Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Mobile Transport Layer
Introduction
●

●

Mobility support on only lower layer is not
enough to provide mobility support for
applications.
As application is directly communicates
with transport Layer only.
Traditional TCP
Congestion Control
●

●

●

●

●

TCP designed for fixed n/w with fixed end-systems.
Congestion may appear from time to time even in carefully
designed networks.
Sender notices the missing ACK for the lost packet and
assumes a packet loss due to congestion.
Retransmitting the missing packets , might only increase the
congestion.
Solution – TCP show down the transmission rate
dramatically.
Traditional TCP
Slow start
●

●

Sender always calculates a congestion
window for a receiver.
The start size of the congestion window is
one segment.

●

Double the window size after receiving ACK.

●

Maintain the congestion threshold.
Traditional TCP
Fast retransmit/fast recovery
●

Two things lead to a reduction of the
congestion threshold :–

Fast retransmit – continious receving of ACK for
the same packet.

–

Fast recovery – receipt of ACK shows that there
is no congestion to justify slow start. The sender
perform fast recovery from the packet loss.
Implication on mobility
●

Slow start is not a solution in case of mobility

●

The reason for this is of using wrong assumptions.

●

●

●

●

Error rate on wireless links are higher as compare
to wired links.
Retransmittion may increase duplicates at layer 2 and
more connection are end-to-end encryption.
Mobility itself cause packet loss.
TCP detects missing ACK via time-outs and concluding
packet loss due to congestion control only.
Classical TCP improvements

Indirect TCP
●

●

I-TCP segments a TCP connection into a fixed part and a wireless part.
Standard TCP is used between the fixed computer and the access
point/FA.

●

Now access point/FA terminates the standard TCP connection.

●

It means access point/FA now seen as the mobile host for the fixed host.

●

Access point/FA work as a proxy.

●

●

If the packet is lost on the wireless link, the mobile hosts notice this much
faster due to much lower RTT.
In case of handover , AP/FA act as a proxy buffering packets for
retransmission after the handover to the new AP/FA.
Advantages of I-TCP
●

●

●

●

Does not require any change in the TCP protocol.
Due to strict partitioning into two connections,
transmission error on wireless link cannot
propogate into the fixed network.
Short delay between mobile node and AP/FA,
independent of other traffice streams.
Partitioning of two connection allow us to use
different TCP.
Disadvantages of I-TCP
●
●

●

Loss of end-to-end functionality of TCP.
If sender receive the ACK it means AP/FA
receive the packet.
Foreign agent must be a trusted entity
Snooping TCP

●

●

●

●

●

This method based on end-to-end TCP semantic.
Objective – is to buffer data close to the mobile host to
perform fast local retransmission in cse of packet loss.
FA/AP buffers all packets with destination mobile host
and additionally 'snoop' the packet flow in both
directions.
FA not ACK data to the corresponent host.
FA/AP will retransmits the packet to mobile host directly
form the buffer.
Snooping TCP
●

Data transfer from the mobile host with
destination correspondent host
–

FA snoops into packet stream to detect gaps in the
seq. no. of TCP.

–

If FA detect missing packet,

–

then , it return a NACK to the mobile host.

–

Now mobile host retransmit the missing packet
immediately.
Advantage/Disadvantage of
Snooping TCP

●

Advantage
–
–

●

End-to-End TCP semantic is preserved.
Need no modification on FA/AP and correspondent node

Disadvantage
–

It takes some time until the FA/AP can successfully
retransmit a packet from its buffer due to problem in
wireless link.

–

Have to manage time-out at FA/AP and correspondent
Node

–

If sender using end-to-end encryption scheme then
TCP protocol header will be encrypted – this
approach will not work.
Mobile TCP
●

●

●

Dropping of packets due to a handover or higher bit error
rate is not the only problem occurs.
The occurence of lengthy and/or frequent
disconnections in another problem.
I-TCP when mobile disconnected:–

●

Has to buffer more and more data – need more buffer.

Snooping TCP when mobile disconnected:–

Mobile will not able to send ACK.
Working of Mobile TCP
●

●

●

●

It splits the TCP connection into two parts as ITCP
An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used
on the SH-MH connection.
Assumption – M-TCP assumes low bit error rate
on wireless link.
M-TCP does not perform caching/retransmission
of data.
Working of Mobile TCP (Cont.)
●

●

●

●

SH monitors all packets sent to the MH and
ACKs returned from the MH.
If the SH does not receive an ACK for some
time , it assumes that the MH is disconnected.
It chokes the sender by setting the sender's
windows size 0.
It means sender will not retrasmit data.

More Related Content

What's hot

TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
Mahesh Rajawat
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
Mateen Shahid
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Ipv6
Ipv6Ipv6
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
rajisri2
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Hiperlan
HiperlanHiperlan
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
kumari36
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Abhishek Pachisia
 

What's hot (20)

TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Ipv6
Ipv6Ipv6
Ipv6
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Ip packet delivery
Ip packet deliveryIp packet delivery
Ip packet delivery
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 

Viewers also liked

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
Sonali Chauhan
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
Sushant Kushwaha
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Unit 4
Unit 4Unit 4
Unit 2
Unit 2Unit 2
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
ReachLocal Services India
 

Viewers also liked (6)

3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2
Unit 2Unit 2
Unit 2
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 

Similar to Mobile transportlayer

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
junnubabu
 
Cs8601 4
Cs8601 4Cs8601 4
Mobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdfMobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdf
ABaasitShaikh
 
transport protocols
transport protocolstransport protocols
transport protocols
Dr.K.Sreenivas Rao
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
RituParna42
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
Unit 4
Unit 4Unit 4
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
Vikram Nandini
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
babuece
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
singhram281982
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
Maulik Patel
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
Rio Nguyen
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
trupti patil
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
IDES Editor
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
SonaliAjankar
 
Raj
RajRaj
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
IJCNCJournal
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
RSathyaPriyaCSEKIOT
 

Similar to Mobile transportlayer (20)

Mobile transport layer .
Mobile transport layer .Mobile transport layer .
Mobile transport layer .
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Mobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdfMobile Computing - Mobile Transport Layer.pptx.pdf
Mobile Computing - Mobile Transport Layer.pptx.pdf
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Ch7-Transport_Protocols.ppt
Ch7-Transport_Protocols.pptCh7-Transport_Protocols.ppt
Ch7-Transport_Protocols.ppt
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Unit 4
Unit 4Unit 4
Unit 4
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
mobile_transport_layer (1).pptx
mobile_transport_layer (1).pptxmobile_transport_layer (1).pptx
mobile_transport_layer (1).pptx
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Mcseminar
McseminarMcseminar
Mcseminar
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Raj
RajRaj
Raj
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
unit-2 mc.pdf
unit-2 mc.pdfunit-2 mc.pdf
unit-2 mc.pdf
 

More from Rahul Hada

P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
Rahul Hada
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
Rahul Hada
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
Rahul Hada
 
Inheritance
InheritanceInheritance
Inheritance
Rahul Hada
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
Rahul Hada
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
Rahul Hada
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
Rahul Hada
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
Rahul Hada
 
1 session installation
1 session installation1 session installation
1 session installation
Rahul Hada
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
Rahul Hada
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
Rahul Hada
 
Support formobility
Support formobilitySupport formobility
Support formobility
Rahul Hada
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
Quality planning
Quality planningQuality planning
Quality planning
Rahul Hada
 
Risk
RiskRisk
Risk
RiskRisk

More from Rahul Hada (18)

P4 foundation
P4 foundationP4 foundation
P4 foundation
 
P4 foundation
P4 foundationP4 foundation
P4 foundation
 
Socio-technical System
Socio-technical SystemSocio-technical System
Socio-technical System
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Inheritance
InheritanceInheritance
Inheritance
 
Socket Programming using Java
Socket Programming using JavaSocket Programming using Java
Socket Programming using Java
 
Building Complex Topology using NS3
Building Complex Topology using NS3Building Complex Topology using NS3
Building Complex Topology using NS3
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
NS3 Overview
NS3 OverviewNS3 Overview
NS3 Overview
 
1 session installation
1 session installation1 session installation
1 session installation
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction of Cloud Computing
Introduction of Cloud ComputingIntroduction of Cloud Computing
Introduction of Cloud Computing
 
Fundamental of Shell Programming
Fundamental of Shell ProgrammingFundamental of Shell Programming
Fundamental of Shell Programming
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Quality planning
Quality planningQuality planning
Quality planning
 
Risk
RiskRisk
Risk
 
Risk
RiskRisk
Risk
 

Recently uploaded

Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
anupriti
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
uuuot
 
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
amitchopra0215
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1
FellyciaHikmahwarani
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
The Digital Insurer
 
What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)
Margaret Fero
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
ScyllaDB
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
ScyllaDB
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
Alpen-Adria-Universität
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
James Anderson
 
Interaction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance MetricInteraction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance Metric
ScyllaDB
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Earley Information Science
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
Raphaël Semeteys
 

Recently uploaded (20)

Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
 
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
一比一原版(msvu毕业证书)圣文森山大学毕业证如何办理
 
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
 
What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)What Not to Document and Why_ (North Bay Python 2024)
What Not to Document and Why_ (North Bay Python 2024)
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
 
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
 
Interaction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance MetricInteraction Latency: Square's User-Centric Mobile Performance Metric
Interaction Latency: Square's User-Centric Mobile Performance Metric
 
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design ApproachesKnowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
Knowledge and Prompt Engineering Part 2 Focus on Prompt Design Approaches
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
 

Mobile transportlayer

  • 2. Introduction ● ● Mobility support on only lower layer is not enough to provide mobility support for applications. As application is directly communicates with transport Layer only.
  • 3. Traditional TCP Congestion Control ● ● ● ● ● TCP designed for fixed n/w with fixed end-systems. Congestion may appear from time to time even in carefully designed networks. Sender notices the missing ACK for the lost packet and assumes a packet loss due to congestion. Retransmitting the missing packets , might only increase the congestion. Solution – TCP show down the transmission rate dramatically.
  • 4. Traditional TCP Slow start ● ● Sender always calculates a congestion window for a receiver. The start size of the congestion window is one segment. ● Double the window size after receiving ACK. ● Maintain the congestion threshold.
  • 5. Traditional TCP Fast retransmit/fast recovery ● Two things lead to a reduction of the congestion threshold :– Fast retransmit – continious receving of ACK for the same packet. – Fast recovery – receipt of ACK shows that there is no congestion to justify slow start. The sender perform fast recovery from the packet loss.
  • 6. Implication on mobility ● Slow start is not a solution in case of mobility ● The reason for this is of using wrong assumptions. ● ● ● ● Error rate on wireless links are higher as compare to wired links. Retransmittion may increase duplicates at layer 2 and more connection are end-to-end encryption. Mobility itself cause packet loss. TCP detects missing ACK via time-outs and concluding packet loss due to congestion control only.
  • 7. Classical TCP improvements Indirect TCP ● ● I-TCP segments a TCP connection into a fixed part and a wireless part. Standard TCP is used between the fixed computer and the access point/FA. ● Now access point/FA terminates the standard TCP connection. ● It means access point/FA now seen as the mobile host for the fixed host. ● Access point/FA work as a proxy. ● ● If the packet is lost on the wireless link, the mobile hosts notice this much faster due to much lower RTT. In case of handover , AP/FA act as a proxy buffering packets for retransmission after the handover to the new AP/FA.
  • 8. Advantages of I-TCP ● ● ● ● Does not require any change in the TCP protocol. Due to strict partitioning into two connections, transmission error on wireless link cannot propogate into the fixed network. Short delay between mobile node and AP/FA, independent of other traffice streams. Partitioning of two connection allow us to use different TCP.
  • 9. Disadvantages of I-TCP ● ● ● Loss of end-to-end functionality of TCP. If sender receive the ACK it means AP/FA receive the packet. Foreign agent must be a trusted entity
  • 10. Snooping TCP ● ● ● ● ● This method based on end-to-end TCP semantic. Objective – is to buffer data close to the mobile host to perform fast local retransmission in cse of packet loss. FA/AP buffers all packets with destination mobile host and additionally 'snoop' the packet flow in both directions. FA not ACK data to the corresponent host. FA/AP will retransmits the packet to mobile host directly form the buffer.
  • 11. Snooping TCP ● Data transfer from the mobile host with destination correspondent host – FA snoops into packet stream to detect gaps in the seq. no. of TCP. – If FA detect missing packet, – then , it return a NACK to the mobile host. – Now mobile host retransmit the missing packet immediately.
  • 12. Advantage/Disadvantage of Snooping TCP ● Advantage – – ● End-to-End TCP semantic is preserved. Need no modification on FA/AP and correspondent node Disadvantage – It takes some time until the FA/AP can successfully retransmit a packet from its buffer due to problem in wireless link. – Have to manage time-out at FA/AP and correspondent Node – If sender using end-to-end encryption scheme then TCP protocol header will be encrypted – this approach will not work.
  • 13. Mobile TCP ● ● ● Dropping of packets due to a handover or higher bit error rate is not the only problem occurs. The occurence of lengthy and/or frequent disconnections in another problem. I-TCP when mobile disconnected:– ● Has to buffer more and more data – need more buffer. Snooping TCP when mobile disconnected:– Mobile will not able to send ACK.
  • 14. Working of Mobile TCP ● ● ● ● It splits the TCP connection into two parts as ITCP An unchanged TCP is used between HostSupervisory Host while an optimized TCP is used on the SH-MH connection. Assumption – M-TCP assumes low bit error rate on wireless link. M-TCP does not perform caching/retransmission of data.
  • 15. Working of Mobile TCP (Cont.) ● ● ● ● SH monitors all packets sent to the MH and ACKs returned from the MH. If the SH does not receive an ACK for some time , it assumes that the MH is disconnected. It chokes the sender by setting the sender's windows size 0. It means sender will not retrasmit data.