SlideShare una empresa de Scribd logo
1 de 13
SNOOP+α
PROTOCOL
The snoop agent
THE SNOOP PROTOCOL
1-a snoop agent, is introduced at the AP (Access Point) that acts as the last

2-The snoop agent monitors every packet that passes through the AP in eith

3-he Snoop agent operates differently on TCP data and ACK channels, as w


4-For data transfer from an MT to the FH, t
control procedures.
1-If BS sends duplicate A2 FH will think that there is congestion and lowers speed
2-Disadvantage will send P4 and after P3 he will send P3 and P4.

                                                       MH
           FH                BS snoop agent


         P2   P1
         P3                               P1
         P4                              P2
                                   X

                                  X      Ack1

                   Ack1
                                          Ack2

                      Ack2                    Ack2
                                                     P3
                                                P4
                                       Ack3
                   Ack3

                          Ack4                       Ack4
Advantages of Snoop protocol




1-offered End-to-End connections for TCP
2-prevents Fixed Host from generating congestion algorithms
3-Improved performance
4-decreased End-to-End Average delay.
5-High throughput
Protocols combined with snoop
protocol

TCP Tahoe
Reno
New Reno
SACK
Vegas
Simulation Results
Improvement of TCP protocols
using snoop

1-As expected, most TCP versions improve compared to the
plain wireless environment without Snoop. For instance,
TCP Tahoe, Reno and New Reno improve.

2- However, two important aspects need further
investigation. TCP Vegas, which was the worst performing
version without Snoop, now is the best performing version,
and TCP SACK that was the best performing version without
Snoop is now the worst version.
Snoop+ α Protocol

1-snoop has a problem; when there are no duplicate ACKs, the Snoop protocol cannot notice the

2- the Snoop+ α protocol to solve the Snoop protocol’s problem. Because the Snoop+ α agent ad
These ACKs fall into one of three categories:




1-Duplicate ACK : this is an ACK identical to the previously received ACK nu
2- A spurious ACK : this is an ACK whose number is less than that of the las
3-A new ACK : this is an ACK not received previously by the snoop+ α agen
Procedure for packets loss

For data transfer from an FH (Fixed Host) to an MT, the
Snoop agent caches unacknowledged TCP data segments,
which it forwards to the TCP receiver, and monitors the
corresponding ACKs. In particular, it provides for:

1.Retransmission  of any lost data segments locally by
1.using local timers or TCP duplicate acknowledgments to

identify packet loss, instead of waiting for the FH to do so.
2. Suppressing the duplicate ACKs on their way from
the MT back to the FH, thus avoiding fast retransmit and
congestion control at the latter.
Tcp snoop protocols
Tcp snoop protocols

Más contenido relacionado

La actualidad más candente

C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control anuragjagetiya
 
Pause frames an overview
Pause frames an overviewPause frames an overview
Pause frames an overviewMapYourTech
 
A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...IJERD Editor
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcpsamarai_apoc
 
An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)Ammad Marwat
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68myrajendra
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 

La actualidad más candente (20)

C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Pause frames an overview
Pause frames an overviewPause frames an overview
Pause frames an overview
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Tcp
TcpTcp
Tcp
 
A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)
 
Lect9
Lect9Lect9
Lect9
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 

Similar a Tcp snoop protocols

Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)Hira Awan
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)NYversity
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
features of tcp important for the web
features of tcp  important for the webfeatures of tcp  important for the web
features of tcp important for the webrinnocente
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
Computer network
Computer networkComputer network
Computer networkDeepikaT13
 
Introduction to Computer Networks
Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks TechKev
 
Sack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.pptSack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.pptChetanRaut43
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.aghacrom
 
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDKLF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDKLF_DPDK
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDPDaniel T. Lee
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsPeter SHIN
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Controlsoohyunc
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 

Similar a Tcp snoop protocols (20)

Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
features of tcp important for the web
features of tcp  important for the webfeatures of tcp  important for the web
features of tcp important for the web
 
Parallel computing(1)
Parallel computing(1)Parallel computing(1)
Parallel computing(1)
 
09 coms 525 tcpip - tcp 2
09   coms 525 tcpip - tcp 209   coms 525 tcpip - tcp 2
09 coms 525 tcpip - tcp 2
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to Computer Networks
Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Sack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.pptSack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.ppt
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.
 
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDKLF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDP
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
 
7. protocols
7. protocols7. protocols
7. protocols
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tcp (1)
Tcp (1)Tcp (1)
Tcp (1)
 

Más de Amr Nasr

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methodsAmr Nasr
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012Amr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2Amr Nasr
 
Compression one example
Compression one exampleCompression one example
Compression one exampleAmr Nasr
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarkingAmr Nasr
 
Whitebalance
WhitebalanceWhitebalance
WhitebalanceAmr Nasr
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3Amr Nasr
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2Amr Nasr
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compressionAmr Nasr
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shiftingAmr Nasr
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 

Más de Amr Nasr (16)

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2
 
Compression one example
Compression one exampleCompression one example
Compression one example
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Whitebalance
WhitebalanceWhitebalance
Whitebalance
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compression
 
Image fft
Image fftImage fft
Image fft
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shifting
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Crypt
CryptCrypt
Crypt
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Tcp snoop protocols

  • 3. THE SNOOP PROTOCOL 1-a snoop agent, is introduced at the AP (Access Point) that acts as the last 2-The snoop agent monitors every packet that passes through the AP in eith 3-he Snoop agent operates differently on TCP data and ACK channels, as w 4-For data transfer from an MT to the FH, t control procedures.
  • 4. 1-If BS sends duplicate A2 FH will think that there is congestion and lowers speed 2-Disadvantage will send P4 and after P3 he will send P3 and P4. MH FH BS snoop agent P2 P1 P3 P1 P4 P2 X X Ack1 Ack1 Ack2 Ack2 Ack2 P3 P4 Ack3 Ack3 Ack4 Ack4
  • 5. Advantages of Snoop protocol 1-offered End-to-End connections for TCP 2-prevents Fixed Host from generating congestion algorithms 3-Improved performance 4-decreased End-to-End Average delay. 5-High throughput
  • 6. Protocols combined with snoop protocol TCP Tahoe Reno New Reno SACK Vegas
  • 8. Improvement of TCP protocols using snoop 1-As expected, most TCP versions improve compared to the plain wireless environment without Snoop. For instance, TCP Tahoe, Reno and New Reno improve. 2- However, two important aspects need further investigation. TCP Vegas, which was the worst performing version without Snoop, now is the best performing version, and TCP SACK that was the best performing version without Snoop is now the worst version.
  • 9. Snoop+ α Protocol 1-snoop has a problem; when there are no duplicate ACKs, the Snoop protocol cannot notice the 2- the Snoop+ α protocol to solve the Snoop protocol’s problem. Because the Snoop+ α agent ad
  • 10. These ACKs fall into one of three categories: 1-Duplicate ACK : this is an ACK identical to the previously received ACK nu 2- A spurious ACK : this is an ACK whose number is less than that of the las 3-A new ACK : this is an ACK not received previously by the snoop+ α agen
  • 11. Procedure for packets loss For data transfer from an FH (Fixed Host) to an MT, the Snoop agent caches unacknowledged TCP data segments, which it forwards to the TCP receiver, and monitors the corresponding ACKs. In particular, it provides for: 1.Retransmission of any lost data segments locally by 1.using local timers or TCP duplicate acknowledgments to identify packet loss, instead of waiting for the FH to do so. 2. Suppressing the duplicate ACKs on their way from the MT back to the FH, thus avoiding fast retransmit and congestion control at the latter.