0% found this document useful (0 votes)
2K views

1 Compare I-TCP, S-TCP and M-TCP 2 Understand CO3: Assignment # 2

1) The document discusses several classical TCP improvement protocols - Indirect TCP (I-TCP), Snooping TCP (S-TCP), and Mobile TCP (M-TCP). 2) I-TCP segments a TCP connection into a fixed wired part and wireless part, using a proxy like an access point to relay data. S-TCP improves on I-TCP by buffering data at the access point. 3) M-TCP aims to improve throughput, lower delay, and maintain end-to-end semantics between a mobile host and supervisory host during handovers between foreign agents.

Uploaded by

wexida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views

1 Compare I-TCP, S-TCP and M-TCP 2 Understand CO3: Assignment # 2

1) The document discusses several classical TCP improvement protocols - Indirect TCP (I-TCP), Snooping TCP (S-TCP), and Mobile TCP (M-TCP). 2) I-TCP segments a TCP connection into a fixed wired part and wireless part, using a proxy like an access point to relay data. S-TCP improves on I-TCP by buffering data at the access point. 3) M-TCP aims to improve throughput, lower delay, and maintain end-to-end semantics between a mobile host and supervisory host during handovers between foreign agents.

Uploaded by

wexida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Assignment # 2

1 Compare I-TCP , S-TCP and M-TCP 2 Understand CO3

classical TCP improvement-

1) Indirect TCP
2) Snooping TCP
3) Mobile TCP

Indirect TCP (I-TCP) -- Please the diagram from internet source.

I-TCP segments a TCP connection into a fixed part and wireless part.

MH (Mobile Host) connected wirelessly with Access Point (AP).

CH (correspondent Host) connected wired with AP.

Standard TCP is used between CH and AP. In teh same way, Wireless TCP is used between MH and AP.

Here, AP can act as proxy, i.e. -> AP will behave here MH for CH, and CH for MH.

This AP can relay data on both sides and act as a proxy.

If CH send packet,the AP will take it and ACK to CH, and later will try to forward these packet to MH.

If MH receives the packet, it ACK the packt to AP.


If packet lost in wireless link, due to transmission error, the CH will notice this, and tries to retransmit it.

Similarly, if MH wants to send packet, the AP will ACK it and tries to forward the packet to CH.

If packet lost in wireless link, the MH will notice this, and immediately retransmit it.

Socket and State Migration- Please refer the diagram from internet source.

---------------------------

Foreign Agent (FA) = (Access Point)


After the handover of MH to a new FA, the old FA must forward the buffered data to a new FA.

After the registartion to a new FA by MH, this new FA responsibility to inform the old FA, about the
current location to enable packet forwarding.

Sockets and buffer content must migrate to new FA. In socktes, there is a current state of TCP resides -
sequence no., address, port.

Snooping TCP (S-TCP)

The problem in I-TCp is an MH never ack to CH, for every packet it receives.

CH will never know about the packet loss.

As 1.FA takes the data from CH, then directly ACK it to CH (which is not good), as CH will always think
that the packet reached to MH (as CH thinks that FA = MH)

In such case, we have 2.improvided I-TCP to Snooping TCP (please refer the diagram from internet).

Here is snoop TCP, the FA will not directly send the ack to CH, but will buffer 3.(buffering) all data from
CH first, then slowly sends these packts to MH (snooping).

If FA doesn't receive an ACK from MH, withing certain amount of time, CH will assume, that either the
packet or ACK lost, and now FA could retransmit pckt directly from buffer, performing much faster
retranmission.
Mobile-TCP (M-TCP) -- Please refer the diagram from internet source
-------------------------------------

Intention behind this protocol in to,

a) Improve the overall throughput


b) Lower the delay
c) Maintain end-end semantics
d) Efficient Handover (migrating from old FA to new FA)

* Works very similar to I-TCP, it splits connection into two parts.

* Unmodified TCP (Standard TCP) is used on the CH - SH (Supervisory Host) connection.

* While, Optimized TCP is used between SH-MH connection.

* SH responsible for exchangined data between both part similar to proxy in I-TCP.

* Doest perform the caching/retransmission of data via SH.

* If a packet lost on wireless link, it has to be transmitted by original sender (maintain end to end
semantics)

* SH monitors all packet sent to MH and ACK returned from MH.

* If SH doesnt receive an ACK for sometime from MH, it assumes the MH is disconnected.

* SH will choke the sender by setting the sender window size = 0 --> forces the sender to go into
persistent mode (it cannot send the data, or retransmission).

* As soon as, the SH detects the connectivity again, it reopens the window of the sender to the old
value.

* The sender can continue sending at full rate.

2 Describe the implications of Traditional TCP on 2 Understand CO5


Mobility

Implications of Mobility (Wireless Link) in Transport Layer-


---------------------------------------------------

Slow start is most useful mechanism in fixed network(Wired link), but it decreases efficiency of TCP
whenever there is a mobility of sender and receiver.

From a missing ACK, TCP only concludes it is because of congestion situation, but it always not main
reason for packet loss or ACK loss.

a) Error rates on wireless links are order of magnitude higher compared to fixed network (wired).

Packet loss much common in this area, and cannot always be compansated by layer 2 retransmission
(ARQ and FEC),

We are transmitting the same packet twice (duplicate packets)over a bad link, which is not good.

detection of these duplicate packets on layer 2 is hard, as more no. of devices using end-end encryption.

b) mobility can cause packet loss.

When using Mobile IP, there could be still some packets in transit to the old FA, while MN movies to the
new FA.

The old FA may not be able to forward those packet to the new FA, or even cannot buffer it, if MN takes
too long time to come back to old FA.

in that situation, old FA will start dropping the packets.

---> Traditional TCP mechanism detects missing ACK via time-outs, and always concludes packets loss
due to "congestion".

It cannot distinguish between different cause for congestion.

This is a fundamental design problem in TCP.

So, we have to improve the TCP using Classical TCP improvement.

3 Explain Fast Retransmit, Time-out Freezing and 2 Understand CO5


Selective Retransmission

Fast Retransmit /Fast Recovery


------------------------------

Sender receving continous ACK for the same packet, this informs two things -

a) Rx(Receiver) got all packets upto the ack in sequence.


b) In TCP, Rx sends ACK only if it receives any packtes from Tx(sender).

The gap in the packet stream is not due to severe congestion always, but it could be a simple packet loss
due to a transmission error.

Once it find out by sender, the sender can now retransmit the missing packet before the timer expires -
This behavoir is known as Fast Retransmit.

The recepient of ACK shows that there is no congestion, to justify a slow start. The sender can continue
with the current congestion window, the sender can perform "Fast Recovery" from packet loss or any
crash happens.

4 Compare WAP architecture with OSI with figure 2 Understand CO1

WAP Forum developes standards for application deployment over wireless devices like PDA, mobile
phone.

WAP is based on layered architecture, very similar to that of OSI layer.

These layer consist of,

a) Wireless Application Environment (WAE) -- Application Layer


b) Wireless Session Protocol (WSP) -- Session Layer
c) Wireless Transaction Protocol (WTP) --
d) Wireless Transport Layer Security (WTLS) -- Transport Layer
e) Wireless Datagram Protocol (WDP) -- Network Layer

Refer the "WAP architecture from" internet

5 Explain WAP Gateway with proper diagram 3 Understand CO1

The wap request from the browser (user agent) is routed through a wap gateway.

The gateway acts as an intermediary node between client and network throgh a wireless last mile (GSM,
GPRS, CDMA).

The gateway also does encoding and decoding of the wap request and wap response from client to the
server and vice versa.

The purpose of encoding and decoding is to minimize the size of data transfer over the air.

6 Discuss Routing Disadvantages related to Ad 2 Analyze CO4


Hoc Network
(From interent)
The disadvantage of table driven, it required the
additional control traffic to continually update route entries. Some of Proactive routing
protocols are:-
(a) DSDV (Destination Sequenced Distance Vector) DSDV
(b) WRP (Wireless Routing Protocols) WRP
(c) DFR (Direction Forward Routing) DFR
(d) HSR (Hierarchical State Routing Protocols) HSR
(e) IZRP (Intrazone Routing Protocols) IZRP
(f) AWDS (Ad hoc Wireless Distribution Service) CGSR
(g) CGSR (Cluster Head Gateway Switch Routing Protocols)
7 Difference between AdHoc Network and 2 Analyze CO4
Infrastructure Network.

//././/././
Mobility supports relies on the existence of at least some infrastructure,

Mobile IP requires foreign agents, tunnels, and default routers.


DHCP requires servers and broadcast capabilities of the medium reaching all participants.
Cellular phone network requires --> Base Station and infrastrucutre Network.

However, there may be several situation where users of a network cannot rely on infrastructure
network ?? ---> because it is too expnesive, in that situation, user will not rely on it.

Effectivness --> Services provided by existing infrastructure might be too expensive for certain
application. For example --> An application sends only small status information every other minute, it
would be too expensive if uses infrastructure network.

8 Write a short note on DSDV Protocol. 1 Remember CO3

Destination Sequenced Distance Vector (DSDV) is a hop-by-hop vector routing protocol


requiring each node to periodically broadcast routing updates. This is a table driven algorithm
based on modifications made to the Bellman-Ford routing mechanism

9 What are the challenges in 4G Network. 1 Understand CO1


Discuss about any one 4G Technology
(WiMAX, LTE, etc).

WiMAX {Worldwide Interoperability for Microwave Access} – 4G.


It is having IEEE standard -> 802.16
Supports Mobile, Fixed and Nomadic Wireless Application.
Expected to provide you -> 75Mbps with NLOS (non-line of sight)
But it provides you speed of Gbps if the connection is in LOS (line of sight)
The principle behind any 4g network is OFDM – Orthogonal Frequency Division Multiplexing.
The bandwidth allocation of WiMAX – 5-20Mhz

40 Explain Challenges and Applications of 4G.


Challenges of 4G / Issue in 4G

 Mobility Management (MM)


MM includes location registration, paging, and handover. MS should be able to access
the service at any possible place. The handoff technique should be designed so that
they make efficient use of network and make sure that handoff is not done that often.

 Congestion Control (CC)

There are two approaches based on the connection you are using – Wired Connection - >
Detection and recovery after the congestion
This thing needs to -> have better flow control mechanism.

Wireless Connection -> Avoidance and prevention of congestion.


This thing needs to -> scheduling techniques (allocation time of station).

 Multiaccess Interface , Timing and Recovery.


 Complexity – error control, digital to analog conversion.
 Issue with another network -> adhoc network, Bluetooth, 802.11b

You might also like