Chapter 8 MOBILE IP AND TCP

Similar documents
TCP for Wireless Networks

Mobile Communications Chapter 9: Mobile Transport Layer

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Wireless Networks: Network Protocols/Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

TCP in Wireless Mobile Networks

Tomás P. de Miguel DIT-UPM. dit UPM

CS268 Exam Solutions. 1) End-to-End (20 pts)

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Ethernet. Ethernet. Network Devices

Mobile Computing/ Mobile Networks

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

(Refer Slide Time: 01:38 01:37)

TCP/IP Networking for Wireless Systems. Integrated Communication Systems Group Ilmenau University of Technology

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Mobility (and philosophical questions about names and identity) David Andersen CMU CS The problem

Final for ECE374 05/06/13 Solution!!

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Static and Dynamic Network Configuration

Network Security TCP/IP Refresher

Mobility on IPv6 Networks

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

ProCurve Networking IPv6 The Next Generation of Networking

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

How To Write A Transport Layer Protocol For Wireless Networks

8.2 The Internet Protocol

6 Mobility Management

Application Protocols for TCP/IP Administration

Internet Control Protocols Reading: Chapter 3

IP address format: Dotted decimal notation:

Network Protocol Configuration

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Lecture Computer Networks

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

HOST AUTO CONFIGURATION (BOOTP, DHCP)

RARP: Reverse Address Resolution Protocol

Transport Layer Protocols

IP - The Internet Protocol

Computer Networks. Chapter 5 Transport Protocols

How do I get to

Improved Digital Media Delivery with Telestream HyperLaunch

Congestions and Control Mechanisms n Wired and Wireless Networks

Introduction to IP v6

Troubleshooting Tools

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

21.4 Network Address Translation (NAT) NAT concept

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

More Internet Support Protocols

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

TCP over Wireless Networks

Transport and Network Layer

Mobile IP Part I: IPv4

IPv6 Advantages. Yanick Pouffary.

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

TCP in Wireless Networks

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Getting started with IPv6 on Linux

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

[Prof. Rupesh G Vaishnav] Page 1

Analysis and Comparison of Different Host Mobility Approaches

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

High Performance VPN Solutions Over Satellite Networks

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Network layer: Overview. Network layer functions IP Routing and forwarding

Protocols and Architecture. Protocol Architecture.

Introduction to TCP/IP

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

BASIC ANALYSIS OF TCP/IP NETWORKS

Chapter 9. IP Secure

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

Technical Support Information Belkin internal use only

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

2. IP Networks, IP Hosts and IP Ports

DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IP Routing Features. Contents

CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA

A DHCP Primer. Dario Laverde, 2002 Dario Laverde

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Dynamic Home Agent Reassignment in Mobile IP

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Firewall Implementation

Networking Test 4 Study Guide

Review: Lecture 1 - Internet History

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Transcription:

Distributed Computing Group Chapter 8 MOBILE IP AND TCP Mobile Computing Summer 2002 Overview Network Protocols / Mobile IP Motivation Data transfer Encapsulation Problems DHCP Mobile Transport Layer / TCP Motivation Various TCP mechanisms Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/2 Motivation for Mobile IP Requirements to Mobile IP (RFC 2002) Routing based on IP destination address, prefix (e.g. 129.132.13) determines physical subnet change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables Changing the IP-address? adjust the host IP address depending on the current location almost impossible to find a mobile system, DNS updates are too slow TCP connections break security problems Change/Add routing table entries for mobile hosts? worldwide! does not scale with the number of mobile hosts and frequent changes in their location Compatibility support of the same layer 2 protocols as IP no changes to current end-systems and s required mobile end-systems can communicate with fixed systems Transparency mobile end-systems keep their IP address continuation of communication after interruption of link possible point of connection to the fixed can be changed Efficiency and scalability only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) world-wide support of a large number of mobile systems Security authentication of all messages Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/3 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/4

Example Data transfer to the mobile system 2 home (physical home for the ) end-system mobile end-system (current physical for the ) home sender 1 3 receiver 1. Sender sends to the IP address of, intercepts packet (proxy ARP) 2. tunnels packet to COA, here, by encapsulation 3. forwards the packet to the Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/5 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/6 Data transfer from the mobile system Terminology home receiver 1 sender 1. Sender sends to the IP address of the receiver as usual, works as default Mobile Node () system (node) that can change the point of connection to the without changing its IP address Home Agent () system in the home of the, typically a registers the location of the, tunnels IP grams to the COA Foreign Agent () system in the current of the, typically a typically the default for the Care-of Address (COA) address of the current tunnel end-point for the (at or ) actual location of the from an IP point of view can be chosen, e.g., via DHCP Correspondent Node () Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/7 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/8

Overview Network integration home home 1. 2. COA 3. 4. Agent Advertisement and periodically send advertisement messages into their physical subnets listens to these messages and detects, if it is in the home or a (standard case for home ) reads a COA from the advertisement messages Registration (always limited lifetime!) signals COA to the via the, acknowledges via to these actions have to be secured by authentication Advertisement advertises the IP address of the (as for fixed systems), i.e. standard routing information s adjust their entries, these are stable for a longer time ( responsible for a over a longer period of time) packets to the are sent to the, independent of changes in COA/ Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/9 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/10 Agent advertisement Registration 0 7 8 15 16 23 24 31 type #addresses code addr. size checksum lifetime address 1 preference level 1 address 2 preference level 2... type length sequence number lifetime R B H F M G V reserved COA 1 COA 2... COA @ : COA @ : t request request reply reply t request reply Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/11 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/12

Mobile IP request Tunneling and Encapsulation 0 7 8 15 16 23 24 31 type S B DMG V rsv home address lifetime home agent COA identification new IP header original IP header new original extensions... outer header inner header original Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/13 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/14 IP-in-IP Encapsulation Minimal Encapsulation Mandatory in RFC 2003 tunnel between and COA optional avoids repetition of identical fields such as TTL, IHL, version, TOS only applicable for unfragmented packets, no space left for fragment identification ver. IHL TOS length IP identification flags fragment offset TTL IP-in-IP IP checksum IP address of Care-of address COA ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of IP address of TCP/UDP/... payload ver. IHL TOS length IP identification flags fragment offset TTL min. encap. IP checksum IP address of care-of address COA lay. 4 protoc. S reserved IP checksum IP address of IP address of (only if S=1) TCP/UDP/... payload Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/15 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/16

Generic Routing Encapsulation Optimization of packet forwarding ver. IHL TOS length IP identification flags fragment offset TTL GRE IP checksum IP address of Care-of address COA CR K S s rec. rsv. ver. protocol checksum (optional) offset (optional) key (optional) sequence number (optional) routing (optional) ver. IHL TOS length IP identification flags fragment offset TTL lay. 4 prot. IP checksum IP address of IP address of outer header new header GRE header original header original header new original original Triangular Routing sender sends all packets via to higher latency and load Solutions sender learns the current location of direct tunneling to this location informs a sender about the location of big security problems Change of packets on-the-fly during the change can be lost new informs old to avoid packet loss, old now forwards remaining packets to new this information also enables the old to release resources for the TCP/UDP/... payload Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/17 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/18 Change of agent Data transfer from the mobile system old new request update ACK 1 warning update ACK changes location home sender update ACK t receiver Problems: Firewall at TTL Multicast Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/19 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/20

Reverse tunneling (RFC 2344) Mobile IP with reverse tunneling home receiver 3 2 1 sender 1. sends to 2. tunnels packets to by encapsulation 3. forwards the packet to the receiver (standard case) Router accept often only topologically correct addresses (firewall!) a packet from the encapsulated by the is now topologically correct furthermore multicast and TTL problems solved (TTL in the home correct, but is too far away from the receiver) Reverse tunneling does not solve problems with firewalls, the reverse tunnel can be abused to circumvent security mechanisms (tunnel hijacking) optimization of paths, i.e. packets will be forwarded through the tunnel via the to a sender (double triangular routing) Reverse tunneling is backwards compatible the extensions can be implemented easily and cooperate with current implementations without these extensions Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/21 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/22 Mobile IP and IPv6 DHCP: Dynamic Host Configuration Protocol Mobile IP was developed for IPv4, but IPv6 simplifies the protocols security is integrated and not an add-on, authentication of is included COA can be assigned via auto-configuration (DHCPv6 is one candidate), every node has address auto-configuration no need for a separate, all s perform advertisement which can be used instead of the special agent advertisement can signal a sender directly the COA, sending via not needed in this case (automatic path optimization) soft hand-over, i.e. without packet loss, between two subnets is supported sends the new COA to its old the old encapsulates all incoming packets for the and forwards them to the new COA authentication is always granted Application simplification of installation and maintenance of ed computers supplies systems with all necessary information, such as IP address, DNS server address, domain name, subnet mask, default etc. enables automatic integration of systems into an Intranet or the, can be used to acquire a COA for Mobile IP Client/Server-Model the client sends via a MAC broadcast a request to the DHCP server (might be via a DHCP relay) DHCPDISCOVER DHCPDISCOVER client relay server client Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/23 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/24

time DHCP - protocol mechanisms DHCP characteristics server (not selected) determine the configuration DHCPDISCOVER DHCPOFFER DHCPREQUEST (reject) client initialization collection of replies selection of configuration initialization completed DHCPDISCOVER DHCPOFFER DHCPREQUEST (options) DHCPACK server (selected) determine the configuration confirmation of configuration Server several servers can be configured for DHCP, coordination not yet standardized (i.e., manual configuration) Renewal of configurations IP addresses have to be requested periodically, simplified protocol Options available for s, subnet mask, NTP ( time protocol) timeserver, SLP (service location protocol) directory, DNS (domain name system) Security problems no authentication of DHCP information specified release DHCPRELEASE delete context Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/25 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/26 TCP Overview TCP slow-start Transport control protocols typically designed for Fixed end-systems in wired s Research activities Performance Congestion control Efficient retransmissions TCP congestion control packet loss in fixed s typically due to (temporary) overload situations have to discard packets as soon as the buffers are full TCP recognizes congestion only indirectly via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse sender calculates a congestion window for a receiver start with a congestion window size equal to one segment exponential increase* of the congestion window up to the congestion threshold, then linear increase missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window congestion window starts again with one segment *slow-start vs. exponential increase: window is increased by one for each acknowledgement, that is, 1 2 4 8 In other words, the slow-start mechanism is rather a quick-start. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/27 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/28

TCP fast retransmit/fast recovery TCP on lossy (wireless) link TCP sends an acknowledgement only after receiving a packet If a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver Sender can retransmit missing packets (fast retransmit) Also, the receiver got all packets up to the gap and is actually receiving packets Therefore, packet loss is not due to congestion, continue with current congestion window (fast recovery) Without fast retransmit/fast recovery [Lakshman/Madhow] In the following simplied analysis, we do consider neither fast retransmit nor fast recovery. Very high loss probability High loss probability Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/29 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/30 Simple analysis model for lossy TCP Simple analysis of lossy TCP Segment loss probability q = 1 p We are interested in the throughput T If there are no losses (and all ACKs are received in time): Number of segments S first doubles up to threshold W (slow start phase) Number of segments S is incremented after S successful ACKs At some point we reach the bandwidth of the channel B If there is a loss We go back to S = 1 For not too high error probability q we are usually in the congestion mode (that is: not the slow start mode). The expected number of successful transmission E before we get an error is In the equilibrium, we are in the states 1, 2, 3,, S-1, S, and then back to 1 because we have a missing ACK, that is, we have 1+2+ +S S 2 /2 successful transmissions. Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/31 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/32

Lossy TCP: Graphical Interpretation Mobility and TCP Plot of T(p), with B = 50 Note that 1% faulty transmissions is enough to degrade the throughput to about 14% of the bandwidth. 10% error rate gives about 4% of possible bandwidth. The higher the bandwidth, the worse the relative loss. TCP assumes congestion if packets are dropped typically wrong in wireless s, here we often have packet loss due to transmission errors furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. agent in Mobile IP) to another while there are still packets in transit to the wrong access point and forwarding is not possible The performance of an unchanged TCP degrades severely however, TCP cannot be changed fundamentally due to the large base of installation in the fixed, TCP for mobility has to remain compatible the basic TCP mechanisms keep the whole together Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/33 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/34 Indirect TCP (I-TCP) I-TCP socket and state migration segments the connection no changes to the TCP protocol for hosts connected to the wired, millions of computers use (variants of) this protocol optimized TCP protocol for mobile hosts splitting of the TCP connection at, e.g., the agent into two TCP connections, no real end-to-end connection any longer hosts in the fixed part of the net do not notice the characteristics of the wireless part socket migration and state transfer access point 1 mobile host access point ( agent) wired mobile host access point 2 wireless TCP standard TCP Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/35 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/36

Indirect TCP Advantages and Disadvantages + no changes in the fixed necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work + transmission errors on the wireless link do not propagate into the fixed + simple to control, mobile TCP is used only for one hop, between a agent and a mobile host + therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, agents might crash higher latency possible due to buffering of with the agent and forwarding to a new agent high trust at agent; end-to-end encryption impossible Snooping TCP Transparent extension of TCP within the agent buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or agent, respectively (so called local retransmission) the agent therefore snoops the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the agent mobile host local retransmission snooping of ACKs agent buffering of end-to-end TCP connection wired correspondent host Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/37 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/38 Snooping TCP Data transfer to the mobile host buffers until it receives ACK of the MH, detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed Data transfer from the mobile host detects packet loss on the wireless link via sequence numbers, answers directly with a NACK to the MH MH can now retransmit with only a very short delay Integration of the MAC layer MAC layer often has similar mechanisms to those of TCP thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them Problems snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes Mobile TCP Special handling of lengthy and/or frequent disconnections M-TCP splits as I-TCP does unmodified TCP fixed to supervisory host (SH) optimized TCP SH to MH Supervisory host no caching, no retransmission monitors all packets, if disconnection detected set sender window size to 0 sender automatically goes into persistent mode old or new SH re-open the window + maintains end-to-end semantics, supports disconnection, no buffer forwarding does not solve problem of bad wireless link, only disconnections adapted TCP on wireless link; new software needed Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/39 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/40

Fast retransmit/fast recovery Transmission/time-out freezing Problem: Change of agent often results in packet loss TCP reacts with slow-start although there is no congestion Solution: Forced fast retransmit as soon as the mobile host has registered with a new agent, the MH sends (three) duplicated acknowledgements on purpose this forces the fast retransmit mode at the communication partners additionally, the TCP on the MH is forced to continue sending with the actual window size and not to go into slow-start after + simple changes result in significant higher performance what a hack Mobile hosts can be disconnected for a longer time no packet exchange possible, e.g., in a tunnel, disconnection due to overloaded cells or multiplex with higher priority traffic TCP disconnects after time-out completely TCP freezing MAC layer is often able to detect interruption in advance MAC can inform TCP layer of upcoming loss of connection TCP stops sending, but does now not assume a congested link MAC layer signals again if reconnected + scheme is independent of TCP on mobile host has to be changed, mechanism depends on MAC layer Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/41 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/42 Selective retransmission Transaction oriented TCP TCP acknowledgements are often cumulative ACK n acknowledges correct and in-sequence receipt of packets up to n if single packets are missing quite often a whole packet sequence beginning at the gap has to be retransmitted (go-back-n), thus wasting bandwidth, especially if the bandwidth-delay product is high. Selective retransmission as one solution RFC2018 allows for acknowledgements of single packets, not only acknowledgements of in-sequence packet streams without gaps sender can now retransmit only the missing packets + much higher efficiency more complex software in a receiver, more buffer needed at the receiver TCP phases connection setup, transmission, connection release using 3-way-handshake needs 3 packets for setup and release, respectively thus, even short messages need a minimum of 7 packets! Transaction oriented TCP RFC1644, T-TCP, describes a TCP version to avoid this overhead connection setup, transfer and connection release can be combined thus, only 2 or 3 packets are needed + Efficiency Requires changed TCP Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/43 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/44

Comparison of different approaches for a mobile TCP Approach Mechanism Advantages Disadvantages Indirect TCP splits TCP connection into two connections isolation of wireless link, simple loss of TCP semantics, higher latency at handover Snooping TCP M-TCP snoops and transparent for end-toend acknowledgements, local connection, MAC retransmission integration possible splits TCP connection, chokes sender via window size Fast retransmit/ avoids slow-start after fast recovery roaming Transmission/ freezes TCP state at time-out freezing disconnect, resumes after reconnection Selective retransmission Transaction oriented TCP Maintains end-to-end semantics, handles long term and frequent disconnections simple and efficient independent of content or encryption, works for longer interrupts problematic with encryption, bad isolation of wireless link Bad isolation of wireless link, processing overhead due to bandwidth management mixed layers, not transparent changes in TCP required, MAC dependant retransmit only lost very efficient slightly more complex receiver software, more buffer needed combine connection setup/release and transmission Efficient for certain applications changes in TCP required, not transparent [Schiller] Distributed Computing Group MOBILE COMPUTING R. Wattenhofer 8/45