1 / 30

Mobile Transport Layer

Mobile Transport Layer. Prof. Hemang Kothari. TCP Basic. Reliable, ordered delivery uses sequence numbers, acknowledgements, timeouts and retransmissions End-to-end semantics (ACK after data recd) Provides flow and congestion control

adellak
Télécharger la présentation

Mobile Transport Layer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Transport Layer Prof. Hemang Kothari

  2. TCP Basic • Reliable, ordered delivery • uses sequence numbers, acknowledgements, timeouts and retransmissions • End-to-end semantics (ACK after data recd) • Provides flow and congestion control • uses sliding window based buffers and feedback from receiver/network to adjust transmission rate

  3. Sender’s window 1 2 3 4 5 6 7 8 9 10 11 12 13 Acks received Not transmitted TCP Window • Window size minimum of • receiver’s advertised window - determined by available buffer space at the receiver • congestion window - determined by sender, based on network feedback

  4. Motivation - 1 Transport protocols typically designed for • Fixed end-systems • Fixed, wired networks TCP congestion control • packet loss in fixed networks typically due to (temporary) overload situations • router have to discard packets as soon as the buffers are full • TCP recognizes congestion only indirect via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse • slow-start algorithm as reaction

  5. Motivation II TCP slow-start algorithm • sender calculates a congestion window for a receiver • start with a congestion window size equal to one segment • exponential increase of the congestion window up to the congestion threshold, then linear increase • missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window • congestion window starts again with one segment

  6. Influences of mobility on TCP-mechanisms TCP assumes congestion if packets are dropped • typically wrong in wireless networks, here we often have packet loss due to transmission errors • furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the wrong access point and forwarding is not possible The performance of an unchanged TCP degrades severely • however, TCP cannot be changed fundamentally due to the large base of installation in the fixed network, TCP for mobility has to remain compatible • the basic TCP mechanisms keep the whole Internet together

  7. Indirect TCP I Indirect TCP or I-TCP segments the connection • no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol • optimized TCP protocol for mobile hosts • splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer • hosts in the fixed part of the net do not notice the characteristics of the wireless part „wired“ Internet mobile host access point (foreign agent) standard TCP „wireless“ TCP

  8. I-TCP socket and state migration access point1 access point1 socket migration and state transfer Internet socket migration and state transfer access point2 access point2 mobile host mobile host

  9. Indirect TCP- Advantages • No changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work • Transmission errors on the wireless link do not propagate into the fixed network • Simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host • Therefore, a very fast retransmission of packets is possible.

  10. Disadvantages • loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash • higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent

  11. Snooping TCP „Transparent“ extension of TCP within the foreign agent • buffering of packets sent to the mobile host • lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called “local” retransmission) • the foreign agent therefore “snoops” the packet flow and recognizes acknowledgements in both directions, it also filters ACKs • changes to the basic TCP only within the foreign agent correspondent host local retransmission foreign agent „wired“ Internet snooping of ACKs buffering of data mobile host end-to-end TCP connection

  12. Snooping TCP • Data transfer to the mobile host • FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out • fast retransmission possible, transparent for the fixed network • Data transfer from the mobile host • FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH • MH can now retransmit data with only a very short delay • Problems • snooping TCP does not isolate the wireless link as good as I-TCP • snooping might be useless depending on encryption schemes

  13. Snooping TCP Advantages • Local recovery from wireless losses • High throughput can be achieved • End-to-end semantics retained • Soft state at base station • loss of the soft state affects performance, but not correctness

  14. Snooping TCP DisAdv. • Snooping TCP does not isolate the behavior of the wireless link as well as I-TCP. • The quality of the isolation, which snooping TCP offers, strongly depends on the quality of the wireless link, time-out values, and further traffic characteristics. • Not useful if TCP headers are encrypted (IPsec).

  15. Mobile TCP - Motivation • Dropping packets due to a handover or higher bit error rates is not the only phenomenon of wireless links and mobility – the occurrence of lengthy and/or frequent disconnections is another problem. • A TCP sender tries to retransmit data controlled by a retransmission timer that doubles with each unsuccessful retransmission attempt, up to a maximum of one minute

  16. Mobile TCP - Motivation • What happens in the case of I-TCP if the mobile is disconnected? The proxy has to buffer more and more data, so the longer the period of disconnection, the more buffer is needed. • The snooping approach also suffers from being disconnected. The mobile will not be able to send ACKs so, snooping cannot help in this situation.

  17. Objective – M-TCP • To prevent the sender window from shrinking if bit errors or disconnection but not congestion cause current problems. • To improve overall throughput, to lower the delay, to maintain end-to-end semantics of TCP, and to provide a more efficient handover. • Adapted to the problems arising from lengthy or frequent disconnections

  18. Mobile TCP - Working • M-TCP splits the TCP connection into two parts as I-TCP does. An unmodified TCP is used on the standard host-supervisory host (SH) connection, while an optimized TCP is used on the SH-MH connection.

  19. M-TCP Working • But, it does not perform caching / retransmission of data via the SH. If a packet is lost on the wireless link, it has to be retransmitted by the original sender. This maintains the TCP end-to-end semantics. • The SH monitors all packets sent to the MH and ACKs returned from the MH. If the SH does not receive an ACK for some time, it assumes that the MH is disconnected.

  20. M-TCP Working • It then chokes the sender by setting the sender’s window size to 0. Setting the window size to 0 forces the sender to go into persistent mode, i.e., the state of the sender will not change no matter how long the receiver is disconnected. • This means that the sender will not try to retransmit data.

  21. M-TCP Working • As soon as the SH (either the old SH or a new SH) detects connectivity again, it reopens the window of the sender to the old value. The sender can continue sending at full speed. This mechanism does not require changes to the sender’s TCP.

  22. Advantages • It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but forwards the ACKs from the MH. • If the MH is disconnected, it avoids useless retransmissions, slow starts or breaking connections by simply shrinking the sender’s window to 0. • Since it does not buffer data in the SH as I-TCP does, it is not necessary to forward buffers to a new SH. Lost packets will be automatically retransmitted to the new SH.

  23. Disadvantages • A modified TCP on the wireless link not only requires modifications to the MH protocol software but also new network elements like the supervisory host. • Bit errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a valid assumption.

  24. Fast Retransmit / Fast Recovery Change of foreign agent often results in packet loss • TCP reacts with slow-start although there is no congestion Forced fast retransmit • as soon as the mobile host has registered with a new foreign agent, the MH sends duplicated acknowledgements on purpose • this forces the fast retransmit mode at the communication partners • additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after registration Advantage • simple changes result in significant higher performance Disadvantage • further mix of IP and TCP, no transparent approach

  25. Transmission / Time-out Freezing Mobile hosts can be disconnected for a longer time • no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or mux. with higher priority traffic • TCP disconnects after time-out completely TCP freezing • MAC layer is often able to detect interruption in advance • MAC can inform TCP layer of upcoming loss of connection • TCP stops sending, but does now not assume a congested link • MAC layer signals again if reconnected Advantage • scheme is independent of data Disadvantage • TCP on mobile host has to be changed, mechanism depends on MAC layer

  26. Selective Retransmission TCP acknowledgements are often cumulative • ACK n acknowledges correct and in-sequence receipt of packets up to n • if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth Selective retransmission as one solution • RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps • sender can now retransmit only the missing packets Advantage • much higher efficiency Disadvantage • more complex software in a receiver, more buffer needed at the receiver

  27. Transaction Oriented TCP

  28. Transaction Oriented TCP TCP phases • connection setup, data transmission, connection release • using 3-way-handshake needs 3 packets for setup and release, respectively • thus, even short messages need a minimum of 7 packets! Transaction oriented TCP • RFC1644, T-TCP, describes a TCP version to avoid this overhead • connection setup, data transfer and connection release can be combined • thus, only 2 or 3 packets are needed Advantage • efficiency Disadvantage • requires changed TCP

  29. Next Topic, Mobile Ad Hoc Network

More Related