1 / 44

Protocols for Improving Performance of TCP over Wireless Links

Protocols for Improving Performance of TCP over Wireless Links. Presented by Syed Natif Nawaz Joseph Toney. Introduction. Advances in wireless communication and the decreasing size and the cost of computing units have triggered an explosive growth for the mobile computing market.

hunter
Télécharger la présentation

Protocols for Improving Performance of TCP over Wireless Links

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protocols for Improving Performance of TCP over Wireless Links Presented by Syed Natif Nawaz Joseph Toney

  2. Introduction • Advances in wireless communication and the decreasing size and the cost of computing units have triggered an explosive growth for the mobile computing market. • A mobile host is connected to a base station through a low bandwidth, high latency and error prone wireless channel. • Base stations are connected to the rest of the network through the high bandwidth, low latency and relatively error free wired links. • Bit Error Rate(BER)a wireless channel is 10-3 - 10-5, while that of wired link is 10-8 - 10-10 or better

  3. Contd... • The transmission quality is further degraded by hand-off related intermitted delay or loss of the connection as the mobile user moves from the transmission range of one base station to that of another. • Design of TCP has to take into account the heterogeneous nature of the network.

  4. Necessity to improve the performance of TCP in a wireless environment • When used in wireless environment, the TCP developed for fixed networks with relatively reliable links wrongly assumes segment loss due to wireless link errors to be a sign of network congestion and invokes congestion control mechanisms that curb the flow of segments on that connection, because of which the throughput is affected badly. • For a better throughput, a segment loss due to wireless link errors must be detected and retransmitted as quickly as possible.

  5. Protocols • Many approaches have been proposed to improve the performance of TCP over networks with wireless links. These have been broadly categorized as Transport Level Proposals and Link Level Proposals. • Various Protocols considered • Transport level proposals • Indirect TCP (I-TCP) • MTCP • ESBN • Fast Retransmission

  6. contd ... • Link Level proposals • Snoop Scheme • CSDP • TCP unaware technique • Delayed DUPACK’S scheme

  7. Indirect TCP • I-TCP overcomes by utilizing the resources of MSR’s to provide transport layer communication between mobile hosts and fixed hosts. • I-TCP is fully compatible with TCP/IP on fixed network • Any interaction between MH & FH are split into two separate interactions. • Using I-TCP MH sends a request to current MSR to establish a connection.

  8. It uses special I-TCP calls, instead of regular system calls. • If the MF switches cells during the life time of an I-TCP connection the center point of the connection moves to new MSR. • When the MH switches cells, the states associated with two sockets is handed over. • The FH is completely unaware of the indirection. • The connection is not re-established at the new MSR.

  9. ITCP Architecture

  10. Limitations of I-TCP • I-TCP violates the semantics of end to end reliability. • Application re-linking. • Software overhead.

  11. Snoop Protocol • Proposed by Elan Amir, Hari Balakrishnan, Srinivasan Seshnan & Randy H. Katz - University of California, Berkeley. • Improves on Split connection approach by retaining the end to end reliability semantics. • Wireless errors are handled by local retransmission at the base station.

  12. Reduces interference between TCP retransmission and link level retransmission. • The probability of time out at the TCP sender is assumed small • Snoop uses features like link level retransmission time out.

  13. Snoop Architecture

  14. Snoop functions • Snoop_output() • Types of packets from the fixed host • A new packet in the normal TCP sequence. • An out of sequence packet that has been cached earlier. • An out of sequence packet that has not been cached earlier.

  15. State machine for snoop_output Out of Sequence. Already in cache IDLE SEND In sequence/ Send pkt Recv pkt/In cache

  16. Snoop_input() • Types of ACK’s from the Mobile host • A spurious ACK • A DUPACK • A New ACK • Time Out

  17. State machine for snoop_input DUPACK NEWACK Recv Dupack New Ack IDLE TIMEOUT SPURIOUS ACK

  18. DELAYED DUPACK’S SCHEME • It is preferred over snoop when encryption is used. • It is a TCP unaware scheme. • The base station implements a link level retransmission scheme for lost packets . • Link level ack’s are used to trigger link level retransmission • TCP receiver reduces interference between TCP and link level retransmission by delaying third and subsequent dupacks for interval d. • TCP receiver responds to the first two OOO packets by sending dupacks immediately. • Dupacks for further consecutive packets are delayed for duration d

  19. Delayed Dupack Scheme

  20. Two types of packet losses and the selection of d • A Packet is lost due to transmission errors on the wireless link. • A packet is lost due tocongestion before reaching the wireless link.

  21. Performance results of various schemes

  22. WTCP • Proposed by Karunaharan Ratnam & Ibrahim Matta - Northeastern University. • Main feature: • Requires no modification to the TCP code that runs in Mobile host/Fixed Host. This is an important advantage because in a fixed network, modifying the TCP installations in a millions of existing hosts is not possible. • TCP end to end semantics is maintained.

  23. WTCP Architecture • A WTCP buffer is maintained in the base station. • TCP segments that arrive for a mobile host are first queued in the WTCP buffer. • If the segment is the next segment expected, then it is stored in the WTCP buffer along with it’s arrival time. • The sequence number for the next segment expected from the fixed host is increased by the number of bytes received. • If the segment received has a larger sequence number than what is expected, the segment is buffered. • The received segment is discarded if it’s sequence number is smaller than what is expected.

  24. WTCP maintains the state information for the wireless connection such as transmission window, sequence number of last acknowledgement received from mobile host and the sequence number of the last segment that was sent to the mobile host. • Each time, WTCP locally retransmits, the time stamp is incremented by the amount of time, the segment has spent in the WTCP buffer. • WTCP acknowledges a segment sent to the fixed host only after the mobile host actually receives and acknowledges the segment. • The round trip time seen by the source is the actual round trip time taken by a segment to reach and return from a mobile host.

  25. Performance of WTCP during retransmissions • Based on duplicated acknowledgment or time out, the base station locally retransmits lost segments. In case of time -outs transmission window size is reduced to one segment and so potentially wasteful wireless transmission is avoided and interference with other channels is reduced. • In the regular TCP, the transmission window is opened, based on whether the connection is in slow start or a congestion avoidance phase. • WTCP however, opens the wireless transmission completely assuming that an acknowledgement indicates that wireless link is in a good state.

  26. Contd ... • When the base station detects a lost segment, it retransmits, (without invoking congestion control, unlike normal TCP). However, until the mobile host receives the lost segment, the reception of each our of order segment will generate a duplicate acknowledgement, the number of which can be determined by the base station and it ceases to retransmit.

  27. Effect of Local Retransmissions on RTT Estimation • Inaccurate RTT estimation can cause unnecessary retransmissions by triggering time outs. • Sender writes the current time stamp of the segment that generated it and the receiver echoes it back, without modifying it. • However when an intermediate host buffers the segments and locally retransmits them, RTT computation can be affected • If a segment gets retransmitted at the base station, RTT value computed at the source for this segment will overshoot by the residence time in the WTCP buffer.

  28. For hiding the LRT, there are two approaches. • Base station subtracts the actual LRT by modifying the time stamp field of each acknowledgement forwarded to the source. • But this is not feasible!, as the clock granularity of source and base station may not be identical. • After retransmission from BS, time stamp of packets transmitted to the MH • replaced by time stamp of most recent packet received from source after latest retransmission. • Invalidated, if no packet is received from source after retransmission.

  29. Simulation Model • Tool Used: ns1.2a3 from LBL • Simulated Network 10 Mbps 800 kbps 100 ms 10 ms Fixed Host (Source) Base Station Mobile Host

  30. Simulation parameters • ParameterValue • Max window size 10 Kb • Buffer Size at BS 20 Kb • Segment Size(including header) 1Kb • BER in good state 10-2 • BER in bad state 10-6 • Mean good period 1 sec

  31. Simulation Results

  32. Effect of hiding LRT

  33. Explicit Bad State Notification • General Scenario:In most bad periods, local recovery at the base station prevents packet losses on the wireless link. However the source may still time out waiting for acknowledgement of packets that have already been sent. • Explicit Feedback • Explicit feedback from the base station can completely eliminate the possibility of time outs occuring at the source, while the wireless link is in a bad state. • The use of explicit feedback for congestion control in the internet is known to work well in the form of ICMP source quench messages.

  34. So when a wireless links enters a bad state, a base station configured to function as a gateway supporting ICMP messages, sends a source quench message to the source and is expected to prevent unnecessary time outs. • This should improve the goodput as well as throughput, for the connection but the results have been shown to be otherwise. • A source quench message from the base station will not be able to prevent time out of packets that are already on the network. It will of course stem the flow of any further packets and reduce the probability of timeouts. • An important observation here is the timeout of packets that have already been sent to the base station have too be avoided. • A mechanism to thwart the source's attempts to invoke congestion control in response to delays on the wireless links.

  35. EBSN • To avoid source time out, the BS cannot send acknowledgements of the packets not sent to the MH, back to the source. • Neither can acknowledgements of previously acknowledged packets be sent, because they will be interpreted as duplicate acknowledgements. • Solution is to send a EBSN. • EBSN causes the previous time out to be canceled and a new time out put in place, based on the existing estimate of round trip time and variance.

  36. The correct time out a value at the source is readjusted from the MH following the receipt of the first new acknowledgement from the MH, following any EBSN message received. • A new acknowledgement is an indicator that the link has finally arrived at a good state and this will ensure steady inflow of acknowledgements.

  37. Advantages & Disadvantages of EBSN • Advantages: • Source time out is prevented during local recovery. Improves goodput and throughput of the connection. • Effect of clock on performance is reduced. • Disadvantages • Requires modification of TCP code at source.

  38. Other schemes • MTCP • Similar to I-TCP except that the last TCP byte of data is acknowledged to the source only after it is received by the mobile host. • Source falsely believes that every byte of data except the last byte is received by the receiver, it can take remedial measures based on whether the last byte is received or not. • Fast Retransmission • Addresses the issue of mobile host hand off. • During mobile host hand off TCP segments can be lost or delayed. • The Mobile host has to unnecessarily wait for a long duration for the source to retransmit.

  39. In fast retransmit, the IP in mobile host triggers TCP to generate a certain number of duplicate acknowledgements, causing the source to retransmit the lost segment without waiting for the time out period to expire. • This requires modification to the TCP code at the mobile host. • Channel State Dependent Packet Scheduling • Pure link layer approach. • FIFO scheduling of data in links with bursty losses yields poor utilization of the channel. • A set of algorithms are provided to enhance the channel utilization based on the arrival time of the packet, whether it is a new packet or retransmission and the length of each output queue.

  40. Conclusion • Various Link Layer and Transport Level proposals for improving the performance of TCP over Wireless Links have been studied. • I-TCP • Snoop Scheme • WTCP • EBSN • Delayed Dupack Schemes.

  41. References • Karunaharan Ratnam and Ibrahim Matta. WTCP:An Efficient Transmission Control Protocol for Networks with Wireless Links. Technical Report NU-CCS-97-11, Northeastern University. July 1997. • Nitin Vaidya, Miten Mehta, Charles Perkins and Gabriel Montenegro. Delayed Duplicate Acknowledgements: A TCP-Unaware Approach to Improve Performance of TCP over Wireless. Technical Report 99-003, February 1999. • Ajay Bakre and B.R. Badrinath. I-TCP: Indirect TCP for Mobile Hosts.DCS-TR-314, Rutgers University, October 1994. • Elan Amir, Hari Balakrishnan, Srinivasan Seshan and Randy H. Katz. Efficient TCP over Wireless Links. • Bikram S. Bakshi, P. Krishna, N.H. Vaidya and D.K. Pradhan. Improving Performance of TCP over Wireless Networks. Texas A & M University.

More Related