CH 5
CH 5
TCP IN WIRELESS
NETWORKS
2 TC
P in wireless networks
Subject Page
10.1 Introduction 3
10.2 Comparison between OSI and TCP/IP Protocol 3-4
Suite
Chapter ten
10.1 Introduction
TCP/IP Short for Transmission Control Protocol/Internet Protocol, TCP/IP
is a set of rules (protocols) governing communications among all computers
on the Internet.
It is named from two of the most important protocols in it: The Transmission
Control Protocol (TCP) and the Internet Protocol (IP), which were the first
two networking protocols defined in this standard. Today's IP networking
represents a synthesis of several developments that began to evolve in the
1960s and 1970s, namely the Internet and LANs (Local Area Networks),
which emerged in the mid- to late-1980s, together with the advent of the
World Wide Web in the early 1990s.
The TCP/IP protocol was developed prior to the OSI model. Therefore, the
layers in the TCP/IP protocol suite do not match exactly with those in the
OSI model. The original TCP/IP protocol suite was defined as four software
layers built upon the hardware. Today, however, TCP/IP is thought of as a
five-layer model with the layers named similarly to the ones in the OSI
model. Figure 10.1 shows both configurations.
Two reasons were mentioned for this decision. First, TCP/IP has more than
one transport-layer protocol. Some of the functionalities of the session layer
are available in some of the transport layer protocols. Second, the
application layer is not only one piece of software. Many applications can
be developed at this layer. If some of the functionalities mentioned in the
session and presentation are needed for a particular application, it can be
included in the development of that piece of software.
TCP/IP is a hierarchical protocol made up of interactive modules, each of
which provides a specific functionality, but the modules are not necessarily
interdependent. Whereas the OSI model specifies which functions belong to
each of its layers, the layers of the TCP/IP protocol suite contain relatively
independent protocols that can be mixed and matched, depending on the
needs of the system. The term hierarchical means that each upper level
protocol is supported by one or more lower level protocols.
10.3 Layers in the TCP/IP Protocol Suite
We briefly discuss the purpose of each layer in the TCP/IP protocol suite.
Physical Layer: Contains all the functions needed to carry the bit
stream over a physical medium to another system
Chapter ten 5
Data Link Layer: Organizes the bit stream into a data unit called a
“frame” and delivers the frame to an adjacent system.
Network Layer: Delivers data in the form of a packet from source to
destination, across as many links as necessary, to non-adjacent
systems.
Transport Layer: Concerned with process-to-process delivery of
information.
Application Layer: Concerned with differences in internal
representation, user interfaces, and anything else that the user
requires.
10.4 Traditional TCP
The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet protocol suite, often simply referred to as TCP/IP. TCP is reliable;
guarantees in-order delivery of data and incorporates congestion control
and flow control mechanisms.
TCP supports many of the Internet's most popular application protocols and
resulting applications, including the World Wide Web, e-mail, File Transfer
Protocol and Secure Shell. In the Internet protocol suite, TCP is the
intermediate layer between the Internet layer and application layer.
The sender notices the missing acknowledgement for the lost packet and
assumes a packet loss due to congestion. Retransmitting the missing packet
and continuing at full sending rate would now be unwise, as this might only
increase the congestion. Although it is not guaranteed that all packets of the
TCP connection take the same way through the network, this assumption
holds for most of the packets. To mitigate congestion, TCP slows down the
transmission rate dramatically. All other TCP connections experiencing the
same congestion do exactly the same so the congestion is soon resolved. This
cooperation of TCP connections in the internet is one of the main reasons
for its survival as it is today. Using UDP is not a solution, because the
throughput is higher compared to a TCP connection just at the beginning.
As soon as everyone uses UDP, this advantage disappears. After that,
Chapter ten 7
Figure 10.4: Slow start and congestion avoidance when timeout occurs
Figure 10.5: Indirect TCP segments a TCP connection into two parts
Standard TCP is used between the fixed computer and the access point. No
computer in the internet recognizes any changes to TCP. Instead of the
mobile host, the access point now terminates the standard TCP connection,
acting as a proxy. This means that the access point is now seen as the mobile
host for the fixed host and as the fixed host for the mobile host. Between the
access point and the mobile host, a special TCP, adapted to wireless links, is
used. However, changing TCP for the wireless link is not a requirement. A
suitable place for segmenting the connection is at the foreign agent. As it not
only controls the mobility of the mobile host anyway and can also hand over
the connection to the next foreign agent when the mobile host moves on.
The foreign agent acts as a proxy and relays all data in both directions. If
CH (correspondent host) sends a packet to the MH, the FA (foreign agent)
acknowledges it and forwards it to the MH (mobile host). Mobile host
receives MH acknowledges on successful reception, but this is only used by
the FA (foreign agent). If a packet is lost on the wireless link, CH the
(correspondent host) doesn't observe it and FA tries to retransmit it locally
to maintain reliable data transport.
Chapter ten 11
If the MH (mobile host) sends a packet, the foreign agent acknowledges this
packet and tries to forward it to the correspondent host. If the packet is lost
on the wireless link, the mobile hosts notice this much faster due to the lower
round trip time and can directly retransmit the packet. Packet loss in the
wired network is now handled by the foreign agent.
Advantages of I-TCP
No changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work.
Transmission errors on the wireless link do not spread into the fixed
network.
Simple to control, mobile TCP is used only for one hop between, e.g.,
a foreign agent and mobile host.
Therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known.
Disadvantages of I-TCP
Loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash.
12 TC
P in wireless networks
Higher latency possible due to buffering of data within the foreign
agent and forwarding to a new foreign agent.
Security issue the foreign agent must be trusted entity.
10.7.2 Snooping TCP
The main drawback of I-TCP is the segmentation of the single TCP
connection into two TCP connections, which loses the original end-to-end
TCP semantic. Anew enhancement, which leaves the TCP connection intact
and is completely transparent, is snooping TCP. The main function is to
buffer data close to the mobile host to perform fast local retransmission in
case of packet loss.
Here, the foreign agent buffers all packets with destination mobile
host and additionally ‘snoops’ the packet flow in both directions to
recognize acknowledgements. The foreign agent buffers every packet
until it receives an acknowledgement from the mobile host. If the FA
does not receive an acknowledgement from the mobile host within a
certain amount of time, either the packet or the acknowledgement has
been lost. Alternatively, the foreign agent could receive a duplicate
ACK which also shows the loss of a packet. Now, the FA retransmits
the packet directly from the buffer thus performing a faster
retransmission compared to the CH. For transparency, the FA does
not acknowledge data to the CH, which would violate end-to-end
semantic in case of a FA failure. The foreign agent can filter the
duplicate acknowledgements to avoid unnecessary retransmissions of
data from the correspondent host. If the foreign agent now crashes,
Chapter ten 13
The SH monitors all packets sent to the MH and ACKs returned from the
MH. If the SH does not receive an ACK for some time, it assumes that the
MH is disconnected. It then chokes the sender by setting the sender's
window size to 0.setting the window size to 0 forces the sender to go into
persistent mode, i.e., the state of the sender will not change no matter
how long the receiver is disconnected. This means that the sender will
not try to retransmit data.as soon as the SH (either the old SH or a new
SH) detects connectivity again, it reopens the window of the sender to the
old value. The sender can continue sending at full speed. This mechanism
does not require changes to the sender's TCP. The wireless side uses an
Chapter ten 15
adapted TCP that can recover from packet loss much faster. This
modified TCP does not use slow start, thus, M-TCP needs a bandwidth
manager to implement fair sharing over the wireless link.
Advantages of M-TCP
It maintains the TCP end-to-end semantics. The SH does not send
any ACK itself but forwards the ACKs from the MH.
If the MH is disconnected, it avoids useless retransmissions, slow
starts or breaking connections by simply shrinking the sender's
window to 0.
As no buffering is done as in I-TCP, there is no need to forward
buffers to a new SH. Lost packets will be automatically
retransmitted to the SH.
Disadvantages of M-TCP
As the SH does not act as proxy as in I-TCP, packet loss on the wireless
link due to bit errors is propagated to the sender. M-TCP assumes low bit
error rates, which is not always a valid assumption.
A modified TCP on the wireless link not only requires modifications to
the MH protocol software but also new network elements like the
bandwidth manager.
As the mobile host may also go into slow start after moving to a new foreign
agent, this approach additionally puts the mobile host into fast retransmit.
The mobile host retransmits all unacknowledged packets using the current
congestion window size without going into slow start.
host can be informed. With a fast interruption of the wireless link, additional
mechanisms in the access point are needed to inform the correspondent host
of the reason for interruption. Otherwise, the correspondent host goes into
slow start assuming congestion and finally breaks the connection.
As soon as the MAC layer detects connectivity again, it signals TCP that it
can resume operation at exactly the same point where it had been forced to
stop. For TCP time simply does not advance, so no timers expire.
Packet is lost, and then until the timer (which could have grown to a large
value) expires, the connection remains idle resulting in underutilization of
network resources, as shown in Figure 10.12.
References
[1] Jochen H. Schiller "Mobile Communications" Second Edition.
[4] Kevin Brown and Suresh Singh " M-TCP: TCP for Mobile Cellular
Networks" July 29, 1997.