WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
The document discusses various approaches to improving TCP performance over mobile networks. Indirect TCP splits the TCP connection at the foreign agent to isolate the wireless link. Snooping TCP has the foreign agent buffer packets and retransmit lost packets locally. Mobile TCP uses a supervisory host to monitor connections and choke the sender window during disconnections. Other techniques discussed include fast retransmit/recovery after handovers, freezing TCP states during interruptions, selective retransmission of only lost packets, and transaction-oriented TCP to reduce overhead of short messages. Each approach has advantages but also disadvantages related to compatibility, transparency, and complexity.
1) Standard TCP performs poorly over wireless networks due to packet loss from errors and mobility rather than congestion. This causes unnecessary slow starts and window reductions.
2) Early approaches like Indirect TCP, Snooping TCP, and Mobile TCP split or modify the TCP connection to isolate the wireless link but lose end-to-end semantics or require changes.
3) Later techniques like forced fast retransmit and selective acknowledgements improve efficiency without changing TCP but require cooperation between layers. Overall no single solution is optimal due to the need to maintain compatibility with fixed networks.
The document discusses several mechanisms used in TCP for mobile computing. It describes:
1) TCP congestion control mechanisms like slow-start and fast retransmit/fast recovery which are designed to address packet loss. However, these can be inappropriate for wireless networks where packet loss is often due to errors rather than congestion.
2) Approaches like Indirect TCP, Snooping TCP, and Mobile TCP which modify TCP for mobile networks by splitting connections or having a supervisory host monitor the connection to enable local retransmissions and avoid unnecessary window reductions when the mobile host disconnects.
3) Other TCP optimizations for mobile like forced fast retransmit after handovers and transmission timeout freezing to avoid slow-start
This document discusses several proposals to modify TCP for use in mobile environments:
1. Indirect TCP splits the TCP connection to isolate the wireless link but loses end-to-end semantics.
2. Snooping TCP allows local retransmissions through buffering and "snooping" but does not fully isolate the wireless link.
3. Mobile TCP handles disconnections through a supervisory host but does not isolate wireless link losses.
4. Fast retransmit/recovery avoids the slow start algorithm after handovers but mixes network layers.
The approaches vary in their ability to isolate the wireless link, efficiency, and amount of modification required to TCP.
This document discusses challenges with TCP in mobile networks and various approaches to address them. It introduces indirect TCP, which splits the TCP connection to isolate the wireless link. Snooping TCP has the foreign agent snoop packets and acknowledgements to enable local retransmissions. Mobile TCP uses a supervisory host and window size adjustments to handle disconnections. Other optimizations discussed include forced fast retransmit after handovers, freezing TCP timers during disconnects, and selective retransmissions. The document compares the advantages and disadvantages of these different "mobile TCP" approaches.
The document discusses various approaches to modifying TCP for use in mobile networks. Indirect TCP splits the TCP connection at the foreign agent, keeping the fixed network unchanged but losing end-to-end semantics. Snooping TCP has the foreign agent snoop packets and retransmit lost packets locally without changing TCP. Mobile TCP uses a supervisory host to monitor disconnections and choke senders. Other approaches include forced fast retransmit after handovers, freezing TCP timers during disconnects, selective retransmission of only lost packets, and transaction-oriented TCP to combine connection setup in fewer packets. Each approach has advantages like efficiency or compatibility but also disadvantages like overhead or non-transparency.
Mobile transport layer - traditional TCPVishal Tandel
This document summarizes several mechanisms proposed to improve TCP performance in wireless networks. It discusses approaches like indirect TCP, snooping TCP, and mobile TCP that split the TCP connection to isolate the wireless link. It also covers fast retransmit/recovery techniques, transmission freezing, and selective retransmission to more efficiently handle packet losses due to mobility. While each approach aims to address TCP issues in wireless networks, they often do so by mixing layers or requiring changes to the basic TCP protocol stack.
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
This document discusses several approaches to improving TCP performance over mobile networks:
Traditional TCP uses slow start and congestion control mechanisms that reduce efficiency over mobile networks. Indirect TCP segments connections and uses a proxy to improve performance. Snooping TCP buffers packets to enable fast retransmissions without changing endpoints. Mobile TCP freezes the sender's window on disconnection to avoid unnecessary retransmissions. These methods aim to isolate wireless losses from congestion responses and enable fast recovery from errors and handovers.
This document discusses various transport layer protocols for mobile networks. It begins with an overview of TCP and UDP, and then describes several strategies for improving TCP performance over mobile networks, including indirect TCP (I-TCP), snooping TCP, and Mobile TCP. It also discusses congestion control strategies like slow start and fast retransmit. Overall, the document analyzes how TCP can be optimized through techniques like connection splitting, buffering, and selective retransmission to better accommodate the characteristics of wireless networks.
The document discusses various transport layer protocols for mobile networks, including traditional TCP, Indirect TCP, Snooping TCP, and Mobile TCP. Traditional TCP was designed for fixed networks and experiences issues in mobile networks due to factors like packet loss from handoffs. Indirect TCP splits the TCP connection at the access point to isolate the wireless link. Snooping TCP has the access point buffer packets and detect losses to enable local retransmissions. Mobile TCP uses a supervisory host to handle disconnections and restart the connection when needed. Each approach aims to improve TCP performance over mobile networks while maintaining compatibility with traditional TCP.
This document discusses various transport layer protocols for mobile networks. It begins by describing TCP and its mechanisms for congestion avoidance, flow control, slow start, and retransmission. It then covers several TCP variants including Tahoe, Reno, and Vegas. It also discusses indirect TCP, Snoop TCP, and Mobile TCP which aim to optimize TCP for wireless networks by handling retransmissions locally or splitting the connection. The document provides details on the algorithms and functioning of these different protocols.
The document discusses various approaches to improving TCP for mobile networks. It begins by describing traditional TCP and its mechanisms for congestion control and reliable data transmission. However, TCP was designed for fixed networks and faces challenges in mobile environments due to higher error rates, mobility-induced packet loss, and inefficient slow start behavior after losses. Several TCP improvements are then outlined, including Indirect TCP which segments connections and uses a proxy at the access point to isolate the wireless portion. This allows specialized TCP variants to be used for the wireless link without changing the fixed network. Finally, socket migration during handover is discussed to maintain connections as the mobile host moves.
1. Early approaches to optimize TCP for mobile networks included indirect TCP, snooping TCP, and mobile TCP. These attempted to isolate the wireless link from the fixed network or handle frequent disconnections.
2. Additional techniques explored were fast retransmit/recovery, transmission freezing, selective acknowledgements, and transaction-oriented TCP to improve efficiency over mobile links.
3. Current TCP over 2.5G/3G networks focuses on fine-tuning parameters like large windows and MTU sizes. Performance enhancing proxies are also used but break end-to-end security semantics. Open issues remain around header compression and congestion control over slow, lossy links.
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired
networks, where packet losses occur mostly because of congestion. However cellular wireless network
suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by
invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This
paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics.
The document discusses various approaches to improving TCP performance over mobile networks, including:
1. Indirect TCP which splits the TCP connection to isolate errors on the wireless link. This requires no changes to fixed network hosts but loses end-to-end semantics.
2. Snooping TCP where the foreign agent buffers packets and retransmits lost packets transparently. This maintains end-to-end semantics but does not fully isolate the wireless link.
3. Mobile TCP which splits the connection and supports lengthy disconnections by freezing transmission at disconnected base stations. However, it propagates wireless losses into the fixed network.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
The Transport Control Protocol (TCP) is used to establish and control a session between two endpoints. The problem is that in 802.11 wireless environments TCP always considers that the packet loss is caused by network congestion. However, in these networks packet loss are usually caused by the high bit error rate, and the wireless link failures. Researchers found out that TCP performance in wireless networks can be highly enhanced as long as it is feasible to identify the packet loss causes; hence appropriate measures can be dynamically applied during an established TCP session in order to adjust the session parameters. This paper proposes an endto-end adaptive mechanism that allows the TCP session to dynamically adjust the RTO (Retransmission Timeout) of a TCP session; the server will have to adjust the timers based on feedbacks from clients. Feedbacks are piggybacked in the TCP Options header field of the ACK (Acknowledgment) messages. A feedback is an approximation of the time needed by the wireless channel to get the errors fixed. The mechanism has been validated using numerical analysis and simulations, and then compared to the original TCP protocol. Simulation results have shown better performance in terms of number of retransmissions at the server side due to the decrease in the number of timeouts; and thus lowest congestion on the wireless access point.
This document summarizes key concepts from Chapter 3 of the textbook on transport layer protocols:
1. The transport layer provides logical communication between processes running on different hosts, abstracting the underlying network infrastructure. It multiplexes data from multiple sockets and demultiplexes received data to the appropriate socket.
2. UDP and TCP are the main transport protocols in the Internet. UDP is connectionless while TCP provides reliable, connection-oriented data transfer using sequence numbers, acknowledgments, and congestion control.
3. TCP uses congestion control including a congestion window, additive increase/multiplicative decrease, and slow start to dynamically control the sender's transmission rate based on detected packet loss as a signal of
TCP provides several services to applications including process-to-process communication using port numbers, reliable stream delivery of data between processes, and full-duplex communication where data can flow in both directions simultaneously. TCP uses buffers, segments, checksums, acknowledgments, timeouts, and retransmissions to provide reliable data transmission. It establishes connections between processes, delivers data in-order as a stream, and ensures all data is received correctly through error control mechanisms.
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
This document analyzes the throughput of TCP in mobile ad hoc networks through simulations. It finds that TCP throughput decreases initially as the number of hops increases, then stabilizes at higher hop counts. This is due to hidden terminal problems at low hops. The number of retransmissions increases with payloads and flows due to buffering and congestion. TCP performance degrades in wireless networks because it cannot differentiate between congestion and non-congestion packet losses. Mobility, interference, and dynamic topology changes specific to wireless networks cause unnecessary triggering of TCP congestion control mechanisms.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
Mobile Transport Layer protocols aim to address challenges with TCP over mobile networks. Traditional TCP uses congestion control like slow start and fast retransmit/recovery that can reduce performance over mobile. Indirect TCP splits the connection at the access point to avoid wireless errors affecting the wired segment. Snooping TCP buffers packets at the access point and performs local retransmissions on errors. Mobile TCP splits the connection and uses an optimized TCP between the supervisory host and mobile host, choking the sender when the mobile is disconnected to avoid buffering large amounts of undelivered data.
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
Improving the performance of the transmission
control protocol (TCP) in wireless environment has been an
active research area. Main reason behind performance
degradation of TCP is not having ability to detect actual reason
of packet losses in wireless environment. In this paper, we are
providing a simulation results for TCP-P (TCP-Performance).
TCP-P is intelligent protocol in wireless environment which
is able to distinguish actual reasons for packet losses and
applies an appropriate solution to packet loss.
TCP-P deals with main three issues, Congestion in
network, Disconnection in network and random packet losses.
TCP-P consists of Congestion avoidance algorithm and
Disconnection detection algorithm with some changes in TCP
header part. If congestion is occurring in network then
congestion avoidance algorithm is applied. In congestion
avoidance algorithm, TCP-P calculates number of sending
packets and receiving acknowledgements and accordingly set
a sending buffer value, so that it can prevent system from
happening congestion. In disconnection detection algorithm,
TCP-P senses medium continuously to detect a happening
disconnection in network. TCP-P modifies header of TCP
packet so that loss packet can itself notify sender that it is
lost.This paper describes the design of TCP-P, and presents
results from experiments using the NS-2 network simulator.
Results from simulations show that TCP-P is 4% more
efficient than TCP-Tahoe, 5% more efficient than TCP-Vegas,
7% more efficient than TCP-Sack and equally efficient in
performance as of TCP-Reno and TCP-New Reno. But we can
say TCP-P is more efficient than TCP-Reno and TCP-New
Reno since it is able to solve more issues of TCP in wireless
environment.
Mobile transport layer - traditional TCPVishal Tandel
This document summarizes several mechanisms proposed to improve TCP performance in wireless networks. It discusses approaches like indirect TCP, snooping TCP, and mobile TCP that split the TCP connection to isolate the wireless link. It also covers fast retransmit/recovery techniques, transmission freezing, and selective retransmission to more efficiently handle packet losses due to mobility. While each approach aims to address TCP issues in wireless networks, they often do so by mixing layers or requiring changes to the basic TCP protocol stack.
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
This document discusses several approaches to improving TCP performance over mobile networks:
Traditional TCP uses slow start and congestion control mechanisms that reduce efficiency over mobile networks. Indirect TCP segments connections and uses a proxy to improve performance. Snooping TCP buffers packets to enable fast retransmissions without changing endpoints. Mobile TCP freezes the sender's window on disconnection to avoid unnecessary retransmissions. These methods aim to isolate wireless losses from congestion responses and enable fast recovery from errors and handovers.
This document discusses various transport layer protocols for mobile networks. It begins with an overview of TCP and UDP, and then describes several strategies for improving TCP performance over mobile networks, including indirect TCP (I-TCP), snooping TCP, and Mobile TCP. It also discusses congestion control strategies like slow start and fast retransmit. Overall, the document analyzes how TCP can be optimized through techniques like connection splitting, buffering, and selective retransmission to better accommodate the characteristics of wireless networks.
The document discusses various transport layer protocols for mobile networks, including traditional TCP, Indirect TCP, Snooping TCP, and Mobile TCP. Traditional TCP was designed for fixed networks and experiences issues in mobile networks due to factors like packet loss from handoffs. Indirect TCP splits the TCP connection at the access point to isolate the wireless link. Snooping TCP has the access point buffer packets and detect losses to enable local retransmissions. Mobile TCP uses a supervisory host to handle disconnections and restart the connection when needed. Each approach aims to improve TCP performance over mobile networks while maintaining compatibility with traditional TCP.
This document discusses various transport layer protocols for mobile networks. It begins by describing TCP and its mechanisms for congestion avoidance, flow control, slow start, and retransmission. It then covers several TCP variants including Tahoe, Reno, and Vegas. It also discusses indirect TCP, Snoop TCP, and Mobile TCP which aim to optimize TCP for wireless networks by handling retransmissions locally or splitting the connection. The document provides details on the algorithms and functioning of these different protocols.
The document discusses various approaches to improving TCP for mobile networks. It begins by describing traditional TCP and its mechanisms for congestion control and reliable data transmission. However, TCP was designed for fixed networks and faces challenges in mobile environments due to higher error rates, mobility-induced packet loss, and inefficient slow start behavior after losses. Several TCP improvements are then outlined, including Indirect TCP which segments connections and uses a proxy at the access point to isolate the wireless portion. This allows specialized TCP variants to be used for the wireless link without changing the fixed network. Finally, socket migration during handover is discussed to maintain connections as the mobile host moves.
1. Early approaches to optimize TCP for mobile networks included indirect TCP, snooping TCP, and mobile TCP. These attempted to isolate the wireless link from the fixed network or handle frequent disconnections.
2. Additional techniques explored were fast retransmit/recovery, transmission freezing, selective acknowledgements, and transaction-oriented TCP to improve efficiency over mobile links.
3. Current TCP over 2.5G/3G networks focuses on fine-tuning parameters like large windows and MTU sizes. Performance enhancing proxies are also used but break end-to-end security semantics. Open issues remain around header compression and congestion control over slow, lossy links.
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired
networks, where packet losses occur mostly because of congestion. However cellular wireless network
suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by
invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This
paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics.
The document discusses various approaches to improving TCP performance over mobile networks, including:
1. Indirect TCP which splits the TCP connection to isolate errors on the wireless link. This requires no changes to fixed network hosts but loses end-to-end semantics.
2. Snooping TCP where the foreign agent buffers packets and retransmits lost packets transparently. This maintains end-to-end semantics but does not fully isolate the wireless link.
3. Mobile TCP which splits the connection and supports lengthy disconnections by freezing transmission at disconnected base stations. However, it propagates wireless losses into the fixed network.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
The Transport Control Protocol (TCP) is used to establish and control a session between two endpoints. The problem is that in 802.11 wireless environments TCP always considers that the packet loss is caused by network congestion. However, in these networks packet loss are usually caused by the high bit error rate, and the wireless link failures. Researchers found out that TCP performance in wireless networks can be highly enhanced as long as it is feasible to identify the packet loss causes; hence appropriate measures can be dynamically applied during an established TCP session in order to adjust the session parameters. This paper proposes an endto-end adaptive mechanism that allows the TCP session to dynamically adjust the RTO (Retransmission Timeout) of a TCP session; the server will have to adjust the timers based on feedbacks from clients. Feedbacks are piggybacked in the TCP Options header field of the ACK (Acknowledgment) messages. A feedback is an approximation of the time needed by the wireless channel to get the errors fixed. The mechanism has been validated using numerical analysis and simulations, and then compared to the original TCP protocol. Simulation results have shown better performance in terms of number of retransmissions at the server side due to the decrease in the number of timeouts; and thus lowest congestion on the wireless access point.
This document summarizes key concepts from Chapter 3 of the textbook on transport layer protocols:
1. The transport layer provides logical communication between processes running on different hosts, abstracting the underlying network infrastructure. It multiplexes data from multiple sockets and demultiplexes received data to the appropriate socket.
2. UDP and TCP are the main transport protocols in the Internet. UDP is connectionless while TCP provides reliable, connection-oriented data transfer using sequence numbers, acknowledgments, and congestion control.
3. TCP uses congestion control including a congestion window, additive increase/multiplicative decrease, and slow start to dynamically control the sender's transmission rate based on detected packet loss as a signal of
TCP provides several services to applications including process-to-process communication using port numbers, reliable stream delivery of data between processes, and full-duplex communication where data can flow in both directions simultaneously. TCP uses buffers, segments, checksums, acknowledgments, timeouts, and retransmissions to provide reliable data transmission. It establishes connections between processes, delivers data in-order as a stream, and ensures all data is received correctly through error control mechanisms.
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
This document analyzes the throughput of TCP in mobile ad hoc networks through simulations. It finds that TCP throughput decreases initially as the number of hops increases, then stabilizes at higher hop counts. This is due to hidden terminal problems at low hops. The number of retransmissions increases with payloads and flows due to buffering and congestion. TCP performance degrades in wireless networks because it cannot differentiate between congestion and non-congestion packet losses. Mobility, interference, and dynamic topology changes specific to wireless networks cause unnecessary triggering of TCP congestion control mechanisms.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
Mobile Transport Layer protocols aim to address challenges with TCP over mobile networks. Traditional TCP uses congestion control like slow start and fast retransmit/recovery that can reduce performance over mobile. Indirect TCP splits the connection at the access point to avoid wireless errors affecting the wired segment. Snooping TCP buffers packets at the access point and performs local retransmissions on errors. Mobile TCP splits the connection and uses an optimized TCP between the supervisory host and mobile host, choking the sender when the mobile is disconnected to avoid buffering large amounts of undelivered data.
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
Improving the performance of the transmission
control protocol (TCP) in wireless environment has been an
active research area. Main reason behind performance
degradation of TCP is not having ability to detect actual reason
of packet losses in wireless environment. In this paper, we are
providing a simulation results for TCP-P (TCP-Performance).
TCP-P is intelligent protocol in wireless environment which
is able to distinguish actual reasons for packet losses and
applies an appropriate solution to packet loss.
TCP-P deals with main three issues, Congestion in
network, Disconnection in network and random packet losses.
TCP-P consists of Congestion avoidance algorithm and
Disconnection detection algorithm with some changes in TCP
header part. If congestion is occurring in network then
congestion avoidance algorithm is applied. In congestion
avoidance algorithm, TCP-P calculates number of sending
packets and receiving acknowledgements and accordingly set
a sending buffer value, so that it can prevent system from
happening congestion. In disconnection detection algorithm,
TCP-P senses medium continuously to detect a happening
disconnection in network. TCP-P modifies header of TCP
packet so that loss packet can itself notify sender that it is
lost.This paper describes the design of TCP-P, and presents
results from experiments using the NS-2 network simulator.
Results from simulations show that TCP-P is 4% more
efficient than TCP-Tahoe, 5% more efficient than TCP-Vegas,
7% more efficient than TCP-Sack and equally efficient in
performance as of TCP-Reno and TCP-New Reno. But we can
say TCP-P is more efficient than TCP-Reno and TCP-New
Reno since it is able to solve more issues of TCP in wireless
environment.
Cellular Concepts by Mian Shehzad Iqbal,
Earlier systems used single high power
transmitter. So no frequency reuse
• Cellular concept solve the problem of spectral
congestion and user capacity without any major
technological changes.
• Replaces single high power transmitter with
many low power transmitters.
• Each base station is allocated portion of
available channels.
• Distribution to neighbors so that minimize
interference.
Hexagonal shape is only logical shape.
Actual coverage of cell is known as
footprint and is determined by
measurements and prediction models.
Cell must be designed to serve the
weakest mobile at edge in footprint.
MSC plays major role by monitoring reuse
distance, cost function and other issues. • MSC
needs to collect real time data on channel
occupancy, traffic distribution and radio signal
strength indications (RSSI) this increases the
storage and computational load but provides the
advantage of increased channel utilization and
decreased probability of blocked calls.
Wireless Ad Hoc Networking Lecture NotesDrAdeelAkram2
This document provides an outline and overview of a paper on wireless ad hoc networks. The paper discusses IEEE 802.11 standards, the open systems interconnection model, layers of the network including physical, datalink, network and transport layers. It compares ad hoc and infrastructure network topologies and discusses applications and future implementations of ad hoc networks such as for personal, military and emergency use.
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
The document discusses grid architecture and tools. It covers the hourglass model of grid architecture, which focuses on core services to enable diverse solutions. It also discusses the layered grid architecture with four layers - fabric, connectivity, collective, and application. Simulation tools for modeling grid environments like GridSim are presented. The document then discusses clouds and defines cloud computing. Key aspects of clouds like scalability, virtualization, and on-demand services are covered. It compares clouds to grids and other paradigms. Finally, it introduces service-oriented architecture and defines the characteristics of services.
Grid and Cloud Computing Lecture 1a.pptxDrAdeelAkram2
This document provides an introduction to grid and cloud computing. It discusses the evolution of distributed computing including scalable computing over the internet, cluster computing, grid infrastructures, and cloud computing. Key topics covered include distributed system architectures, applications, advantages, disadvantages, and challenges related to heterogeneity, openness, transparency, security, scalability, and failure handling in distributed systems. Grid computing and cloud computing are presented as forms of distributed computing that share resources over a network.
Lecture on Internet Scale Sensor SystemsDrAdeelAkram2
This lecture provides an overview of an introductory course on internet-scale sensor systems design and policy. It outlines the course topics which include networking, databases, security, and privacy policy as they relate to sensor systems. It also introduces different types of sensor systems including smart dust motes and more powerful "brilliant rocks." The lecture describes the IrisNet research prototype and example applications. Requirements and logistics for the course projects and materials are also reviewed.
1. The document discusses big data and the use of AI in IoT applications. As more devices become connected through IoT, they will generate huge amounts of data.
2. This big data from connected devices can be used to create a "Digital Twin" of the physical world. AI analysis of the Digital Twin is expected to drive optimization, automation, and new business models and products.
3. The document provides examples of how IoT can be applied in various fields like smart factories, smart grids, and connected supply chains. It also discusses issues like devices generating data faster than IT can process it.
Amazon Echo Introduction, Capabilities and VulnerabilitiesDrAdeelAkram2
The document discusses home security, entertainment, and information functions of Alexa SmartHome. It also discusses vulnerabilities in computer security that could apply to Alexa, including system susceptibility, attacker access to flaws, and ability to exploit flaws. Some key concerns discussed are a lack of voice recognition, storage of data in the cloud, and potential privacy issues like personal information being leaked or bank details accessed by unauthorized users. Recommendations are made around adding voice recognition of the owner, firewalls, and security measures for linked credentials and online banking access.
Deepfake Phishing: A New Frontier in Cyber ThreatsRaviKumar256934
n today’s hyper-connected digital world, cybercriminals continue to develop increasingly sophisticated methods of deception. Among these, deepfake phishing represents a chilling evolution—a combination of artificial intelligence and social engineering used to exploit trust and compromise security.
Deepfake technology, once a novelty used in entertainment, has quickly found its way into the toolkit of cybercriminals. It allows for the creation of hyper-realistic synthetic media, including images, audio, and videos. When paired with phishing strategies, deepfakes can become powerful weapons of fraud, impersonation, and manipulation.
This document explores the phenomenon of deepfake phishing, detailing how it works, why it’s dangerous, and how individuals and organizations can defend themselves against this emerging threat.
Optimization techniques can be divided to two groups: Traditional or numerical methods and methods based on stochastic. The essential problem of the traditional methods, that by searching the ideal variables are found for the point that differential reaches zero, is staying in local optimum points, can not solving the non-linear non-convex problems with lots of constraints and variables, and needs other complex mathematical operations such as derivative. In order to satisfy the aforementioned problems, the scientists become interested on meta-heuristic optimization techniques, those are classified into two essential kinds, which are single and population-based solutions. The method does not require unique knowledge to the problem. By general knowledge the optimal solution can be achieved. The optimization methods based on population can be divided into 4 classes from inspiration point of view and physical based optimization methods is one of them. Physical based optimization algorithm: that the physical rules are used for updating the solutions are:, Lighting Attachment Procedure Optimization (LAPO), Gravitational Search Algorithm (GSA) Water Evaporation Optimization Algorithm, Multi-Verse Optimizer (MVO), Galaxy-based Search Algorithm (GbSA), Small-World Optimization Algorithm (SWOA), Black Hole (BH) algorithm, Ray Optimization (RO) algorithm, Artificial Chemical Reaction Optimization Algorithm (ACROA), Central Force Optimization (CFO) and Charged System Search (CSS) are some of physical methods. In this paper physical and physic-chemical phenomena based optimization methods are discuss and compare with other optimization methods. Some examples of these methods are shown and results compared with other well known methods. The physical phenomena based methods are shown reasonable results.
The main purpose of the current study was to formulate an empirical expression for predicting the axial compression capacity and axial strain of concrete-filled plastic tubular specimens (CFPT) using the artificial neural network (ANN). A total of seventy-two experimental test data of CFPT and unconfined concrete were used for training, testing, and validating the ANN models. The ANN axial strength and strain predictions were compared with the experimental data and predictions from several existing strength models for fiber-reinforced polymer (FRP)-confined concrete. Five statistical indices were used to determine the performance of all models considered in the present study. The statistical evaluation showed that the ANN model was more effective and precise than the other models in predicting the compressive strength, with 2.8% AA error, and strain at peak stress, with 6.58% AA error, of concrete-filled plastic tube tested under axial compression load. Similar lower values were obtained for the NRMSE index.
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia
In the world of technology, Jacob Murphy Australia stands out as a Junior Software Engineer with a passion for innovation. Holding a Bachelor of Science in Computer Science from Columbia University, Jacob's forte lies in software engineering and object-oriented programming. As a Freelance Software Engineer, he excels in optimizing software applications to deliver exceptional user experiences and operational efficiency. Jacob thrives in collaborative environments, actively engaging in design and code reviews to ensure top-notch solutions. With a diverse skill set encompassing Java, C++, Python, and Agile methodologies, Jacob is poised to be a valuable asset to any software development team.
Introduction to ANN, McCulloch Pitts Neuron, Perceptron and its Learning
Algorithm, Sigmoid Neuron, Activation Functions: Tanh, ReLu Multi- layer Perceptron
Model – Introduction, learning parameters: Weight and Bias, Loss function: Mean
Square Error, Back Propagation Learning Convolutional Neural Network, Building
blocks of CNN, Transfer Learning, R-CNN,Auto encoders, LSTM Networks, Recent
Trends in Deep Learning.
This research presents the optimization techniques for reinforced concrete waffle slab design because the EC2 code cannot provide an efficient and optimum design. Waffle slab is mostly used where there is necessity to avoid column interfering the spaces or for a slab with large span or as an aesthetic purpose. Design optimization has been carried out here with MATLAB, using genetic algorithm. The objective function include the overall cost of reinforcement, concrete and formwork while the variables comprise of the depth of the rib including the topping thickness, rib width, and ribs spacing. The optimization constraints are the minimum and maximum areas of steel, flexural moment capacity, shear capacity and the geometry. The optimized cost and slab dimensions are obtained through genetic algorithm in MATLAB. The optimum steel ratio is 2.2% with minimum slab dimensions. The outcomes indicate that the design of reinforced concrete waffle slabs can be effectively carried out using the optimization process of genetic algorithm.
Design of Variable Depth Single-Span Post.pdfKamel Farid
Hunched Single Span Bridge: -
(HSSBs) have maximum depth at ends and minimum depth at midspan.
Used for long-span river crossings or highway overpasses when:
Aesthetically pleasing shape is required or
Vertical clearance needs to be maximized
Design of Variable Depth Single-Span Post.pdfKamel Farid
Ad
Wireless Networks: Transport Protocols Lecture
1. Wireless Networks: Transport Protocols 1
Wireless Networks:
Transport Protocols
Motivation
TCP-mechanisms
Indirect TCP
Snooping TCP
Mobile TCP
Fast retransmit/recovery
Transmission freezing
Selective retransmission
Transaction oriented TCP
Adapted from J. Schiller, “Mobile Communications”, Chapter 10
2. Wireless Networks: Transport Protocols 2
Motivation I
Transport protocols typically designed for
Fixed end-systems
Fixed, wired networks
Research activities
Performance
Congestion control
Efficient retransmissions
TCP congestion control
packet loss in fixed networks typically due to (temporary) overload
situations
router have to discard packets as soon as the buffers are full
TCP recognizes congestion only indirect via missing
acknowledgements, retransmissions unwise, they would only
contribute to the congestion and make it even worse
slow-start algorithm as reaction
3. Wireless Networks: Transport Protocols 3
Motivation II
TCP slow-start algorithm
sender calculates a congestion window for a receiver
start with a congestion window size equal to one segment
exponential increase of the congestion window up to the congestion
threshold, then linear increase
missing acknowledgement causes the reduction of the congestion
threshold to one half of the current congestion window
congestion window starts again with one segment
TCP fast retransmit/fast recovery
TCP sends an acknowledgement only after receiving a packet
if a sender receives several acknowledgements for the same packet,
this is due to a gap in received packets at the receiver
however, the receiver got all packets up to the gap and is actually
receiving packets
therefore, packet loss is not due to congestion, continue with current
congestion window (do not use slow-start)
4. Wireless Networks: Transport Protocols 4
Influences of mobility on TCP-mechanisms
TCP assumes congestion if packets are dropped
typically wrong in wireless networks, here we often have packet
loss due to transmission errors
furthermore, mobility itself can cause packet loss, if e.g. a mobile
node roams from one access point (e.g. foreign agent in Mobile IP)
to another while there are still packets in transit to the wrong
access point and forwarding is not possible
The performance of an unchanged TCP degrades severely
however, TCP cannot be changed fundamentally due to the large
base of installation in the fixed network, TCP for mobility has to
remain compatible
the basic TCP mechanisms keep the whole Internet together
5. Wireless Networks: Transport Protocols 5
Indirect TCP I
Indirect TCP or I-TCP segments the connection
no changes to the TCP protocol for hosts connected to the wired
Internet, millions of computers use (variants of) this protocol
optimized TCP protocol for mobile hosts
splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
hosts in the fixed part of the net do not notice the characteristics of
the wireless part
mobile host
access point
(foreign agent) „wired“ Internet
„wireless“ TCP standard TCP
6. Wireless Networks: Transport Protocols 6
I-TCP socket and state migration
mobile host
access point2
Internet
access point1
socket migration
and state transfer
7. Wireless Networks: Transport Protocols 7
Indirect TCP II
Advantages
no changes in the fixed network necessary, no changes for the hosts
(TCP protocol) necessary, all current optimizations to TCP still work
transmission errors on the wireless link do not propagate into the fixed
network
simple to control, mobile TCP is used only for one hop between, e.g.,
a foreign agent and mobile host
therefore, a very fast retransmission of packets is possible, the short
delay on the mobile hop is known
Disadvantages
loss of end-to-end semantics, an acknowledgement to a sender does
now not any longer mean that a receiver really got a packet, foreign
agents might crash
higher latency possible due to buffering of data within the foreign agent
and forwarding to a new foreign agent
8. Wireless Networks: Transport Protocols 8
Snooping TCP I
„Transparent“ extension of TCP within the foreign agent
buffering of packets sent to the mobile host
lost packets on the wireless link (both directions!) will be
retransmitted immediately by the mobile host or foreign agent,
respectively (so called “local” retransmission)
the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
changes of TCP only within the foreign agent (+min. MH change)
„wired“ Internet
buffering of data
end-to-end TCP connection
local retransmission correspondent
host
foreign
agent
mobile
host
snooping of ACKs
9. Wireless Networks: Transport Protocols 9
Snooping TCP II
Data transfer to the mobile host
FA buffers data until it receives ACK of the MH, FA detects packet
loss via duplicated ACKs or time-out
fast retransmission possible, transparent for the fixed network
Data transfer from the mobile host
FA detects packet loss on the wireless link via sequence numbers,
FA answers directly with a NACK to the MH
MH can now retransmit data with only a very short delay
Integration of the MAC layer
MAC layer often has similar mechanisms to those of TCP
thus, the MAC layer can already detect duplicated packets due to
retransmissions and discard them
Problems
snooping TCP does not isolate the wireless link as good as I-TCP
snooping might be useless depending on encryption schemes
10.8.1
10. Wireless Networks: Transport Protocols 10
Mobile TCP
Special handling of lengthy and/or frequent disconnections
M-TCP splits as I-TCP does
unmodified TCP fixed network to supervisory host (SH)
optimized TCP SH to MH
Supervisory host
no caching, no retransmission
monitors all packets, if disconnection detected
set sender window size to 0
sender automatically goes into persistent mode
old or new SH reopen the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network
adapted TCP on wireless link
11. Wireless Networks: Transport Protocols 11
Fast retransmit/fast recovery
Change of foreign agent often results in packet loss
TCP reacts with slow-start although there is no congestion
Forced fast retransmit
as soon as the mobile host has registered with a new foreign agent,
the MH sends duplicated acknowledgements on purpose
this forces the fast retransmit mode at the communication partners
additionally, the TCP on the MH is forced to continue sending with
the actual window size and not to go into slow-start after
registration
Advantage
simple changes result in significant higher performance
Disadvantage
further mix of IP and TCP (to know when there is a new
registration), no transparent approach
10.10.1
12. Wireless Networks: Transport Protocols 12
Transmission/time-out freezing
Mobile hosts can be disconnected for a longer time
no packet exchange possible, e.g., in a tunnel, disconnection due to
overloaded cells or mux. with higher priority traffic
TCP disconnects after time-out completely
TCP freezing
MAC layer is often able to detect interruption in advance
MAC can inform TCP layer of upcoming loss of connection
TCP stops sending, but does now not assume a congested link
MAC layer signals again if reconnected
Advantage
scheme is independent of data and TCP mechanisms (Ack,SN) =>
works even with IPsec
Disadvantage
TCP on mobile host has to be changed, mechanism depends on
MAC layer
13. Wireless Networks: Transport Protocols 13
Selective retransmission
TCP acknowledgements are often cumulative
ACK n acknowledges correct and in-sequence receipt of packets up
to n
if single packets are missing quite often a whole packet sequence
beginning at the gap has to be retransmitted (go-back-n), thus
wasting bandwidth
Selective retransmission as one solution
RFC2018 allows for acknowledgements of single packets, not only
acknowledgements of in-sequence packet streams without gaps
sender can now retransmit only the missing packets
Advantage
much higher efficiency
Disadvantage
more complex software in a receiver, more buffer needed at the
receiver
14. Wireless Networks: Transport Protocols 14
Transaction oriented TCP
TCP phases
connection setup, data transmission, connection release
using 3-way-handshake needs 3 packets for setup and release,
respectively
thus, even short messages need a minimum of 7 packets!
Transaction oriented TCP
RFC1644, T-TCP, describes a TCP version to avoid this overhead
connection setup, data transfer and connection release can be
combined
thus, only 2 or 3 packets are needed
Advantage
efficiency
Disadvantage
requires changed TCP
mobility not longer transparent
15. Wireless Networks: Transport Protocols 15
Comparison of different approaches for a “mobile” TCP
Approach Mechanism Advantages Disadvantages
Indirect TCP splits TCP connection
into two connections
isolation of wireless
link, simple
loss of TCP semantics,
higher latency at
handover
Snooping TCP “snoops” data and
acknowledgements, local
retransmission
transparent for end-to-
end connection, MAC
integration possible
problematic with
encryption, bad isolation
of wireless link
M-TCP splits TCP connection,
chokes sender via
window size
Maintains end-to-end
semantics, handles
long term and frequent
disconnections
Bad isolation of wireless
link, processing
overhead due to
bandwidth management
Fast retransmit/
fast recovery
avoids slow-start after
roaming
simple and efficient mixed layers, not
transparent
Transmission/
time-out freezing
freezes TCP state at
disconnect, resumes
after reconnection
independent of content
or encryption, works for
longer interrupts
changes in TCP
required, MAC
dependant
Selective
retransmission
retransmit only lost data very efficient slightly more complex
receiver software, more
buffer needed
Transaction
oriented TCP
combine connection
setup/release and data
transmission
Efficient for certain
applications
changes in TCP
required, not transparent
Editor's Notes
#2: How does TCP start: he doesn’t know the sustainable rate of the network: slow start, mult decr./add incr., …
#10: Problems with timer that can grow to 1min even if the connection comes back…
How is the timer computed in TCP