TCP for Wireless Networks

Size: px
Start display at page:

Download "TCP for Wireless Networks"

Transcription

1 TCP for Wireless Networks Arathi Shamakumar,Ravi Kiran Kundeti,Srinivasan Krishnamurthy, and Srinivasa Rao Segu {arathi, kundeti, ksrini, Department of Computer Science University of Texas at Dallas November 2001 Abstract: TCP is a reliable end-to-end transport protocol tuned to perform well in traditional wired networks where the packet losses are primarily due to congestion. However, networks with wireless links show a marked increase in losses because of higher bit error rates (BER) and handoffs. If TCP is applied to such networks without any modification, it interprets these transmission losses as congestion losses and invokes congestion control mechanisms that unnecessarily decrease the network throughput. In this paper, we have discussed various approaches for improved TCP performance over networks with wireless links. 1. INTRODUCTION Mobile computing has seen explosive growth in recent years. In an era where mobility is the catchword, users need to be able to access electronic data and services anywhere, anytime using portable and affordable computing devices. If recent activity in mobile computing and wireless networks is any indication, mobile computers and their wireless communication links will be an integral part of future internetworks. Unfortunately, low bandwidths, high bit-error rates (BER), and frequent disconnections characterize these wireless links. These characteristics are highly divergent from those observed on wired networks. The problem is further compounded by packet losses and long delays in communication introduced into wireless networks due to the mobility of users and the resultant need for hand-offs. Hence, it is essential that protocols that cater to the specific characteristics of wireless communication be developed. There are two approaches to solving the problem-either develop a protocol from scratch that takes care of the above issues or modify existing protocols so that they provide a scalable solution to the problem. Existing Transport Protocols like TCP [1, 2, 3] are well tuned to the traditional networks made up of wired links and fixed hosts. TCP provides reliable end-to-end delivery of packets between hosts in packet-switched computer communication networks [1]. It provides reliability by maintaining a running average of estimated round trip delay and mean deviation, and re-transmitting packets that are either not delivered within a certain timeout interval - computed as the sum of smoothed round trip delay and four times the mean deviation - or upon arrival of duplicate acknowledgements [1, 2]. Because of the relatively low error rates (of the order of for optical networks) on wired network, TCP correctly attributes these losses to congestion in the network. TCP reacts to packet losses by dropping the transmission (congestion) window at the sender and initiating congestion control mechanisms like slow start that reduce the load on the network [1, 2]. In a network comprising wireless links characterized by high bit-error rates, intermittent connectivity and handoff related losses, TCP reacts to packet losses by dropping its window size, and initiating congestion control or avoidance mechanisms. This is because it has no means of distinguishing between transmission related losses and losses due to congestion. Such a TCP reaction results in an avoidable reduction in the link bandwidth utilization and consequently, a significant degradation in performance in the form of poor throughput and high interactive delays [23]. Various schemes have been proposed to improve the performance of TCP over wireless links. In this paper, we have discussed approaches that address the issue of extending TCP to wireless links. Section 2 gives a brief overview of TCP and its mechanisms to familiarize the readers of the issues being dealt with by the proposed extensions to TCP. Readers familiar with concepts of TCP may skip this ` 1

2 section without any loss of continuity. In Section 3, we have presented an overview of the splitconnection [6, 7, 8, 9, 11] approaches to solving the problem and have discussed their merits and drawbacks. Sections 4 and 5 talk about the TCP-aware [12, 13, 14, 15] and TCP-unaware [16] approaches respectively. Section 6 summarizes various Explicit Notification mechanisms [18, 5, 19]. In Sections 7 and 8, we discuss generic approaches that distinguish between congestion losses and transmission losses by using two connections [20] and receiver-based heuristics [21] respectively. Section 9 handles a link-layer mechanism [22] to improving TCP performance. We then move on to schemes that exclusively deal with mobility and hand-off related losses in Section 10 [10, 23, 24, 25, 26, 27]. Section 11 discusses Mobile Ad Hoc Networks [28, 29, 30], their unique characteristics and approaches that have been developed to address wireless related losses in these networks. We conclude our paper with a brief summary and comparison of the different schemes in Section A BRIEF DISCUSSION ON TCP Transport Control Protocol (TCP) [1] is a transport protocol that guarantees reliable ordered delivery of data packets over wired networks. It achieves reliability by means of retransmissions if necessary. It is an end-to-end protocol in the sense that acknowledgements for data are sent only after data has reached the receiver. The receipt of an acknowledgement confirms to the sender, delivery of corresponding data packet at the receiver. TCP employs cumulative acknowledgements that acknowledge receipt of all packets that were sent before the present data packet. A sequence number uniquely identifies each data packet. TCP maintains two windows viz., Congestion window and Transmission window for each connection, at all times. Transmission window s lower edge indicates the highest numbered segment acknowledged by the destination. Congestion window indicates the maximum number of segments that the source can transmit without receiving any acknowledgements from the receiver. TCP uses a sliding window protocol to implement flow control. The window size is determined as the minimum of the receiver s advertised window (available buffer size at the receiver) and congestion window (determined by the sender on the basis of feedback from the network). TCP uses duplicate acknowledgements (dupacks) to detect data packet losses. A dupack is generated whenever an out-of-order segment (identified on the basis of sequence numbers) arrives at the receiver. An out-of-order delivery usually implies a packet loss. TCP may also use a retransmission timeout (RTO) value-dynamically computed based on estimated round-trip time (RTT) and its mean deviation- to detect a packet loss. Large variations in RTT increase the deviation leading to larger RTO. As a result, sender may take too long to timeout. To initiate early retransmission, TCP uses what is known as fast retransmission mechanism. If the sender receives three dupacks consecutively, it assumes packet loss and undertakes retransmission. There are basically two approaches to congestion avoidance and control in TCP. In the slow start mechanism, the initial window size (cwnd) is set to 1 MSS (maximum segment size) and is incremented by 1 MSS on each new acknowledgement. After cwnd reaches a preset threshold value (ssthresh), it is increased linearly. On timeout, congestion window is reduced to 1 MSS and slow start mechanism is started. In the alternate approach, fast retransmit is followed by fast recovery wherein the cwnd is reduced to half the present window size and is increased linearly from then on. This avoids loss in throughput due to dramatic reduction of window size in the case of slow start. Later modifications to TCP [3] have suggested the use of Selective Acknowledgements (SACK) to further improve error recovery. Here, apart from informing the sender of packet loss, SACK in the form of a bitmap specifies the identity of the exact packets lost. This helps in recovery of multiple packet losses per RTT. 3. SPLIT-CONNECTION APPROACHES The fundamental idea behind split-connection approaches is as follows: Whenever an interaction between two hosts on a network involves communication over radically different media, we split such an ` 2

3 interaction into two distinct interactions-one for each kind of communication medium [7]. Split- Connection approaches split each TCP connection between fixed sender and mobile destination into two connections at the base station that connects the mobile host to the network. The first connection is between the wired source and the base station while the second is the connection between the base station and the wireless destination. The two connections may both use TCP or specialized protocols suitable for wireless networks may be used over the wireless links. Even if TCP is used over both connections, flow/error control mechanisms, packet sizes and timeouts may be different for each connection. Consequently, there are various flavors of split-connection approach to extending TCP to wireless networks and they are discussed in the following sections I-TCP/Indirect-TCP This is the classical split-connection approach proposed by Bakre et al [6]. In this approach, standard TCP is used over the wireless link too. The idea is to shield the TCP sender from the wireless link by separating loss recovery in the wireless link from that across wireline network. The base station that connects the wireless host to the network is referred to as the Mobile Support Router (MSR). A transport layer connection between a Wireless Host (WH) and Fixed Host (FH) is established as two separate connections - one between wireless medium and another over fixed network with the current MSR acting as the intermediate point. If the WH moves to another cell during the lifetime of the TCP connection, the old MSR will handover the responsibility of maintaining connectivity of the MH with the network to the new MSR responsible for that cell. The FH is completely oblivious to this indirection and is unaware of any switching that might take place among the MSRs. [7] discusses the I-TCP components, connection set-up and the signaling mechanisms used for hand-off etc. Figure-1 shows the connection set-up process and hand-off process for an I-TCP connection. WH Move WH Wireless TCP MSR-1 I-TCP handoff Standard TCP MSR-2 <mhaddr, mhport, msr1addr, msr1port> <mhaddr, mhport, msr2addr, msr2port> <msr1addr, msr1port, mhaddr, mhport> FH <msr2addr, msr2port, mhaddr, mhport> <mhaddr, mhport, fhaddr, fhport> Fig.1 <mhaddr, mhport, fhaddr, fhport> ` 3

4 When the wireless host (WH) wishes to establish a connection with a fixed host (FH), it sends a request to its Mobile Station Router (MSR-1). MSR-1 establishes a TCP connection with FH while communicating with the WH on a separate connection. If the WH moves to a different cell with a base station MSR-2, the state information is transferred from MSR-1 to MSR-2. The end-points remain fixed and hence the redirection is transparent to the fixed host Selective Repeat Protocol TCP by nature is not well tuned for lossy links, the TCP sender at the base station can time-out often and as a result, stalling the original fixed sender. So, Yavatkar et al [8] have proposed and compared the use of an alternative specialized transport protocol in place of TCP over the wireless link. The Selective Repeat Protocol (SRP) employed over the wireless hop uses its own flow and error control mechanisms designed and optimized specifically to tackle the lossy and erratic delay characteristics of the wireless link. The intermediate agent at the base station retains the transparency of the connection by hiding the details of the SRP from the fixed host and provides the same application interface as TCP. In [31], the authors have reported that the use of such a protocol is indeed advantageous compared to using TCP over the wireless link too. The protocol attempts to use smaller MTU over the low bandwidth wireless links. The authors of [8] have identified intermittent connectivity over a wireless link as transient errors over transport level connection that the protocol software must protect applications from. Thus, a new session layer protocol called Mobile Host protocol (MHP) that explicitly includes mechanisms for recovering from errors over the wireless link, in keeping with the ISO reference model, which assigns the responsibility of recovery and re-synchronization in data transfer to the session layer has been developed. Fig. 2 illustrates the protocol hierarchy assumed by the authors at the base station and mobile host [8]. Socket MHP (Session Layer) TCP/UDP IP Fig. 2 The MHP at the mobile host (MH) intercepts any connection request and requests a transport level connection with its peer at the current base station (BS). The MHP peer at the BS sets up a surrogate MHP agent on behalf of the requested connection, which in turn establishes a TCP connection with the fixed host (FH). The surrogate agent acts as a relay for the traffic between the two hosts in both directions. The connection establishment for a connection request from stationary host to mobile host or between two mobile hosts follows the same pattern. During data transfer, the MHP at the MH sends data in small segments to match the smaller Maximum Transmission Unit (MTU) over the wireless link. The surrogate MHP agent at the BS buffers these data packets and assembles them into larger TCP segments before forwarding them on the wired network. Similarly, when data has to be transferred to the MH, the surrogate MHP agent at the base station breaks the received TCP segment into smaller data segments and then forwards them to the MH. The MHP layer also maintains state information on segments in transit to and from the wireless link, and other connection parameters to recover from hand-off related losses. The MHP employs the specialized SRP for swift error recovery when packet losses are experienced over the wireless link. SRP uses a selective repeat algorithm based on a Selective Acknowledgment (SACK) strategy. When an out of sequence segment is received at the receiver, it returns a SACK that specifies the missing sequence using a bitmap, the sequence number of latest ` 4

5 segment received, and the last segment received in sequence. The sender retransmits all the missing segments specified in the SACK when it receives the SACK. Hence, multiple segment losses in one round trip time (RTT) can be recovered using this approach, which naturally increases throughput. Hand-offs are also handled by the two surrogate MHP agents - the agent at the current base station and the agent at the base station of the new cell the mobile has moved into. Any data segments lost during hand-offs are recovered by transport layer re-transmissions Mobile-TCP: Mobile-TCP [11] aims at reducing the computing and communicating power needed for the operation of the mobile host. The connection is split into the connection between the mobile host (the source) and the Mobile-Gateway (local fixed host to which the src is connected) and the connection between the Mobile-Gateway and the corresponding host (the destination). This protocol differs from I- TCP in that it uses an asymmetric transport layer protocol on the wireless link to reduce communication and computational complexities. The asymmetric design is used so that codes of different complexities can be executed on either side of the link. We can ensure that the more powerful Mobile-Gateway handles the more intense work while the mobile host handles the less intense work. Note: M-TCP refers to Mobile-TCP Fig. 3 The protocol stack for Mobile-TCP is shown in Fig. 3. The Mobile-Gateway does the function of the MSR in I-TCP [6]. The Mobile-Gateway maintains a one hop wireless Mobile-TCP connection with the mobile host and a TCP connection with the corresponding host. As can be seen from the diagram, Mobile-TCP is used only for one hop. The Mobile-Gateway has a regular TCP connection with the corresponding host. The Mobile IP layer handles the routing on the link between the Mobile-Gateway and the corresponding host. In normal TCP, a host can initiate connection as well as wait for connection from other hosts. In Mobile-TCP these features are handled by the Mobile-Gateway. When a host wants to start an active ` 5

6 conversation, it informs the Mobile-Gateway about the identity of the destination and the connection parameters. The Mobile Gateway then sets up the connection with the destination. At the same time, when a host is ready to receive calls it informs the Mobile-Gateway. This allows the Mobile-Gateway to accept or reject connection requests for the host without asking the host again. Mobile-TCP employs a technique similar to the Van Jacobson s header compression [4] to reduce the amount of wireless transmission. During connection establishment stage, two Connection ID s (CID) are assigned for communication over the wireless links, one in each direction. The mobile host communicates with the Mobile-Gateway using the CID MH, whereas the Mobile-Gateway uses CID MG to communicate with the mobile host. The CID s contain the source and destinations IP addresses and port numbers. CID s are used to reduce the overhead of communicating the whole TCP header each time over the wireless link. Once the connection has been setup, the mobile host communicates by sending the CID along with the payload. The Mobile-Gateway translates the CID into the corresponding TCP header based on the information it cached during the connection establishment phase. In TCP a timer is set each time a packet is sent. Once the timeout for the acknowledgment (ACK) expires, over, the source retransmits the packet. As the number of packets increase the number of timers created also increase, resulting in heavy load on the battery of the source. To overcome this the Mobile-TCP uses Go-back-N and Selective Reject schemes. The transmission from the Mobile-Gateway to the mobile host uses Go-Back-N scheme. The mobile host upon reception of a packet sends an ACK to the Mobile-Gateway. The Mobile-Gateway upon reception of the ACK deletes the packet from the buffer. When a packet is lost, the mobile host sends a retransmission request with the sequence number of the lost packet. Upon reception of this lost request the Mobile-Gateway starts retransmission of packets staring from the sequence number requested. Generally, loss of packets at the mobile host occurs due to fading of the signal. Consequently the loss is bursty with loss of continuous sequence of packets. By using the Go-Back-N we ensure that the mobile host need not request retransmission for each lost packet in the continuous sequence. Instead, it only needs to request for the first packet in the sequence. Although this means wastage of bandwidth, as all the packets are retransmitted even if they reach successfully, this method is preferred as it reduces the transmission load on the mobile host, thereby reducing the power consumed at the mobile host. The transmission from the mobile host to the Mobile-Gateway uses the Selective Reject scheme. Upon receipt of a packet, the Mobile-Gateway sends an ACK to the mobile host. When a packet is lost the Mobile-Gateway requests for the retransmission of that packet alone. The Selective Reject scheme helps in reducing the amount of transmission to be made by the mobile host thereby reducing the power consumed. The error control at the mobile host is implemented using the standard CRC-16 (Cyclic Redundancy Check) polynomial calculation, which only detects an error. Using this technique, the processing delay at the mobile host decreases. The error control at the Mobile-Gateway has a complicated procedure, which can identify the location of the error bit and can correct it. This helps in reducing the number of retransmission requests for the mobile host. A Mobile-TCP daemon is setup at every Mobile-Gateway. When a handoff occurs at the mobile host, the lower layers of the Mobile-Gateway inform the daemon about the hand-off. The daemon then sets up a normal TCP connection with the new Mobile-Gateway and sends the information about all the Mobile-TCP connections of the mobile host to the new Mobile-Gateway. The connections are then deleted from the old Gateway. The connection ID used by the old gateway may already be in use in the new Mobile-Gateway, so the Mobile-Gateway sends control packets to set the new CID s for each connection of the mobile host. This completes the handoff in Mobile-TCP. Mobile-TCP, even though based on I-TCP, maintains end-to-end semantics of TCP by delaying the acknowledgment sent by the Mobile-Gateway, till it receives an acknowledgment from the corresponding host Mobile-End Transport Protocol ` 6

7 Wireless links have limited bandwidth and wireless hosts are impaired by limited resources such as memory, disk space, and power supply. Hence, employing TCP/IP with its large header and overheads for wireless links further stretches these limited resources. Also, losses over wireless links tend to be bursty and frequent because of their vulnerability to interference and host mobility. The TCP sender assumes these data losses are due to congestion in the network and backs off resulting in performance degradation. To overcome these problems, Wang et al [9] have proposed a split-connection approach called Mobile-End Transport Protocol (METP). The protocol replaces TCP/IP over wireless link with a simpler protocol that uses smaller headers provided that the wireless link happens to be the last hop in the connection. Thus, the functionalities needed for communication with an Internet host are shifted to the base station from the wireless host. The protocol tries to take advantage of the base station support and the fact that functions of mobile devices are limited. Shifting the majority of the network protocols to the base station has the advantage of delegating some work of the wireless host to the more powerful base station and hiding the communication between the base station and mobile host to the external network. The protocol also exploits link-layer acknowledgements and retransmissions for quick recovery from losses over the wireless link, which distinguishes it from other split-connection approaches like I-TCP, SRP, and Mobile-TCP. Scalability may be an issue to consider when shifting the functionalities from the mobile hosts to the base station as the base station may be overwhelmed if it has to serve a large number of mobile hosts with multiple network connections. However, the authors [9] have argued that such an eventuality is highly unlikely because of the observed pattern of usage of mobile computing resources. METP eliminates TCP and IP layers from the mobile hosts and therefore, the TCP/IP headers from the packets transmitted over the wireless link. The mobile host only has a simple multiplexing and demultiplexing mechanism. The TCP/IP header in the data packets is replaced with demultiplex keys (port numbers) and IP addresses of the source and destination. Under this scheme, the base station handles all Internet traffic. To an external machine, the communication between the base station and mobile host resembles an interaction between an application process and transport layer protocol. METP does away with the IP layer in the wireless link by taking advantage of the fact that the hop between the base station and mobile host is the first or last in the connection. Thus, the METP at the base station accepts an IP packet destined for the mobile hosts as if it were meant for itself, strips its IP header, and delivers it to the higher layer. The header check sum is replaced by the link-layer Cyclic Redundancy Check (CRC) because there is only one hop between the mobile host and base station. The METP at the base station handles any TCP connection involving the mobile host. The base station uses send buffer to temporarily store packets sent by the mobile host, before they are forwarded by METP to the wired network. Similarly, data packets meant for the mobile host are received at the base station, stored in the receive buffer, and then forwarded to the mobile host. An acknowledgment is sent to the fixed sender as soon as data arrives in the receive buffer, which is not freed until the data it contains is sent to the receiver. Any problems that arise in the wireless link are intimated to the fixed sender indirectly. If data packets are not sent to the mobile host due to some reason (say, a temporary link failure), free receiving space in the receive buffer at the base station decreases and the allowed window at the sender shrinks consequently. When the link comes back, the sender window will soon jump to its normal size. In a way, the mobile host now resides in the base station, and migrates from base station to base station during hand-offs. As a result, the mobile host becomes more dependent on the base station and any failure in the base station will adversely affect the status of the mobile host as seen from the external world. So, appropriate failure recovery mechanisms have to be set forth for the base stations. Retransmission mechanisms at the link level use CSMA/CA with priority acknowledgements. If the CRC frame of a received packet is found to be correct, the receiver immediately sends an acknowledgment. If no acknowledgment is received within a time-out period, the sender retransmits the packet. The upper layer is informed accordingly. This mechanism also ensures reliable delivery of the data packets. To avoid packet losses due to buffer overflow at the receiver, the receiver sends periodic coarse acknowledgements that intimate the sender of the available buffer space. ` 7

8 The header used for the wireless link only contains the source and destination port numbers and IP addresses which reduces its size to 12 bytes from the standard 40 bytes for the TCP/IP header. Using various header compression techniques may further reduce the header size. During handoffs, all information pertaining to the TCP connections established on behalf of the mobile hosts, current sending and receiving windows, the data in the send and receive buffers, etc. are handed over to the new base station. The new base station buffers any packets it receives for the mobile host before the hand-off process is completed. The fixed host is transparent to the hand-off process. The authors [9] believe that the hand-off latencies that may arise because of the shift in responsibility to the base station will be outweighed by the performance improvements especially for a system with wellconnected base stations and few connections on a mobile at any given time. Applications that use TCP are compatible with METP and need not be modified because the socket interface between the application and system is retained in METP and hence, provides an illusion to the application that it is talking to a traditional TCP/IP stack. Advantages and Disadvantages of split-connection approaches: The advantage of split-connection approaches is that they separate the flow control and congestion control functionality on the wireless link from that on fixed network, which is extremely useful because of their vastly different bandwidth and error characteristics. Furthermore, the indirection allows the base station to manage much of the communication overhead thus reducing the workload on the wireless host. This approach also allows the use of varying but optimal Maximum Transmission Units (MTU) over both the wired and wireless networks. Indirection at the base station helps in faster reaction to mobility and wireless related events as opposed to a non-split approach. A separate transport protocol for wireless link can support notification of events like disconnections and available bandwidth to the higher layers, which may be fruitfully used by link-aware and location-aware mobile applications. No modifications are needed at the fixed hosts, as indirect protocols are backward compatible with existing wired networks. These approaches also provide a measure of reliability to the wireless link for applications that prefer to use unreliable transport over fixed network. In general, split-connection approaches violate end-to-end semantics of TCP acknowledgements. An acknowledgment may be delivered to the sender even before the data actually reaches the destination. This might not be a problem for applications that do not rely on TCP to provide end-to-end semantics. For example, ftp uses application layer acknowledgements in addition to the end-to-end acknowledgements provided by TCP. However, failure of the base station will lead to the disruption of an I-TCP connection while a normal end-to-end TCP connection would survive. So, I-TCP might be better suited for applications like ftp and mosaic that allow user or higher layer protocol to retry and re-establish a connection in case of a base station failure, which is expected to be rare in the first place [7]. In addition, the packets have to incur the overhead of going through the TCP protocol stack twice at the base station as against the zero times for a non-split connection. Split-connection approaches also suffer from other drawbacks like high latency involved in transfer of state information during hand-offs, need for large buffer size at the base station particularly if the wireless link is slower than the wired network, and unnecessary reduction in the congestion window at the base station (BS) for the wireless link even for non-congestion errors. Further, the copying of data from the FH-BS socket buffer to BS-WH socket buffer tends to increase end-to-end latency. 4. TCP AWARE LINK LAYER As the name suggests, the following schemes address the issue of improving TCP performnce over wireless links by making the link layer aware of the overlying TCP Snoop Protocol ` 8

9 The primary motivation behind this protocol was to effectively use TCP for wireless links without sacrificing its end-to-end semantics and with minimum modifications to the existing TCP implementations. The snoop protocol [12, 13, 14] makes modifications only to the routing code at the base stations. The base station routing code is modified by the addition of a module, called the snoop agent. The agent monitors communication across the connection in either direction and caches packets that have not been acknowledged by the receiver. A packet loss is detected by the arrival of a small number of duplicate acknowledgements (dupacks) from the receiver or by local timeout at the base station. The snoop agent retransmits the lost packet if it is available in the cache and hides the loss from the sender by not propagating the duplicate acknowledgements (dupacks) to the fixed host. In this manner, temporary disconnections of the mobile host (MH) and transient states of low communication quality over the wireless link are hidden from the fixed host (FH). The snoop module is composed of two linked procedures, snoop_data() and snoop_ack(). Snoop_data() processes and caches packets meant for the MH while snoop_data() processes the acknowledgements coming from the MH and initiates local retransmissions at the base station. The algorithms run by these procedures is shown schematically in Fig. 4 and Fig. 5. Packet arrives ACK arrives Sender retransmission New packet? No Forward packet Reset local retransmit counter New ACK? Yes Free buffers Update RTT estimate Propagate ACK to sender Yes No In sequence No Mark as congestion loss Forward packet Duplicate ACK? No Common case Discard Yes Congestion loss Yes Spurious ACK Cache Packet Forward to mobile First One? No Yes Retransmit lost packet with high priority Common case Fig. 4 Flowchart for snoop_data() Next packet lost Discard Later dupacks for lost packet Fig.5 Flowchart for snoop_ack() Snoop_data() is responsible for the packets arriving from the fixed host (FH). TCP uses sequence numbers to uniquely identify TCP packets. The snoop module at the base station keeps track of the last sequence number seen for the connection. If a new packet arrives in the normal TCP sequence, it adds the packet to the snoop cache and forwards the packet to the mobile. One packet per transmission window is time-stamped to facilitate RTT estimation. If an already cached packet arrives out-of-sequence, different ` 9

10 actions are taken based on the sequence number value. If the sequence number is found to be greater than the last seen acknowledgment, it is likely that the packet has not been received by the receiver and hence, is forwarded. On the other hand, if the sequence number is lesser than the last seen acknowledgment, it probably means that the original ACK with the same sequence number was lost in transit. In order to bring the sender to the current state, the snoop sends an ACK acknowledging the last packet seen by it. If an out-of-sequence that has not been cached earlier arrives, it implies that either the packet was lost in the wired network due to congestion or has arrived out of order. This packet is forwarded to the MH and marked as having been retransmitted by the sender. Snoop_ack() handles the acknowledgements (ACKs) sent by the MH. When a new ACK arrives, all acknowledged packets in the snoop cache are purged and the RTT estimate is also updated. The ACK is forwarded to the FH. If the received ACK is less than the last seen ACK, it is considered to be spurious and discarded by the snoop module. If the received ACK is a duplicate ACK (dupack), the snoop checks if the packet is available in the cache. If it is not available in the cache and has been marked as having been retransmitted by the sender, the dupack is forwarded to the FH, which initiates congestion control mechanisms if necessary. If the packet is available in the snoop cache, the packet is retransmitted with higher priority. The snoop module estimates the number of dupacks it can receive for a given packet by counting the number of packets that were transmitted after the first packet loss. The dupacks that arrive later and are within this count value are discarded. Retransmission of lost packets at a higher priority ensures that they reach the MH sooner and hence reduce the number of dupacks generated. Snoop also performs retransmissions based on timeouts. This caching scheme on its own cannot be very effective in improving TCP performance over wireless links because the bulk of the packet losses are likely to be from the MH to the base station (BS) and there is no way for the mobile to determine if the packet was lost in the wireless link or elsewhere in the network owing to congestion. Hence, the authors [13] have suggested a slight modification to the TCP code at the MH. The base station determines what packets were lost in a transmitted window and sends negative acknowledgements (NACKs) to the MH for these packets. NACKs are encoded as bit vectors to ensure that they do not overload the sparse wireless bandwidth. The MH uses these NACKs to selectively retransmit lost packets. The idea of using NACKs is based on the Selective Acknowledgment (SACK) scheme suggested for improving error recovery in TCP. The authors have discussed strategies to handle mobility related losses in [14]. In this scheme, hand-offs are mobile initiated and occur when the MH discovers a BS with a stronger signal than the present one. Based on the signal strength measurements, the MH determines which BS has to forward packets while the other just buffers the packets. This smooth transition of control is achieved by the involvement of the mobile host s Home Agent (HA), which routes the packets to the correct BS. When the hand-off is completed, the new BS begins forwarding packets to the MH after synchronizing its buffer. The advance routing of packets minimizes the actual duration and amount of data loss during hand-offs. However, this kind of hand-off requires that the base stations engage in some sort of transfer of state information so that continuity of the connection is maintained. This scheme achieves this by allowing mirroring of state information at the new BS while hand-off is in progress. Any data packet losses due to the non-uniformity of buffering action at the two base stations is not very significant and can be recovered quickly. The primary advantage of snoop protocol is that it retains end-to-end semantics of TCP while achieving a very high throughput. The snoop protocol is closely coupled to TCP, and hence, does not perform redundant retransmissions, which might be the case with link-level mechanisms like those discussed in [5]. Further, fast retransmits are not triggered at the sender despite out-of-order link layer delivery. Snoop protocol also allows local recovery from wireless losses keeping the fixed host unaware of the same. Snoop protocol suffers from the disadvantage that the link layer at the base station needs to be TCP-aware for proper implementation. The snoop approach may not completely shield the sender from wireless losses. Snoop protocol cannot be used if the data packets are encrypted or if the TCP data and TCP acknowledgements follow different paths (i.e.) they do not go through the base station. ` 10

11 4.2. WTCP: Split-connection approaches [6, 7, 8, 9, 11] in general do not retain the end-to-end semantics of TCP even though they shield the fixed host from the losses over wireless links. M-TCP [24] follows a completely different set of semantics. Approaches like Fast Retransmits [23] require modification to the TCP code at the sender or mobile host. WTCP [15] is a transmission control protocol, which maintains the end-to-end semantics of TCP without needing modifications in the TCP code at the hosts. The only modification that is needed is done at the base station. The protocol is somewhat similar to the snoop protocol [13]. The drawback with snoop protocol is that it does not guarantee complete shielding of the fixed host from wireless losses. In WTCP, the base station buffers packets destined to the mobile host and upon detection of lost packets retransmits them after receiving duplicate acknowledgements from the mobile host. This scheme hides the time spent by the base station in local recovery so that the source s round trip time (RTT) estimate is not affected which is critical in detection of congestion in the wireline network and is the main feature that distinguishes this approach from snoop protocol. Fig. 6 illustrates the conceptual view of the WTCP approach. Fixed Host Base Station Mobile Host TCP Chapter 3 T CP WTCP Fig. 6 Chapter 2 T CP IP IP IP IP TCP WTCP Arrival of a packet for the mobile host is detected by the network layer protocol running in the base station and the packet is sent to the WTCP buffer. A separate receive array maintains a series of sequence numbers for the segments received. Provided the expected segment is same as the arrived segment, it is stored in the buffer along with its arrival time and the receive array is updated. In addition, the sequence number of the next expected segment is increased by the number of bytes received (packet size). If an out-of-sequence packet with a larger sequence number is received, it is buffered, the arrival time is recorded and the receive array is updated. No change is made to the sequence number of the expected segment. If the out-of-sequence packet has a segment number smaller than the expected value, the packet is discarded. WTCP maintains state information for the wireless connection separately including the sequence number of the last segment sent to the mobile host and the sequence number of the last acknowledgment received. It transmits all the segments, which fall within the wireless link transmission window. The timestamp of the segment in the WTCP buffer is incremented by the amount of time the segment spent in the WTCP buffer (resident time) after each retransmission. When a segment is sent to the mobile host, the base station schedules a new timeout if there is no other timeout pending. TCP end-to-end semantics is maintained as the base station acknowledges the source only after receiving the acknowledgment from the mobile host. The round trip time seen by the source does not include the packet s resident time at the base station. Retransmissions are performed in case of timeout or on receipt of duplicate acknowledgements. If a timeout occurs, the transmission window for the wireless TCP IP ` 11

12 link is reduced to one segment as the base station interprets it as a likely burst loss on the wireless link. Quick reduction in the transmission window helps in avoidance of wasteful wireless transmission and interference. There is no need for any modification in the TCP code at the source. In normal TCP, the arrival of duplicate acknowledgements is understood to be due to congestion and the congestion window is scaled down. WTCP avoids this unnecessary scaling down of congestion window due to wireless losses by assuming that the duplicate acknowledgements does not indicate congestion in the network and retransmits the lost segment. Hence, the transmission of packets through the transmission window remains unaffected. WTCP improves the utilization of the wireless channel by avoiding more than one duplicate acknowledgment. This protocol uses a 10 ms clock granularity to accurately maintain the round trip time and to trigger the timeouts in millisecond range. The authors point out that throughput, which is the average number of successful transmissions to the mobile host in a second is not a good measure of performance of these protocols as improved throughput leads to poor utilization. Goodput defined as the ratio of the number of bytes transmitted over wireless link to the total number of bytes transmitted (new and retransmitted bytes) is used as a figure of merit. Simulation studies done by the authors indicate that WTCP outperforms other protocols when both throughput and goodput are considered in tandem. In less reliable wireless link, throughput of WTCP is better than other protocols because of its retransmission policy on the wireless links. An advantage of WTCP protocol over the Snoop protocol is that the latter yields low throughput when the wireless link is error prone for long durations. Another advantage of this scheme is that it maintains smooth calculation of RTT estimates at the source, as this calculation will not include the resident time at the base station. WTCP suffers from additional overheads introduced due to the need for maintaining timestamps. Also, WTCP in its present format does not address the issue of mobility related losses. It is likely that the advantages of WTCP may be fully realized only if retransmission times are large. 5. TCP UNAWARE LINK LAYER - DELAYED DUPLICATE ACKNOWLEDGEMENTS: Delayed Duplicate Acknowledgements [16] is a TCP-Unaware approach to improve the performance of TCP over wireless without taking TCP-specific actions at the intermediate nodes. The proposed scheme behaves similar to Snoop protocol [13]. The base station performs link level retransmissions for packets that are lost on the wireless link due to transmission errors. However, the link level retransmissions do not guarantee in-order delivery of packets. Link level retransmissions are triggered by link level acknowledgements thus making the base station TCP-Unaware. Making the receiver delay the third and subsequent dupacks for some interval (say, d), reduces interference between TCP retransmissions and link level retransmissions. When the receiver receives out-of-order packets, it sends dupacks for the first two packets immediately, while the third and consecutive dupacks are delayed for duration d. Thus, if the next in-sequence packet is received within the interval d, the delayed dupacks are not sent. If no in-sequence packet is received in this interval, these delayed dupacks are sent. Considering the cases where transmission errors occur on the wireless link, the value of d if chosen appropriately would give sufficient time for link level retransmissions of the lost packet from the base station. On receiving the retransmitted packet within this interval d, the receiver will acknowledge all the in-sequence packets including the retransmitted packet. Thus the sender, which does not receive the third and consecutive dupacks, will not invoke fast retransmit mechanisms. However, for packet losses due to congestion, delaying the dupacks would degrade the performance of TCP. Delayed Duplicate Acknowledgment scheme improves the performance of TCP in networks that suffer from transmission errors. On the other hand, if the packet losses are due to congestion, this approach could be detrimental. Advantage of this scheme over other approaches is that it works even when the packets are encrypted, since the base stations need not view the TCP headers of these packets. Moreover, any link level retransmission scheme could be used along with the proposed Delayed Dupacks scheme. ` 12

13 6. EXPLICIT NOTIFICATION: Explicit notification schemes have been proposed to avoid unnecessary time-outs at the source during local recovery at base-stations. A general approach in these schemes is to explicitly notify the source about the cause of packet losses Explicit Congestion Notification (ECN): In ECN based protocols [18], the source node is explicitly notified about the cause of packet loss, which helps in preventing unnecessary invocation of congestion control schemes by the source. The motivation behind this approach is that a transport protocol, which is aware of the wireless link, can coexist with the underlying link layer schemes to achieve good performance. Poor queue management strategies like Drop Tail queuing which drop newly arrived packets if the buffer is full result in low overall throughput and utilization. A better queue management scheme is Random Early Detection (RED) queue management scheme where two levels called minimum threshold and maximum threshold are maintained and packets are dropped probabilistically. In RED, blocking probability of the packets is a function of queue size. If queue size increases beyond minimum threshold, blocking probability increases linearly with it until size reaches the maximum threshold where the blocking probability will be one. ECN [18] has been proposed as an extension to RED. When the queue size lies between minimum threshold and maximum threshold the arriving packets are marked. ECN capable transport bit is set by the sender end systems if both the end systems are ECN capable. The bit used by the hosts is ECT (ECN Capable Transport) whereas the router uses the CE (Congestion Experienced) bit to notify the destination that a packet has experienced congestion. The receiver sets the ECN-echo flag to inform the source that network is congested. The source acknowledges the report of congestion by the receiver by setting the CWR (Congestion Window Reduced) flag, which informs the receiver that necessary congestion control mechanisms have been initiated. If many packets are received at the receiver following a set of duplicate acknowledgements transmitted the CE bit will be the OR of all data packets being acknowledged. Consequently receiver has to set ECN echo flag even if one of the packets has reported congestion. To maintain robustness the TCP receiver must set ECN echo flags in a series of acknowledgements. The authors [18] of this approach suggest an extension of this scheme to wireless networks. In case of packet loss on wireless links the source will not receive any acknowledgements with ECN-echo flag set, as a result the source would avoid invocation of any congestion control mechanisms. Hence the source would reduce the window size and recover fast as the connection is good again Partial Acknowledgements: Cobb et al [5] have proposed a partial acknowledgment strategy that aims at enabling the TCP source distinguish between congestion related losses and transmission losses due to the presence of wireless links. The sender invokes TCP congestion control schemes only when it detects congestion in the network and retains its original congestion window if losses are determined to be due to the wireless links in the connection. They have suggested that their scheme may even be suitable for dealing with hand-off related losses. As with most of the schemes dealing with extending TCP to wireless networks, this scheme also implicitly assumes that only the links at the extremities in the route are wireless and the rest of the route is wired. The basic idea is to introduce a two-step acknowledgment scheme. For a communication from a fixed host to a mobile host, the base station/router that is connected to the destination host by a wireless link sends a last hop acknowledgment (lhack) for every message it receives which implies that there was no congestion related loss in the wired part of the route. The sender then waits for an acknowledgment from the destination (dack). If sender receives lhack but no dack for a message it sent, it identifies the loss to have occurred in the wireless part of the network. Hence, it does not reduce its window size and ` 13

14 continues to transmit at the same rate. Of course, the unacknowledged packet is re-transmitted. However, if the sender receives neither lhack nor dack, the message was probably lost due to congestion at an intermediate node and consequently, the source initiates congestion control by reducing its window size. Now, we consider the case of a mobile host sending messages to a fixed host. The paper [5] introduces another acknowledgment called the first hop acknowledgment (fhack) to deal with this case. If the mobile host doesn t receive fhack from the base station/router for a message it sends, it identifies it as a loss due to wireless network and re-transmits the message. If the source receives the fhack but not dack from the fixed destination, then the loss is probably due to congestion in the wired segment of the network and so the source scales down its window size. In both cases, it may so happen that the dack was sent by the destination and it was lost in the wireless network. However, since dacks are cumulative, the loss of a single or even a few dacks does not adversely affect the sender. For a mobile host to mobile host connection, the source receives both lhack and fhack for every message it sends. The source may come to an erroneous conclusion if it receives fhack, the message is lost in the destination network (implying no dack was sent), and the lhack is lost in the source network, as it will assume that message loss occurred due to congestion. The authors [5] have argued that the probability of this happening is very small and so will not affect the sender unfavorably. They have also suggested that the mobile hosts should set up connections with an intermediate fixed host to tide over the problem. Hence, for each data message, two/three acknowledgements have to be sent thus increasing the communication overheads. The authors defend this by saying that the acknowledgements are small relative to the data message and should not significantly affect the systems throughput. They also suggest an optimization to their scheme in the form of reduced number of dacks sent by the destination utilizing the cumulative nature of dacks. The source invokes the slow start and fast re-transmit approaches used in standard TCP only when lhacks are not received before the time-out period set for every message sent. The sender maintains its current throughput when re-transmitting packets if lhacks are received correctly. It is also possible that messages may be lost during hand-offs due to the mobility of hosts. Even in this case, the lhacks will be received by the source even if messages are lost during hand-off and consequently, there will be no reduction in sending rate as the loss is not due to congestion. Wireless Source Base Station Wired Network Base Station fhack lhack dack Fig. 7 Wireless Destination Fig. 7 illustrates the origin of the various acknowledgements. Variations to this scheme include local buffering and re-transmission by the base station. This is similar to the approach in snoop protocol discussed earlier Multiple Acknowledgements: TCP over Wireless using Multiple Acknowledgements is a solution proposed by Biaz et al [19] for improving the TCP performance in heterogeneous networks by making the TCP layer aware of high bit error rates on wireless link and reducing the load on the wired network. The protocol distinguishes the losses on the wired portion from the losses on the wireless link by using two types of acknowledgements, partial acknowledgment and complete acknowledgment. The base station is responsible for retransmissions on the wireless link. It sends a partial acknowledgment to the sender if it experiences ` 14

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS NETWORKS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2015 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data layer Physical layer service

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1 In ACM Wireless Networks Journal (WINET), 1(4), December 1995. Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1 Hari Balakrishnan, Srinivasan Seshan, and Randy H. Katz

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Improving reliable transport and handoff performance in cellular wireless networks 3

Improving reliable transport and handoff performance in cellular wireless networks 3 Wireless Networks 1 (1995) 469^481 469 Improving reliable transport and handoff performance in cellular wireless networks 3 Hari Balakrishnan, Srinivasan Seshan and Randy H. Katz Computer Science Division,

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Supporting mobility only on lower layers up to the network layer is not

Supporting mobility only on lower layers up to the network layer is not Mobile transport layer Supporting mobility only on lower layers up to the network layer is not enough to provide mobility support for applications. Most applications rely on a transport layer, such as

More information

TCP OVER AD HOC NETWORK

TCP OVER AD HOC NETWORK TCP OVER AD HOC NETWORK Special course on data communications and networks Zahed Iqbal (ziqbal@cc.hut.fi) Agenda Introduction Versions of TCP TCP in wireless network TCP in Ad Hoc network Conclusion References

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

Advanced Computer Networks. Wireless TCP

Advanced Computer Networks. Wireless TCP Advanced Computer Networks 263 3501 00 Wireless TCP Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Today: Cellular Networks Mobile IP Wireless

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

TCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1

TCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1 TCP over Wireless Protocols and Networks Hadassah College Spring 218 Wireless Dr. Martin Land 1 Classic TCP-Reno Ideal operation in-flight segments = cwnd (send cwnd without stopping) Cumulative ACK for

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

A thesis submitted to the Faculty of Graduate Studies and Research. in partial fulfillment of the requirements for the degree of

A thesis submitted to the Faculty of Graduate Studies and Research. in partial fulfillment of the requirements for the degree of TCP over Mobile Ad-Hoc Access Networks By Ahmed Moustafa A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Computer

More information

TCP Congestion Control

TCP Congestion Control 1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Improving Performance of Transmission Control Protocol for Mobile Networks

Improving Performance of Transmission Control Protocol for Mobile Networks Improving Performance of Transmission Control Protocol for Mobile Networks Dulal Kar, Swetha Pandala, and Ajay Katangur Department of Computing Sciences, Texas A&M University-Corpus Christi, Corpus Christi,

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2000 NETWORKS

PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2000 NETWORKS PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2 NETWORKS Sang-Hee Lee +, Hong-gu Ahn +, Jae-Sung Lim +, Seung-Hwan Kwak ++, Sung Kim ++ The Graduate School of Information and Communication,

More information

A Comparison of Mechanisms for Improving TCP Performance over Wireless Links

A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Appeared in IEEE/ACM Transactions on Networking, Dec.1997. This is a much-extended and revised version of a paper that appeared at ACM SIGCOMM, 1996. A Comparison of Mechanisms for Improving TCP Performance

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CE443 - Fall 1390 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides

More information

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts Pasi Sarolahti Nokia Research Center pasi.sarolahti@nokia.com Markku Kojo, Kimmo Raatikainen University of Helsinki Department of Computer

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Networked Systems and Services, Fall 2017 Reliability with TCP

Networked Systems and Services, Fall 2017 Reliability with TCP Networked Systems and Services, Fall 2017 Reliability with TCP Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transmission Control Protocol (TCP) RFC 793 + more than hundred other RFCs TCP Loss Recovery

More information

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions.

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions. ISSN:2320-0790 A New TCP Algorithm to reduce the number of retransmissions in Wireless Networks A Beulah, R Nita Marie Ann Assistant Professsor, SSN College of Engineering, Chennai PG Scholar, SSN College

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

Study of Proposed Methods for Improving TCP Performance Over Wireless Links. Anshuman Sinha, Schlumberger, Austin Technology Center

Study of Proposed Methods for Improving TCP Performance Over Wireless Links. Anshuman Sinha, Schlumberger, Austin Technology Center 1 Study of Proposed Methods for Improving TCP Performance Over Wireless Links Anshuman Sinha, Schlumberger, Austin Technology Center arxiv:0908.1090v1 [cs.ni] 7 Aug 2009 TCP is designed for networks with

More information

DualRTT: Enhancing TCP Performance During Delay Spikes

DualRTT: Enhancing TCP Performance During Delay Spikes DualRTT: Enhancing TCP Performance During Delay Spikes Ph.D. School of Computer Science University of Oklahoma. Email: atiq@ieee.org Web: www.cs.ou.edu/~atiq Presentation at Tohoku University, Sendai,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Networked Systems and Services, Fall 2018 Chapter 3

Networked Systems and Services, Fall 2018 Chapter 3 Networked Systems and Services, Fall 2018 Chapter 3 Jussi Kangasharju Markku Kojo Lea Kutvonen 4. Transport Layer Reliability with TCP Transmission Control Protocol (TCP) RFC 793 + more than hundred other

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer Transport Protocols Reading: Sections 2.5, 5.1, and 5.2 CS 375: Computer Networks Thomas C. Bressoud 1 Goals for Todayʼs Lecture Principles underlying transport-layer services (De)multiplexing Detecting

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows

More information

TCP: Flow and Error Control

TCP: Flow and Error Control 1 TCP: Flow and Error Control Required reading: Kurose 3.5.3, 3.5.4, 3.5.5 CSE 4213, Fall 2006 Instructor: N. Vlajic TCP Stream Delivery 2 TCP Stream Delivery unlike UDP, TCP is a stream-oriented protocol

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16 Guide To TCP/IP, Second Edition Chapter 5 Transport Layer TCP/IP Protocols Objectives Understand the key features and functions of the User Datagram Protocol (UDP) Explain the mechanisms that drive segmentation,

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS. A Thesis NAUZAD ERACH SADRY

DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS. A Thesis NAUZAD ERACH SADRY DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS A Thesis by NAUZAD ERACH SADRY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements

More information

TCP in Asymmetric Environments

TCP in Asymmetric Environments TCP in Asymmetric Environments KReSIT, IIT Bombay Vijay T. Raisinghani TCP in Asymmetric Environments 1 TCP Overview Four congestion control algorithms Slow start Congestion avoidance Fast retransmit Fast

More information

Congestions and Control Mechanisms in Wired and Wireless Networks

Congestions and Control Mechanisms in Wired and Wireless Networks Research Inventy: International Journal of Engineering And Science Vol.4, Issue 6 (June 2014), PP -57-62 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Congestions and Control Mechanisms

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer E.g. HTTP (used by web services) typically uses TCP Reliable transport between client and server required TCP Stream oriented Network friendly: time-out congestion

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information