosts in the fixed part of the net do not notice the characteristics of the wireless
part
 Advantages
 no changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
 transmission errors on the wireless link do not propagate into the fixed
network
 simple to control, mobile TCP is used only for one hop between, e.g.,
a foreign agent and mobile host
 therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known
 Disadvantages
 loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
 Transparent“ extension of TCP within the foreign agent
 buffering of packets sent to the mobile host
 lost packets on the wireless link (both directions!) will be retransmitted immediately
by the mobile host or foreign agent, respectively (so called “local” retransmission)
 the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
 changes of TCP only within the foreign agent.
 Data transfer to the mobile host
 FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated
ACKs or time-out
 fast retransmission possible, transparent for the fixed network
 Data transfer from the mobile host
 FA detects packet loss on the wireless link via sequence numbers, FA answers directly
with a NACK to the MH
 MH can now retransmit data with only a very short delay
 Integration of the MAC layer
 MAC layer often has similar mechanisms to those of TCP
 thus, the MAC layer can already detect duplicated packets due to
retransmissions and discard them
 Problems
 snooping TCP does not isolate the wireless link as good as I-TCP
 Special handling of lengthy and/or frequent disconnections
 M-TCP splits as I-TCP does
 unmodified TCP fixed network to supervisory host (SH)
 optimized TCP SH to MH
 Supervisory host
 no caching, no retransmission
 monitors all packets, if disconnection detected
 set sender window size to 0
 sender automatically goes into persistent mode
 old or new SH reopen the window
 Advantages
 maintains semantics, supports disconnection, no buffer forwarding
 Disadvantages
 loss on wireless link propagated into fixed network
 adapted TCP on wireless link
 Change of foreign agent often results in packet loss
 TCP reacts with slow-start although there is no congestion
 Forced fast retransmit
 as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated
acknowledgements on purpose
 this forces the fast retransmit mode at the communication partners
 additionally, theTCP on the MH is forced to continue sending with the actual window size and not to
go into slow-start after registration
 Advantage
 simple changes result in significant higher performance
 Disadvantage
 further mix of IP andTCP, no transparent approach
 Mobile hosts can be disconnected for a longer time
 no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with
higher priority traffic
 TCP disconnects after time-out completely
 TCP freezing
 MAC layer is often able to detect interruption in advance
 MAC can informTCP layer of upcoming loss of connection
 TCP stops sending, but does now not assume a congested link
 MAC layer signals again if reconnected
 Advantage
 scheme is independent of data
 Disadvantage
 TCP on mobile host has to be changed, mechanism depends on MAC layer
 TCP acknowledgements are often cumulative
 ACK n acknowledges correct and in-sequence receipt of packets up to n
 if single packets are missing quite often a whole packet sequence beginning at the gap has to be
retransmitted (go-back-n), thus wasting bandwidth
 Selective retransmission as one solution
 RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-
sequence packet streams without gaps
 sender can now retransmit only the missing packets
 Advantage
 much higher efficiency
 Disadvantage
 more complex software in a receiver, more buffer needed at the receiver
 TCP phases
 connection setup, data transmission, connection release
 using 3-way-handshake needs 3 packets for setup and release, respectively
 thus, even short messages need a minimum of 7 packets!
 Transaction orientedTCP
 RFC1644,T-TCP, describes aTCP version to avoid this overhead
 connection setup, data transfer and connection release can be combined
 thus, only 2 or 3 packets are needed
 Advantage
 efficiency
 Disadvantage
 requires changedTCP
 mobility not longer transparent
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection
into two connections
isolation of wireless
link, simple
loss of TCP semantics,
higher latency at
handover
Snooping TCP “snoops” data and
acknowledgements, local
retransmission
transparent for end-to-
end connection, MAC
integration possible
problematic with
encryption, bad isolation
of wireless link
M-TCP splits TCP connection,
chokes sender via
window size
Maintains end-to-end
semantics, handles
long term and frequent
disconnections
Bad isolation of wireless
link, processing
overhead due to
bandwidth management
Fast retransmit/
fast recovery
avoids slow-start after
roaming
simple and efficient mixed layers, not
transparent
Transmission/
time-out freezing
freezes TCP state at
disconnect, resumes
after reconnection
independent of content
or encryption, works for
longer interrupts
changes in TCP
required, MAC
dependant
Selective
retransmission
retransmit only lost data very efficient slightly more complex
receiver software, more
buffer needed
Transaction
oriented TCP
combine connection
setup/release and data
transmission
Efficient for certain
applications
changes in TCP
required, not transparent
 TCP is a complex protocol
 Minimal support from underlying protocols
 Indirect observation of network environment
 Large number of competing flows from different hosts
 Congestion avoidance is still a research issue
 TCP does not perform well in a wireless environment where packets are
usually lost due to bit errors, not congestion
 Schemes have been proposed to addressTCP performance problems
 Link-level recovery
 Split protocols
 End-to-end protocols
 Jochen Schiller, Mobile Communications, Ch 9 MobileTransport
Layer.
 Mark Grayson, Kevin Shatzkamer, and KlaasWierenga, Building
the Mobile Internet, Ch 6Transport/Session Layer Mobility
safaribooksonline…
The End


More Related Content

What's hot

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff Tauseef khan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 

What's hot (20)

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff Analysis of vertical and horizontal handoff
Analysis of vertical and horizontal handoff
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Csma
CsmaCsma
Csma
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Rarp
RarpRarp
Rarp
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 

Similar to Mobile transport layer - traditional TCP

mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolstrupti patil
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manetijasuc
 

Similar to Mobile transport layer - traditional TCP (20)

mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Mcseminar
McseminarMcseminar
Mcseminar
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manet
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Wmc assi 1
Wmc assi 1Wmc assi 1
Wmc assi 1
 

More from Vishal Tandel

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 
Introduction of Windows azure and overview
Introduction of Windows azure and overviewIntroduction of Windows azure and overview
Introduction of Windows azure and overviewVishal Tandel
 
Introduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicIntroduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicVishal Tandel
 
Case Study on Google.
Case Study on Google.Case Study on Google.
Case Study on Google.Vishal Tandel
 
Cluster analysis for market segmentation
Cluster analysis for market segmentationCluster analysis for market segmentation
Cluster analysis for market segmentationVishal Tandel
 

More from Vishal Tandel (7)

Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Introduction of Windows azure and overview
Introduction of Windows azure and overviewIntroduction of Windows azure and overview
Introduction of Windows azure and overview
 
Route maps
Route mapsRoute maps
Route maps
 
Introduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in LogicIntroduction on Prolog - Programming in Logic
Introduction on Prolog - Programming in Logic
 
Case Study on Google.
Case Study on Google.Case Study on Google.
Case Study on Google.
 
Cluster analysis for market segmentation
Cluster analysis for market segmentationCluster analysis for market segmentation
Cluster analysis for market segmentation
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Mobile transport layer - traditional TCP

  • 2.  Motivation  TCP-mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing  Selective retransmission  Transaction oriented TCP
  • 3.  Transport protocols typically designed for  Fixed end-systems  Fixed, wired networks  Research activities  Performance  Congestion control  Efficient retransmissions  TCP congestion control  packet loss in fixed networks typically due to (temporary) overload situations  routers have to discard packets as soon as the buffers are full  TCP recognizes congestion only indirectly via missing (I.e., timed out) acknowledgements  Immediate retransmissions unwise, they would only contribute to the
  • 4.  TCP slow-start algorithm  sender calculates/negotiates a congestion window threshold for a receiver  start with a congestion window size equal to one segment  exponential increase of the congestion window up to the congestion threshold, then linear increase  missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window  congestion window starts again with one segment  TCP fast retransmit/fast recovery  TCP sends an acknowledgement only after receiving a packet  if a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver  It indicates that the receiver got all packets up to the gap and is actually receiving packets, but some are missing (hence gap)  Sender concludes that packet loss is not due to congestion, continue with current
  • 5.  TCP assumes congestion if packets are dropped  typically wrong in wireless networks, here we often have packet loss due to transmission errors  furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the old access point and forwarding from old to new access point is not possible for some reason  The performance of an unmodified (I.e., as is) TCP degrades severely  note that TCP cannot be changed fundamentally due to the large
  • 6.  Indirect TCP or I-TCP segments the connection  no changes to the basic TCP protocol for hosts connected to the wired Internet, millions of computers use this protocol (or slight variants of it)  optimized TCP protocol for mobile hosts  splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer  hosts in the fixed part of the net do not notice the characteristics of the wireless part
  • 7.
  • 8.  Advantages  no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work  transmission errors on the wireless link do not propagate into the fixed network  simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host  therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known  Disadvantages  loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash
  • 9.  Transparent“ extension of TCP within the foreign agent  buffering of packets sent to the mobile host  lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission)  the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs  changes of TCP only within the foreign agent.
  • 10.  Data transfer to the mobile host  FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out  fast retransmission possible, transparent for the fixed network  Data transfer from the mobile host  FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH  MH can now retransmit data with only a very short delay  Integration of the MAC layer  MAC layer often has similar mechanisms to those of TCP  thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them  Problems  snooping TCP does not isolate the wireless link as good as I-TCP
  • 11.  Special handling of lengthy and/or frequent disconnections  M-TCP splits as I-TCP does  unmodified TCP fixed network to supervisory host (SH)  optimized TCP SH to MH  Supervisory host  no caching, no retransmission  monitors all packets, if disconnection detected  set sender window size to 0  sender automatically goes into persistent mode  old or new SH reopen the window  Advantages  maintains semantics, supports disconnection, no buffer forwarding  Disadvantages  loss on wireless link propagated into fixed network  adapted TCP on wireless link
  • 12.  Change of foreign agent often results in packet loss  TCP reacts with slow-start although there is no congestion  Forced fast retransmit  as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose  this forces the fast retransmit mode at the communication partners  additionally, theTCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration  Advantage  simple changes result in significant higher performance  Disadvantage  further mix of IP andTCP, no transparent approach
  • 13.  Mobile hosts can be disconnected for a longer time  no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic  TCP disconnects after time-out completely  TCP freezing  MAC layer is often able to detect interruption in advance  MAC can informTCP layer of upcoming loss of connection  TCP stops sending, but does now not assume a congested link  MAC layer signals again if reconnected  Advantage  scheme is independent of data  Disadvantage  TCP on mobile host has to be changed, mechanism depends on MAC layer
  • 14.  TCP acknowledgements are often cumulative  ACK n acknowledges correct and in-sequence receipt of packets up to n  if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth  Selective retransmission as one solution  RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in- sequence packet streams without gaps  sender can now retransmit only the missing packets  Advantage  much higher efficiency  Disadvantage  more complex software in a receiver, more buffer needed at the receiver
  • 15.  TCP phases  connection setup, data transmission, connection release  using 3-way-handshake needs 3 packets for setup and release, respectively  thus, even short messages need a minimum of 7 packets!  Transaction orientedTCP  RFC1644,T-TCP, describes aTCP version to avoid this overhead  connection setup, data transfer and connection release can be combined  thus, only 2 or 3 packets are needed  Advantage  efficiency  Disadvantage  requires changedTCP  mobility not longer transparent
  • 16. Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection into two connections isolation of wireless link, simple loss of TCP semantics, higher latency at handover Snooping TCP “snoops” data and acknowledgements, local retransmission transparent for end-to- end connection, MAC integration possible problematic with encryption, bad isolation of wireless link M-TCP splits TCP connection, chokes sender via window size Maintains end-to-end semantics, handles long term and frequent disconnections Bad isolation of wireless link, processing overhead due to bandwidth management Fast retransmit/ fast recovery avoids slow-start after roaming simple and efficient mixed layers, not transparent Transmission/ time-out freezing freezes TCP state at disconnect, resumes after reconnection independent of content or encryption, works for longer interrupts changes in TCP required, MAC dependant Selective retransmission retransmit only lost data very efficient slightly more complex receiver software, more buffer needed Transaction oriented TCP combine connection setup/release and data transmission Efficient for certain applications changes in TCP required, not transparent
  • 17.  TCP is a complex protocol  Minimal support from underlying protocols  Indirect observation of network environment  Large number of competing flows from different hosts  Congestion avoidance is still a research issue  TCP does not perform well in a wireless environment where packets are usually lost due to bit errors, not congestion  Schemes have been proposed to addressTCP performance problems  Link-level recovery  Split protocols  End-to-end protocols
  • 18.  Jochen Schiller, Mobile Communications, Ch 9 MobileTransport Layer.  Mark Grayson, Kevin Shatzkamer, and KlaasWierenga, Building the Mobile Internet, Ch 6Transport/Session Layer Mobility safaribooksonline…