Unit IV Mobile Transport Layer
Unit IV Mobile Transport Layer
TRADITIONAL TCP
Congestion control
• TCP has been designed for fixed networks with fixed end-systems
• Hardware and software are mature enough to ensure reliability of data
• The probable reason for a packet loss in a fixed network is a temporaryoverload
some point in the transmission path, i.e., a state of congestion at a node
• The packet buffers of a router are filled and the router cannot forward the packets
fast enough
• The only thing a router can do in this situation is to drop packets
• The sender notices the missing acknowledgement for the lost packet and assumes a
packet loss due to congestion
• Retransmitting the missing packet and continuing at full sending rate would now be
unwise, as this might only increase the congestion.
Slow start
• The behavior TCP shows after the detection of congestion is called slow start
• The sender always calculates a congestion window for a receiver.
• The start size of the congestion window is one segment (TCP packet).
• This scheme doubles the congestion window every time the acknowledgements
come back, which takes one round trip time (RTT) like 1, 2, 4, 8 etc.
• This is called the exponential growth of the congestion window in the slow start
mechanism.
• The exponential growth stops at the congestion threshold.
LNCT GROUP OF COLLEGES
Fast Retransmit
• a receiver sends acknowledgements only if it receives any packets from the sender.
• Receiving acknowledgements from a receiver also shows that the receiver
continuously receives something from the sender.
• The gap in the packet stream is not due to severe congestion, but a
simple packet loss due to a transmission error.
• The sender can now retransmit the missing packet(s) before the timer expires.
• This behavior is called fast retransmit
Fast Recovery
Implications on mobility
possible
• The performance of an unchanged TCP degrades severely
o TCP cannot be changed fundamentally due to the large base of installation in the
fixed network,
▪ TCP for mobility has to remain compatible
o the basic TCP mechanisms keep the whole Internet together
Advantages
• no changes in the fixed network necessary, no changes for the hosts (TCP
protocol) necessary, all current optimizations to TCP still work
• transmission errors on the wireless link do not propagate into the fixed network
• simple to control, mobile TCP is used only for one hop between, e.g., a foreign
agent and mobile host
• therefore, a very fast retransmission of packets is possible, the short delay on the
mobile hop is known
Disadvantages
• loss of end-to-end semantics, an acknowledgement to a sender does now
not any longer mean that a receiver really got a packet, foreign agents
might crash
LNCT GROUP OF COLLEGES
• higher latency possible due to buffering of data within the foreign agent and
forwarding to a new FA
Snooping TCP
• the foreign agent buffers all packets with destination mobile host and
additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements
• buffering enable the FA to perform a local retransmission in case of packet loss on
the wireless link
• Transparent extension of TCP within the foreign agent
• buffering of packets sent to the mobile host
• lost packets on the wireless link (both directions!) will be retransmitted
immediately by the mobile host or foreign agent, respectively (so called
“local” retransmission)
• the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
• changes of TCP only within the foreign agent
Advantages
• The correspondent host does not need to be changed; most of the enhancements are
in the foreign agent
• It does not need a handover of state as soon as the mobile host moves to another
foreign agent.
• It does not matter if the next foreign agent uses the enhancement or not
Disadvantages
• Snooping TCP does not isolate the behavior of the wireless link as well as ITCP
• Using negative acknowledgements between the foreign agent and the
mobile host assumes additional mechanisms on the mobile host.
• All efforts for snooping and buffering data may be useless if certain
encryption schemes are applied end-to- end between the correspondent host
and mobile host
Mobile TCP
• Supervisory host
o no caching, no retransmission
o monitors all packets, if disconnection detected
▪ set sender window size to 0
▪ sender automatically goes into persistent mode
o old or new SH reopen the window
• Advantages
o maintains semantics, supports disconnection, no buffer forwarding
• Disadvantages
o loss on wireless link propagated into fixed network
o adapted TCP on wireless link
• TCP freezing
o MAC layer is often able to detect interruption in advance
o MAC can inform TCP layer of upcoming loss of connection
o TCP stops sending, but does now not assume a congested link
o MAC layer signals again if reconnected
• Advantage
o scheme is independent of data
• Disadvantage
o TCP on mobile host has to be changed, mechanism depends on MAC layer
Selective retransmission
Transaction-oriented TCP
• TCP phases
o setup, data transmission, connection release
o using 3-way-handshake needs 3
packets for setup and release,
respectively
o thus, even short messages need
a minimum of 7 packets!
• Transaction oriented TCP
o RFC1644, T-TCP,
describes a TCP version to
avoid this overhead
LNCT GROUP OF COLLEGES