SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Mobile Transport Layer
Introduction
●

●

Mobility support on only lower layer is not
enough to provide mobility support for
applications.
As application is directly communicates
with transport Layer only.
Traditional TCP
Congestion Control
●

●

●

●

●

TCP designed for fixed n/w with fixed end-systems.
Congestion may appear from time to time even in carefully
designed networks.
Sender notices the missing ACK for the lost packet and
assumes a packet loss due to congestion.
Retransmitting the missing packets , might only increase the
congestion.
Solution – TCP show down the transmission rate
dramatically.
Traditional TCP
Slow start
●

●

Sender always calculates a congestion
window for a receiver.
The start size of the congestion window is
one segment.

●

Double the window size after receiving ACK.

●

Maintain the congestion threshold.
Traditional TCP
Fast retransmit/fast recovery
●

Two things lead to a reduction of the
congestion threshold :–

Fast retransmit – continious receving of ACK for
the same packet.

–

Fast recovery – receipt of ACK shows that there
is no congestion to justify slow start. The sender
perform fast recovery from the packet loss.
Implication on mobility
●

Slow start is not a solution in case of mobility

●

The reason for this is of using wrong assumptions.

●

●

●

●

Error rate on wireless links are higher as compare
to wired links.
Retransmittion may increase duplicates at layer 2 and
more connection are end-to-end encryption.
Mobility itself cause packet loss.
TCP detects missing ACK via time-outs and concluding
packet loss due to congestion control only.
Classical TCP improvements

Indirect TCP
●

●

I-TCP segments a TCP connection into a fixed part and a wireless part.
Standard TCP is used between the fixed computer and the access
point/FA.

●

Now access point/FA terminates the standard TCP connection.

●

It means access point/FA now seen as the mobile host for the fixed host.

●

Access point/FA work as a proxy.

●

●

If the packet is lost on the wireless link, the mobile hosts notice this much
faster due to much lower RTT.
In case of handover , AP/FA act as a proxy buffering packets for
retransmission after the handover to the new AP/FA.
Advantages of I-TCP
●

●

●

●

Does not require any change in the TCP protocol.
Due to strict partitioning into two connections,
transmission error on wireless link cannot
propogate into the fixed network.
Short delay between mobile node and AP/FA,
independent of other traffice streams.
Partitioning of two connection allow us to use
different TCP.
Disadvantages of I-TCP
●
●

●

Loss of end-to-end functionality of TCP.
If sender receive the ACK it means AP/FA
receive the packet.
Foreign agent must be a trusted entity
Snooping TCP

●

●

●

●

●

This method based on end-to-end TCP semantic.
Objective – is to buffer data close to the mobile host to
perform fast local retransmission in cse of packet loss.
FA/AP buffers all packets with destination mobile host
and additionally 'snoop' the packet flow in both
directions.
FA not ACK data to the corresponent host.
FA/AP will retransmits the packet to mobile host directly
form the buffer.
Snooping TCP
●

Data transfer from the mobile host with
destination correspondent host
–

FA snoops into packet stream to detect gaps in the
seq. no. of TCP.

–

If FA detect missing packet,

–

then , it return a NACK to the mobile host.

–

Now mobile host retransmit the missing packet
immediately.
Advantage/Disadvantage of
Snooping TCP

●

Advantage
–
–

●

End-to-End TCP semantic is preserved.
Need no modification on FA/AP and correspondent node

Disadvantage
–

It takes some time until the FA/AP can successfully
retransmit a packet from its buffer due to problem in
wireless link.

–

Have to manage time-out at FA/AP and correspondent
Node

–

If sender using end-to-end encryption scheme then
TCP protocol header will be encrypted – this
approach will not work.
Mobile TCP
●

●

●

Dropping of packets due to a handover or higher bit error
rate is not the only problem occurs.
The occurence of lengthy and/or frequent
disconnections in another problem.
I-TCP when mobile disconnected:–

●

Has to buffer more and more data – need more buffer.

Snooping TCP when mobile disconnected:–

Mobile will not able to send ACK.
Working of Mobile TCP
●

●

●

●

It splits the TCP connection into two parts as ITCP
An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used
on the SH-MH connection.
Assumption – M-TCP assumes low bit error rate
on wireless link.
M-TCP does not perform caching/retransmission
of data.
Working of Mobile TCP (Cont.)
●

●

●

●

SH monitors all packets sent to the MH and
ACKs returned from the MH.
If the SH does not receive an ACK for some
time , it assumes that the MH is disconnected.
It chokes the sender by setting the sender's
windows size 0.
It means sender will not retrasmit data.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
WLAN
WLANWLAN
WLAN
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Mac layer
Mac  layerMac  layer
Mac layer
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Transport layer
Transport layerTransport layer
Transport layer
 
Error control
Error controlError control
Error control
 

Destacado (7)

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 

Similar a Mobile transportlayer

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .junnubabu
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptRituParna42
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layerVikram Nandini
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTbabuece
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxsinghram281982
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolstrupti patil
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
 

Similar a Mobile transportlayer (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Mcseminar
McseminarMcseminar
Mcseminar
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Raj
RajRaj
Raj
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
 

Más de Rahul Hada

Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical SystemRahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering IntroductionRahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using JavaRahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installationRahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud ComputingRahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell ProgrammingRahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobilityRahul Hada
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Quality planning
Quality planningQuality planning
Quality planningRahul Hada
 

Más de Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Mobile transportlayer

  • 2. Introduction ● ● Mobility support on only lower layer is not enough to provide mobility support for applications. As application is directly communicates with transport Layer only.
  • 3. Traditional TCP Congestion Control ● ● ● ● ● TCP designed for fixed n/w with fixed end-systems. Congestion may appear from time to time even in carefully designed networks. Sender notices the missing ACK for the lost packet and assumes a packet loss due to congestion. Retransmitting the missing packets , might only increase the congestion. Solution – TCP show down the transmission rate dramatically.
  • 4. Traditional TCP Slow start ● ● Sender always calculates a congestion window for a receiver. The start size of the congestion window is one segment. ● Double the window size after receiving ACK. ● Maintain the congestion threshold.
  • 5. Traditional TCP Fast retransmit/fast recovery ● Two things lead to a reduction of the congestion threshold :– Fast retransmit – continious receving of ACK for the same packet. – Fast recovery – receipt of ACK shows that there is no congestion to justify slow start. The sender perform fast recovery from the packet loss.
  • 6. Implication on mobility ● Slow start is not a solution in case of mobility ● The reason for this is of using wrong assumptions. ● ● ● ● Error rate on wireless links are higher as compare to wired links. Retransmittion may increase duplicates at layer 2 and more connection are end-to-end encryption. Mobility itself cause packet loss. TCP detects missing ACK via time-outs and concluding packet loss due to congestion control only.
  • 7. Classical TCP improvements Indirect TCP ● ● I-TCP segments a TCP connection into a fixed part and a wireless part. Standard TCP is used between the fixed computer and the access point/FA. ● Now access point/FA terminates the standard TCP connection. ● It means access point/FA now seen as the mobile host for the fixed host. ● Access point/FA work as a proxy. ● ● If the packet is lost on the wireless link, the mobile hosts notice this much faster due to much lower RTT. In case of handover , AP/FA act as a proxy buffering packets for retransmission after the handover to the new AP/FA.
  • 8. Advantages of I-TCP ● ● ● ● Does not require any change in the TCP protocol. Due to strict partitioning into two connections, transmission error on wireless link cannot propogate into the fixed network. Short delay between mobile node and AP/FA, independent of other traffice streams. Partitioning of two connection allow us to use different TCP.
  • 9. Disadvantages of I-TCP ● ● ● Loss of end-to-end functionality of TCP. If sender receive the ACK it means AP/FA receive the packet. Foreign agent must be a trusted entity
  • 10. Snooping TCP ● ● ● ● ● This method based on end-to-end TCP semantic. Objective – is to buffer data close to the mobile host to perform fast local retransmission in cse of packet loss. FA/AP buffers all packets with destination mobile host and additionally 'snoop' the packet flow in both directions. FA not ACK data to the corresponent host. FA/AP will retransmits the packet to mobile host directly form the buffer.
  • 11. Snooping TCP ● Data transfer from the mobile host with destination correspondent host – FA snoops into packet stream to detect gaps in the seq. no. of TCP. – If FA detect missing packet, – then , it return a NACK to the mobile host. – Now mobile host retransmit the missing packet immediately.
  • 12. Advantage/Disadvantage of Snooping TCP ● Advantage – – ● End-to-End TCP semantic is preserved. Need no modification on FA/AP and correspondent node Disadvantage – It takes some time until the FA/AP can successfully retransmit a packet from its buffer due to problem in wireless link. – Have to manage time-out at FA/AP and correspondent Node – If sender using end-to-end encryption scheme then TCP protocol header will be encrypted – this approach will not work.
  • 13. Mobile TCP ● ● ● Dropping of packets due to a handover or higher bit error rate is not the only problem occurs. The occurence of lengthy and/or frequent disconnections in another problem. I-TCP when mobile disconnected:– ● Has to buffer more and more data – need more buffer. Snooping TCP when mobile disconnected:– Mobile will not able to send ACK.
  • 14. Working of Mobile TCP ● ● ● ● It splits the TCP connection into two parts as ITCP An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used on the SH-MH connection. Assumption – M-TCP assumes low bit error rate on wireless link. M-TCP does not perform caching/retransmission of data.
  • 15. Working of Mobile TCP (Cont.) ● ● ● ● SH monitors all packets sent to the MH and ACKs returned from the MH. If the SH does not receive an ACK for some time , it assumes that the MH is disconnected. It chokes the sender by setting the sender's windows size 0. It means sender will not retrasmit data.