Snooping TCP As A Transparent TCP Extension
Snooping TCP As A Transparent TCP Extension
1. One of the drawbacks of I-TCP is the segmentation of the single TCP connection
into two TCP connections. This loses the original end-to-end TCP semantic. The
following TCP enhancement works completely transparently and leaves the TCP
end-to-end connection intact.
2. In this approach, the foreign agent buffers all packets with destination mobile
host and additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements.
3. The reason for buffering packets toward the mobile node is to enable the
foreign agent to perform a local retransmission in case of packet loss on the
wireless link.
5. Now the foreign agent retransmits the packet directly from the buffer,
performing a much faster retransmission compared to the correspondent host.
Extending the functions of a foreign agent with this TCP has several advantages:
1. The end-to-end TCP semantic is preserved. The approach automatically falls
back to standard TCP if the enhancements stop working.
2. The correspondent host does not need to be changed; most of the enhancements
are in the foreign agent. Supporting only the packet stream from the correspondent host
to the mobile host does not even require changes in the mobile host.
3. It does not need a handover of state as soon as the mobile host moves to
another foreign agent. All that happens is a time-out at the correspondent host and
retransmission of the packets, possibly already to the new care-of address
4. It does not matter if the next foreign agent uses the enhancement or not. If not,
the approach automatically falls back to the standard solution.
2. Using negative acknowledgements between the foreign agent and the mobile
host assumes additional mechanisms on the mobile host. This approach is no longer
transparent for arbitrary mobile hosts.
3. All efforts for snooping and buffering data may be useless if certain encryption
schemes are applied end-to-end between the correspondent host and mobile host . Using
IP encapsulation security payload the TCP protocol header will be encrypted – snooping
on the sequence numbers will no longer work. If encryption is used above the transport
layer (e.g., SSL/ TLS) snooping TCP can be used.