Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views91 pages

Mobile Transport Layer & TCP Optimization

The document discusses several key issues with using traditional TCP in mobile environments: 1. TCP was designed for fixed networks and assumes packet loss is due to network congestion, triggering slow start. However, in mobile networks packet loss can be due to errors on wireless links or mobility-related issues rather than congestion. 2. Triggering slow start in response to non-congestion packet loss reduces TCP efficiency over mobile and wireless links. 3. New transport layer protocols and TCP variants are needed to distinguish between packet loss causes and avoid slow start in response to errors rather than congestion when supporting mobility.

Uploaded by

Mahesh Vadlamudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views91 pages

Mobile Transport Layer & TCP Optimization

The document discusses several key issues with using traditional TCP in mobile environments: 1. TCP was designed for fixed networks and assumes packet loss is due to network congestion, triggering slow start. However, in mobile networks packet loss can be due to errors on wireless links or mobility-related issues rather than congestion. 2. Triggering slow start in response to non-congestion packet loss reduces TCP efficiency over mobile and wireless links. 3. New transport layer protocols and TCP variants are needed to distinguish between packet loss causes and avoid slow start in response to errors rather than congestion when supporting mobility.

Uploaded by

Mahesh Vadlamudi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 91

MOBILE COMPUTING

OE-II
UNIT IV: MOBILE TRANSPORT LAYER
• Traditional TCP
• Indirect TCP
• Snooping TCP
• Mobile TCP
• Fast retransmit/fast recovery
• Transmission/ time-out freezing
• Selective retransmission
• Transaction oriented TCP
Mobile transport layer - 1

• Supporting mobility only on lower layers


• up to network layer is not enough
• to provide mobility support for applications

• Most applications rely on transport layer


• such as TCP (transmission control protocol)
• UDP (user datagram protocol) in case of internet

• Two functions of transport layer in internet are


• checksumming over user data
• multiplexing/demultiplexing of data from/to applications
Mobile transport layer - 2

• Network layer only addresses host ports in UDP


• TCP allow dedicated applications to be addressed
• Connectionless UDP does not offer much more than this addressing

• While UDP is connectionless


• does not give certain guarantees about reliable data delivery
• TCP is much more complex
• needs special mechanisms to be useful in mobile environments

• Mobility support in IP such as mobile IP is already enough


• for UDP to work
Mobile transport layer - 3

• Main difference between UDP and TCP


• TCP offers connections between two applications

• TCP can give certain guarantees


• such as in-order delivery or reliable data transmission
• using retransmission techniques
• TCP has built-in mechanisms to behave in ‘network friendly’ manner

• If TCP encounters packet loss


• it assumes network internal congestion and slows down transmission rate
Mobile transport layer - 4

• Key requirement for new developments in internet is


• ‘TCP friendliness’

• UDP requires that applications handle reliability


• in-order delivery etc.

• UDP does not behave in network friendly manner


• i.e., does not pull back in case of congestion
• continues to send packets into already congested network
Traditional TCP

• Mechanisms of transmission control protocol (TCP)


• that influence
• efficiency of TCP in mobile environment

• Congestion control
• Slow start
• Fast retransmit/fast recovery
• Implications on mobility
Congestion control - 1

• Transport layer protocol such as TCP has been designed


• for fixed networks with fixed end-systems

• Data transmission takes place using network adapters


• fiber optics
• copper wires
• special hardware for routers etc.

• This hardware works without introducing transmission errors


Congestion control - 2

• If software is mature enough


• it will not drop packets or flip bits
• if packet on its way from sender to receiver is lost in fixed network
• it is not because of hardware or software errors

• Probable reason for packet loss in fixed network is temporary overload


• some point in transmission path
• i.e., state of congestion at node

• Congestion may appear from time to time


• even in carefully designed networks
Congestion control - 3

• Packet buffers of router are filled


• router cannot forward packets fast enough
• because sum of input rates of packets for output link is higher
• than capacity of output link
• Only thing router can do in this situation is to drop packets

• Dropped packet is lost for transmission


• receiver notices gap in packet stream

• Now receiver does not directly tell sender which packet is missing
• but continues to acknowledge all in-sequence packets up to missing one
Congestion control - 4

• Sender notices missing acknowledgement for lost packet


• assumes packet loss due to congestion

• Retransmitting missing packet


• continuing at full sending rate would now be unwise
• as this might only increase congestion

• It is not guaranteed that all packets of TCP connection


• take same way through network
Congestion control - 5

• To mitigate congestion
• TCP slows down transmission rate dramatically

• All other TCP connections experiencing same congestion


• do exactly same so congestion is soon resolved

• This cooperation of TCP connections in internet is one of main reasons


• for its survival as it is today

• Using UDP is not solution


• because throughput is higher compared to TCP connection just at beginning
Congestion control - 6

• As soon as everyone uses UDP


• this advantage disappears

• After that
• congestion is standard and data transmission quality is unpredictable

• Even under heavy load


• TCP guarantees at least sharing of the bandwidth
Slow start - 1

• TCP’s reaction to missing acknowledgement is


• Slow start

• Sender always calculates congestion window for receiver


• Start size of congestion window is one segment (TCP packet)
• Sender sends one packet and waits for acknowledgement

• If this acknowledgement arrives


• sender increases congestion window by one
• now sending two packets (congestion window = 2)
Slow start - 2

• After arrival of two corresponding acknowledgements


• sender again adds 2 to congestion window
• one for each of acknowledgements
• Now congestion window equals 4

• This scheme doubles congestion window every time


• acknowledgements come back
• which takes one round trip time (RTT)
• this is called exponential growth of congestion window in slow start mechanism
Slow start - 3

• It is too dangerous to double congestion window each time


• because steps might become too large
• exponential growth stops at congestion threshold

• As soon as congestion window reaches congestion threshold


• further increase of transmission rate is only linear
• by adding 1 to congestion window
• each time acknowledgements come back

• Linear increase continues until time-out at sender occurs


• due to missing acknowledgement
• sender sets congestion threshold to half of current congestion window
Slow start - 4

• Congestion window itself is set to one segment


• sender starts sending single segment

• Exponential growth starts once more up to new congestion threshold


• then window grows in linear fashion
Fast retransmit/fast recovery - 1

• Reason for reduction of congestion threshold


• sender receiving continuous acknowledgements for same packet

• This informs sender


• receiver got all packets up to acknowledged packet in sequence

• In TCP
• receiver sends acknowledgements
• only if it receives any packets from sender
Fast retransmit/fast recovery - 2

• Receiving acknowledgements from receiver shows


• receiver continuously receives something from sender

• Gap in packet stream is not due to severe congestion


• but simple packet loss due to transmission error

• Sender can now retransmit missing packet(s) before timer expires


• This behaviour is called fast retransmit

• Receipt of acknowledgements shows that


• there is no congestion to justify slow start
Fast retransmit/fast recovery - 3

• Sender can continue with current congestion window


• sender performs fast recovery from packet loss

• This mechanism can improve efficiency of TCP


• reason for activating slow start is time-out
• due to missing acknowledgement

• TCP using fast retransmit/fast recovery interprets


• congestion in network
• activates slow start mechanism
Implications on mobility - 1

• Slow start is useful mechanism in fixed networks


• decreases efficiency of TCP
• if used together with mobile receivers or senders
• Reason for this is use of slow start under wrong assumptions

• From missing acknowledgement


• TCP concludes congestion situation

• This may also happen in networks


• with mobile and wireless end-systems
• it is not main reason for packet loss
Implications on mobility - 2

• Error rates on wireless links are higher


• compared to fixed fiber or copper links

• Packet loss is much more common


• cannot always be compensated by layer 2 retransmissions
• error correction (FEC)

• Trying to retransmit on layer 2 could


• trigger TCP retransmission if it takes too long
• Layer 2 now faces problem of transmitting same packet twice over bad link
Implications on mobility - 3

• Detecting these duplicates on layer 2 is not option


• because more and more connections use end-to-end encryption
• making it impossible to look at packet

• Mobility itself can cause packet loss


• There are many situations where soft handover
• from one access point to another is not possible for mobile end-system
Implications on mobility - 4

• When using mobile IP


• there could still be some packets in transit to old foreign agent
• while mobile node moves to new foreign agent

• Old foreign agent may not be able to forward those packets


• to new foreign agent or even buffer the packets
• if disconnection of mobile node takes too long

• This packet loss has nothing to do with wireless access


• but is caused by problems of rerouting traffic
Implications on mobility - 5

• TCP mechanism detecting missing acknowledgements via time-outs


• concluding packet loss due to congestion
• cannot distinguish between different causes

• This is fundamental design problem in TCP


• error control mechanism (missing acknowledgement due to transmission error)
• misused for congestion control (missing acknowledgement due to network overload)
• In both cases packets are lost (either due to invalid checksums or dropping in routers)
• Reasons are completely different
Implications on mobility - 6

• TCP cannot distinguish between these two different reasons


• Standard TCP reacts with slow start if acknowledgements are missing
• which does not help in case of transmission errors over wireless links
• which does not really help during handover

• This behaviour results in performance degradation of TCP


• if used together with wireless links or mobile nodes
• cannot change TCP completely
• to support mobile users or wireless links
Classical TCP improvements

• With introduction of WLANs in mid-nineties


• several research projects were started with goal
• to increase TCP’s performance in wireless and mobile environments
• Classical approaches
• Indirect TCP
• Snooping TCP
• Mobile TCP
• Additional optimizations
• Fast retransmit/fast recovery
• Transmission/time-out freezing
• Selective retransmission
• Transaction-oriented TCP
Indirect TCP - 1

• Two competing insights led to development of indirect TCP (I-TCP)


• TCP performs poorly together with wireless links
• TCP within fixed network cannot be changed

• I-TCP segments
• TCP connection into
• fixed part
• wireless part
Indirect TCP - 2

• Example with mobile host


• connected via wireless link
• access point to ‘wired’ internet
• where correspondent host resides
Indirect TCP - 3

• Standard TCP is used between


• fixed computer
• access point

• No computer in internet
• recognizes any changes to TCP

• Instead of mobile host


• access point terminates
• standard TCP connection
• acting as proxy
Indirect TCP - 4

• Access point is now seen as


• mobile host for fixed host
• as fixed host for mobile host

• Between access point and


mobile host
• special TCP is used
• adapted to wireless links

• Changing TCP for


• wireless link is not requirement
Indirect TCP - 5

• Even unchanged TCP


• benefit shorter round trip time
• starting retransmission faster

• Good place for segmenting


• connection between mobile host
• correspondent host is at foreign
agent of mobile IP
Indirect TCP - 6

• Foreign agent controls


• mobility of mobile host
• can also hand over connection
• to next foreign agent
• when mobile host moves on

• Correspondent host in fixed


network does not notice
• wireless link or segmentation of
connection
Indirect TCP - 7

• Foreign agent acts as proxy


• relays all data in both directions

• If correspondent host sends packet


• foreign agent acknowledges packet
• tries to forward packet to mobile host

• If mobile host receives packet


• it acknowledges packet
• this acknowledgement is only used by
foreign agent
Indirect TCP - 8

• If packet is lost on wireless link


• due to transmission error
• correspondent host would not
notice this
• foreign agent tries to retransmit
• this packet locally to maintain
• reliable data transport

• If mobile host sends packet


• foreign agent acknowledges this
packet
• tries to forward it to correspondent
host
Indirect TCP - 9

• If packet is lost on wireless link


• mobile hosts notice this faster
• due to lower round trip time
• can directly retransmit packet
• Packet loss in wired network
• handled by foreign agent

• I-TCP requires several actions


• as soon as handover takes place
Indirect TCP - 10

• After handover
• old proxy must forward buffered
data to new proxy
• because it has already
acknowledged the data

• After registration with new


foreign agent
• this new foreign agent can
inform old one about its location
• to enable packet forwarding
Advantages of Indirect TCP - 1

• I-TCP does not require any changes in TCP protocol


• as used by hosts in fixed network
• other hosts in wireless network
• that do not use this optimization

• All current optimizations for TCP still work between


• foreign agent and correspondent host
Advantages of Indirect TCP - 2

• Due to strict partitioning into two connections


• transmission errors on wireless link
• i.e., lost packets
• cannot propagate into fixed network

• Without partitioning
• retransmission of lost packets would take place
• between mobile host and correspondent host across whole network
• Now only packets in sequence
• without gaps leave foreign agent
Advantages of Indirect TCP - 3

• It is always dangerous to introduce new mechanisms


• into huge network such as internet
• without knowing exactly how they will behave

• New mechanisms are needed to improve TCP performance


• e.g., disabling slow start under certain circumstances
• but with I-TCP only between mobile host and foreign agent

• Different solutions can be tested or used at same time


• without jeopardizing the stability of internet
• Optimizing of these new mechanisms is quite simple
• because they only cover one single hop
Advantages of Indirect TCP - 4

• Optimized TCP could use precise time-outs


• to guarantee retransmission as fast as possible

• Even standard TCP could benefit from short round trip time
• so recovering faster from packet loss

• Delay is much higher in wide area wireless network


• than in wired networks due to FEC and MAC
Advantages of Indirect TCP - 5

• Partitioning into two connections


• allows use of different transport layer protocol
• between foreign agent and mobile host
• or use of compressed headers etc.

• Foreign agent can act as gateway


• to translate between different protocols
Disadvantages of Indirect TCP - 1

• Loss of end-to-end semantics of TCP might cause problems


• if foreign agent partitioning the TCP connection crashes
• If sender receives acknowledgement
• it assumes that receiver got the packet

• Receiving acknowledgement now only means


• that foreign agent received the packet

• Correspondent node does not know anything about partitioning


• so crashing access node may also crash applications
• running on correspondent node
Disadvantages of Indirect TCP - 2

• Increased handover latency may be much more problematic


• all packets sent by correspondent host are buffered by foreign agent
• besides forwarding them to mobile host
• foreign agent removes packet from buffer
• as soon as appropriate acknowledgement arrives

• If mobile host now performs handover to another foreign agent


• it takes while before old foreign agent forward buffered data to new foreign agent

• During this time more packets may arrive


• all these packets have to be forwarded to new foreign agent first
• before it can start forwarding new packets
Disadvantages of Indirect TCP - 3

• Foreign agent must be trusted entity


• because TCP connections end at this point

• If users apply end-to-end encryption


• foreign agent has to be integrated into all security mechanisms
Snooping TCP - 1

• I-TCP is segmentation of single TCP connection


• into two TCP connections
• loses original end-to-end TCP semantic

• Snooping TCP enhancement works transparently


• leaves TCP end-to-end connection intact

• Main function of enhancement is to buffer data


• close to mobile host to perform fast local retransmission
• in case of packet loss
Snooping TCP - 2

• Good place for enhancement of TCP could be


• foreign agent in Mobile IP context
Snooping TCP - 3

• Foreign agent buffers all packets with destination mobile host


• additionally ‘snoops’ packet flow in both directions
• to recognize acknowledgements
Snooping TCP - 4

• Reason for buffering packets toward mobile node is to enable


• foreign agent to perform local retransmission
• in case of packet loss on wireless link
• Foreign agent buffers every packet until it receives acknowledgement
• from mobile host
Snooping TCP - 5

• If foreign agent does not receive acknowledgement from mobile host


• within certain amount of time
• either packet or acknowledgement has been lost
• foreign agent could receive duplicate ACK
• which also shows loss of packet
Snooping TCP - 6

• Foreign agent retransmits packet directly from buffer


• performing much faster retransmission compared to correspondent host
• time out for acknowledgements can be much shorter
• because it reflects only delay of one hop plus processing time
Snooping TCP - 7

• To remain transparent
• foreign agent must not acknowledge data to correspondent host
• Foreign agent can filter duplicate acknowledgements
• to avoid unnecessary retransmissions of data from correspondent host
Snooping TCP - 8

• Foreign agent may discard duplicates of packets


• already retransmitted locally
• acknowledged by mobile host
• this avoids unnecessary traffic on wireless link
Snooping TCP - 9

• Data transfer from mobile host with destination correspondent host


• foreign agent snoops into packet stream
• to detect gaps in sequence numbers of TCP
Snooping TCP - 10

• As soon as foreign agent detects missing packet


• it returns negative acknowledgement (NACK) to mobile host
• mobile host can now retransmit missing packet immediately
• Reordering of packets is done automatically at correspondent host by TCP
Advantages Snooping TCP - 1

• End-to-end TCP semantic is preserved


• No matter at what time foreign agent crashes

• If this is the location of buffering and snooping mechanisms


• neither correspondent host nor mobile host
• have inconsistent view of TCP connection as is possible with I-TCP

• Approach automatically falls back to standard TCP


• if enhancements stop working
Advantages Snooping TCP - 2

• Correspondent host does not need to be changed


• most of enhancements are in foreign agent

• Supporting packet stream from correspondent host to mobile host


• does not even require changes in mobile host
Advantages Snooping TCP - 3

• It does not need handover of state


• as soon as mobile host moves to another foreign agent

• Assume there might still be data in buffer


• not transferred to next foreign agent

• All that happens is time-out at correspondent host


• retransmission of packets
• possibly already to new care-of address
Advantages Snooping TCP - 4

• It does not matter if next foreign agent uses enhancement or not


• If not approach automatically falls back to the standard solution

• This is one of the problems of I-TCP


• since old foreign agent may have already signaled
• correct receipt of data via acknowledgements to the correspondent host
• now has to transfer these packets to mobile host via new foreign agent
Disadvantages Snooping TCP - 1

• Snooping TCP does not isolate behaviour of wireless link


• as well as I-TCP
• it takes some time until foreign agent can successfully retransmit packet
• from its buffer due to problems on wireless link (congestion, interference)

• Although time-out in foreign agent may be much shorter


• than one of the correspondent host
• after a while time-out in correspondent host triggers retransmission
Disadvantages Snooping TCP - 2

• Problems on wireless link are visible for correspondent host


• not fully isolated

• Quality of isolation
• which snooping TCP offers
• strongly depends on quality of wireless link
• time-out values
• further traffic characteristics

• It is problematic that wireless link exhibits


• very high delays compared to wired link
• due to error correction on layer 2
• This is similar to I-TCP
Disadvantages Snooping TCP - 3

• If this is the case


• timers in foreign agent and correspondent host are almost equal
• approach is almost ineffective

• Using negative acknowledgements between


• foreign agent and mobile host assumes
• additional mechanisms on mobile host

• This approach is no longer transparent


• for arbitrary mobile hosts
Disadvantages Snooping TCP - 4

• All efforts for snooping and buffering data may be useless


• if certain encryption schemes are applied end-to-end between
• correspondent host and mobile host

• Using IP encapsulation security payload


• TCP protocol header will be encrypted
• snooping on sequence numbers will no longer work

• Retransmitting data from foreign agent may not work


• because many security schemes prevent replay attacks
• retransmitting data from foreign agent may be misinterpreted as replay
Disadvantages Snooping TCP - 5

• Encrypting end-to-end is the way many applications work


• so it is not clear how this scheme could be used in future

• If encryption is used above transport layer


• snooping TCP can be used
Mobile TCP - 1

• Dropping packets due to handover or higher bit error rates


• is not only phenomenon of wireless links and mobility
• occurrence of lengthy and/or frequent disconnections is another problem
• Quite often mobile users cannot connect at all

• One example is islands of wireless LANs inside buildings


• but no coverage of the whole campus

• TCP sender tries to retransmit data controlled by retransmission timer


• that doubles with each unsuccessful retransmission attempt
• up to maximum of one minute
Mobile TCP - 2

• This means that sender tries to retransmit unacknowledged packet


• every minute and will give up after 12 retransmissions
• No data is successfully transmitted for period of one minute
• Retransmission time-out is still valid and sender has to wait
• Sender also goes into slow-start because it assumes congestion

• Proxy has to buffer more and more data


• so longer the period of disconnection
• more buffer is needed

• If handover follows disconnection even more


• state has to be transferred to new proxy
Mobile TCP - 3

• Snooping approach also suffers from being disconnected


• Mobile will not be able to send ACKs so
• snooping cannot help in this situation

• M-TCP approach has same goals as I-TCP and snooping TCP:


• to prevent sender window from shrinking
• if bit errors or disconnection
• but not congestion cause current problems

• M-TCP wants to improve overall throughput


• to lower the delay
• to maintain end-to-end semantics of TCP
• to provide more efficient handover
Mobile TCP - 4

• M-TCP is especially adapted to problems


• arising from lengthy or frequent disconnections

• M-TCP splits TCP connection into two parts as I-TCP does


• unmodified TCP is used on standard host-supervisory host (SH) connection
• while optimized TCP is used on SH-MH connection

• Supervisory host is responsible for exchanging data between


• both parts similar to proxy in I-TCP
• M-TCP approach assumes relatively low bit error rate on wireless link
Mobile TCP - 5

• It does not perform caching/retransmission of data via SH


• If packet is lost on wireless link
• it has to be retransmitted by original sender
• This maintains TCP end-to-end semantics

• SH monitors all packets sent to MH and ACKs returned from MH


• If SH does not receive an ACK for some time
• it assumes that MH is disconnected
• It then chokes sender by setting sender’s window size to 0
• Setting window size to 0 forces sender to go into persistent mode
• i.e., state of sender will not change no matter how long receiver is disconnected
Mobile TCP - 6

• This means that sender will not try to retransmit data


• As soon as the SH detects connectivity again
• it reopens window of the sender to old value
• Sender can continue sending at full speed
• This mechanism does not require changes to sender’s TCP

• Wireless side uses adapted TCP


• that can recover from packet loss much faster
• This modified TCP does not use slow start
• M-TCP needs bandwidth manager to implement fair sharing over wireless link
Advantages of Mobile TCP

• It maintains TCP end-to-end semantics


• SH does not send any ACK itself
• but forwards ACKs from MH

• If MH is disconnected
• it avoids useless retransmissions
• slow starts or breaking connections
• by simply shrinking sender’s window to 0

• Since it does not buffer data in SH as I-TCP does


• it is not necessary to forward buffers to SH
• Lost packets will be automatically retransmitted to SH
Disadvantages of Mobile TCP

• Lack of buffers and changing TCP on wireless part has disadvantages:


• As SH does not act as proxy as in I-TCP
• packet loss on wireless link due to bit errors is propagated to sender
• M-TCP assumes low bit error rates
• which is not always valid assumption
• Modified TCP on wireless link not only requires modifications to MH protocol
• but also new network elements like bandwidth manager
Fast retransmit/fast recovery - 1

• Moving to new foreign agent can cause packet loss or time out
• at mobile hosts or corresponding hosts

• TCP concludes congestion and goes into slow start


• although there is no congestion

• Mechanisms of fast recovery/fast retransmit can use


• after receiving duplicate acknowledgements
• thus concluding packet loss without congestion
• as soon as mobile host registers at new foreign agent using mobile IP
• it starts sending duplicated acknowledgements to correspondent hosts
Fast retransmit/fast recovery - 2

• Proposal is to send three duplicates


• This forces corresponding host to go into fast retransmit mode
• not to start slow start
• correspondent host continues to send with same rate it did
• before the mobile host moved to another foreign agent

• As mobile host may also go into slow start


• after moving to new foreign agent
• this approach additionally puts mobile host into fast retransmit
Fast retransmit/fast recovery - 3

• Mobile host retransmits all unacknowledged packets


• using current congestion window size without going into slow start
• Advantage of this approach is its simplicity

• Only minor changes in mobile host’s software


• result in performance increase
• No foreign agent or correspondent host has to be changed

• Main disadvantage of this scheme


• insufficient isolation of packet losses
Fast retransmit/fast recovery - 4

• Forcing fast retransmission increases efficiency


• but retransmitted packets still have to cross whole network between
• correspondent host and mobile host

• Approach focuses on loss due to handover:


• packet loss due to problems on wireless link is not considered

• This approach requires more cooperation between


• mobile IP and TCP layer
• making it harder to change one without influencing other
Transmission/time-out freezing - 1

• While approaches presented so far can handle


• short interruptions of the connection
• either due to handover or transmission errors on wireless link

• Some were designed for longer interruptions of transmission


• Examples are use of mobile hosts in car driving into tunnel
• which loses its connection to satellite
• user moving into cell with no capacity left over
• mobile phone system will interrupt the connection

• Reaction of TCP
• even with enhancements of above
• would be disconnection after time out
Transmission/time-out freezing - 2

• MAC layer has already noticed connection problems


• before the connection is actually interrupted from TCP point of view
• MAC layer knows real reason for interruption
• does not assume congestion as TCP would

• MAC layer can inform TCP layer of upcoming loss of connection


• current interruption is not caused by congestion
• TCP can now stop sending
• ‘freezes’ current state of its congestion window and further timers
• If MAC layer notices upcoming interruption early enough
• both mobile and correspondent host can be informed
Transmission/time-out freezing - 3

• With fast interruption of wireless link


• additional mechanisms in access point are needed
• to inform correspondent host of reason for interruption

• Otherwise correspondent host goes into slow start


• assuming congestion and finally breaks the connection

• As soon as MAC layer detects connectivity again


• it signals TCP that it can resume operation at exactly same point
• where it had been forced to stop

• For TCP time does not advance


• so no timers expire
Transmission/time-out freezing - 4

• Advantage of this approach is it offers way to resume TCP connections


• even after longer interruptions of connection

• It is independent of any other TCP mechanism


• such as acknowledgements or sequence numbers
• so it can be used together with encrypted data

• This scheme has some severe disadvantages


• Not only does software on mobile host have to be changed
• to be more effective correspondent host cannot remain unchanged
Transmission/time-out freezing - 5

• All mechanisms rely on capability of MAC layer


• to detect future interruptions

• Freezing state of TCP does not help


• in case of some encryption schemes
• that use time-dependent random numbers

• These schemes need resynchronization


• after interruption
Selective retransmission - 1

• Very useful extension of TCP is use of selective retransmission


• TCP acknowledgements are cumulative
• they acknowledge in-order receipt of packets up to certain packet

• If single packet is lost


• sender has to retransmit everything starting from lost packet
• go-back-n retransmission

• This obviously wastes bandwidth


• not just in case of mobile network
• but for any network
• TCP can indirectly request selective retransmission of packets
Selective retransmission - 2

• Receiver can acknowledge single packet


• Sender can now determine precisely
• which packet is needed and can retransmit it

• Advantage of this approach:


• sender retransmits only lost packets

• This lowers bandwidth requirements


• is extremely helpful in slow wireless links
• Gain in efficiency is not restricted to wireless links and mobile environments
• Using selective retransmission is also beneficial in all other networks
Selective retransmission - 3

• Minor disadvantage of more complex software on receiver side


• because now more buffer is necessary to resequence data

• Memory sizes and CPU performance permanently increase


• bandwidth of air interface remains almost same

• Higher complexity is no real disadvantage any longer


• as it was in early days of TCP
Transaction-oriented TCP - 1

• Assume application running on mobile host


• that sends short request to server from time to time
• which responds with short message
• If application requires reliable transport of packets
• it may use TCP
• Using TCP requires several packets over wireless link
• TCP uses three-way handshake to establish the connection
• At least one additional packet is usually needed for transmission of request
• requires three more packets to close the connection via a three-way handshake
• Assuming connections with lot of traffic or with long duration
• this overhead is minimal
Transaction-oriented TCP - 2

• Figure shows example for overhead introduced


• by using TCP over GPRS in web scenario
Transaction-oriented TCP - 3

• Web services are based on HTTP


• which requires reliable transport system
• In the internet
• TCP is used for this purpose
• Before a HTTP request can be transmitted
• TCP connection has to be established
• This already requires three messages
• If GPRS is used as wide area transport system
• one-way delays of 500 ms and more are quite
common
Transaction-oriented TCP - 4

• Setup of TCP connection already takes


• far more than second

• This led to
• development of transaction-oriented TCP (T/TCP)

• T/TCP can combine packets for


• connection establishment and connection release
• with user data packets

• This can reduce number of packets down to


• two instead of seven
Transaction-oriented TCP - 5

• Advantage for certain applications is


• reduction in overhead
• which standard TCP has for connection setup
• connection release

• T/TCP is not original TCP anymore


• so it requires changes in mobile host
• all correspondent hosts
• which is major disadvantage

• This solution no longer hides mobility


Classical enhancements to TCP for mobility

• table
Thank you

You might also like