0% found this document useful (0 votes)
20 views10 pages

TypesofTCP 1

TCP

Uploaded by

banaroy57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

TypesofTCP 1

TCP

Uploaded by

banaroy57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

TYPES OF TRANSMISSION

CONTROL PROTOCOL (TCP)


TRADITIONAL TCP

This basically highlights several mechanisms of the transmission control protocol that
influence the efficiency of TCP in a mobile environment.

Following are some of the major aspects of TCP:

1. Congestion Control:

During data transmission from sender to receiver, sometimes the data packet may be lost.

Whenever the packet loss is confirmed, the probable reason might be the temporary
overload at some point in the transmission path, which eventually termed as Congestion.
Congestion is caused often even when the network is designed perfectly.
The transmission speed of receiver may not be equal to the transmission speed of
the sender.

The only thing a router can do in this situation is to drop some packets.

How to avoid congestion?

The receiver sense the packet loss but does not send message regarding packet
loss to the sender.

Instead, the receiver starts to send acknowledgement for all the received packets
and the sender soon identifies the missing acknowledgement.

The sender now notices that a packet is lost and slows down the transmission
process. By this, the congestion is reduced.
2. Slow Start :

The sender always calculates a congestion window for a receiver. At first


the sender sends a packet and waits for the acknowledgement.

Once the acknowledgement is back it doubles the packet size and sends
two packets.

After receiving two acknowledgements, one for each packet, the sender
again doubles the packet size and this process continues.

This is called Exponential growth.


3. Fast Re-transmission:

In TCP, two things lead to a reduction of the congestion threshold.


One of those is sender receiving continuous acknowledgements for
the single packet.

By this it can convey either of two things. One such thing is that the
receiver received all the packets up to the acknowledged one and
the other thing is the gap is due to packet loss.

Now the sender immediately re-transmit the missing packet before


the given time expires. This is called as Fast re-transmission.
Why does traditional TCP, is insufficient for
mobile computing?
Even though traditional TCP is one of the core protocols in the
Internet protocol suite, primarily used for reliable, connection-
oriented data transfer between devices over IP networks, however it
is not ideally suited for mobile environments because of the two
following major drawbacks:

i. TCP performs poorly together with wireless links.


ii. TCP within the fixed network cannot be changed.
INDIRECT TCP(I-TCP)

Indirect TCP divides traditional TCP into 2 parts.

Basically, it segments TCP connection into a fixed part and a wireless


part.
Advantages of I-TCP

i. Transmission of errors on wireless cannot propagate to wired TCP.

ii. Systems can be controlled independently

Disadvantages of I-TCP

i. Correspondent node is not aware of partitioning and thereby crashing access


node may crash application running on corresponding node.

ii. Foreign agent must be trustworthy , otherwise security problems may arrive.
SNOOPING TCP

In this approach, the foreign agent buffers all packets with destination
mobile host and additionally ‘snoops’ the packet flow in both directions to recognize
acknowledgements .

Here foreign agent sends acknowledgement to both the sides after receiving itself.
Advantages of Snooping TCP

i. TCP is preserved.
ii. Handover isn’t required immediately.
iii. Faster transmission.

Disadvantages of Snooping TCP

i. Snooping TCP does not work on encrypted data.

ii. The use of negative acknowledgement


( NACK )between the foreign agent and the mobile node
requires the mobile node to have additional mechanisms.

You might also like