Download presentation
Presentation is loading. Please wait.
1
1 TCP over Wireless (I) some slides adapted, notably from tutorial by Nitin Vaidya
2
2 Wireless Connectivity - Characteristics Transmission errors Wireless LANs - 802.11, Hyperlan Cellular wireless Multi-hop wireless Satellites Low bandwidth Cellular wireless Packet radio (e.g., Metricom) Long or variable latency GEO, LEO satellites Packet radio - high variability Asymmetry in bandwidth, error characteristics Satellites (example: DirectPC)
3
3 TCP/IP over Wireless De facto standard for internetworking Allows wireless devices to connect seamlessly to the Internet TCP over wireless introduces some problems not faced in wired networks (transmission errors, mobility …) We will overview these issues as well as existing solutions What type of wireless network (cellular, last hop, ad hoc, satellite …)?
4
4 Quick review of Transmission Control Protocol / Internet Protocol TCP/IP
5
5 Internet Protocol (IP) Packets may be delivered out-of-order Packets may be lost Packets may be duplicated
6
6 Transmission Control Protocol (TCP) Reliable ordered delivery Implements congestion avoidance and control Reliability achieved by means of retransmissions if necessary End-to-end semantics Acknowledgements sent to TCP sender confirm delivery of data received by TCP receiver Ack for data sent only after data has reached receiver
7
7 TCP Basics Cumulative acknowledgements An acknowledgement ack’s all contiguously received data TCP assigns byte sequence numbers For simplicity, we will assign packet sequence numbers Also, we use slightly different syntax for acks than normal TCP syntax In our notation, ack i acknowledges receipt of packets through packet i
8
8 40393738 3533 Cumulative Acknowledgements A new cumulative acknowledgement is generated only on receipt of a new in-sequence packet 41403839 3537 3634 3634 i dataack i
9
9 Delayed Acknowledgements An ack is delayed until another packet is received, or delayed ack timer expires (200 ms typical) Reduces ack traffic 40393738 3533 41403839 3537 New ack not produced on receipt of packet 36, but on receipt of 37
10
10 Duplicate Acknowledgements A dupack is generated whenever an out-of-order segment arrives at the receiver 40393738 3634 42413940 36 Dupack (Above example assumes delayed acks) On receipt of 38
11
11 Duplicate Acknowledgements Duplicate acks are not delayed Duplicate acks may be generated when a packet is lost, or a packet is delivered out-of-order (OOO) 40393837 3634 41403739 36 Dupack On receipt of 38
12
12 Number of dupacks depends on how much OOO a packet is 40393837 3634 41403739 36 Dupack 42413940 36 38 New Ack 34 New Ack DupackNew Ack
13
13 Window Based Flow Control Sliding window protocol Window size minimum of receiver’s advertised window - determined by available buffer space at the receiver congestion window - determined by the sender, based on feedback from the network 23456789101113112 Sender’s window Acks receivedNot transmitted
14
14 Window Based Flow Control 23456789101113112 Sender’s window 23456789101113112 Sender’s window Ack 5
15
15 Ack Clock TCP window flow control is “self-clocking” New data sent when old data is ack’d Helps maintain “equilibrium”
16
16 Window Based Flow Control Congestion window size bounds the amount of data that can be sent per round-trip time Throughput <= W / RTT
17
17 Ideal Window Size Ideal size = delay * bandwidth delay-bandwidth product What if window size < delay*bw ? Inefficiency (wasted bandwidth) What if > delay*bw ? Queuing at intermediate routers increased RTT due to queuing delays Potentially, packet loss
18
18 How does TCP detect a packet loss? Retransmission timeout (RTO) Duplicate acknowledgements
19
19 Detecting Packet Loss Using Retransmission Timeout (RTO) At any time, TCP sender sets retransmission timer for only one packet If acknowledgement for the timed packet is not received before timer goes off, the packet is assumed to be lost RTO dynamically calculated
20
20 Retransmission Timeout (RTO) calculation RTO = mean + 4 mean deviation Standard deviation average of (sample – mean) Mean deviation average of |sample – mean| Mean deviation easier to calculate than standard deviation Mean deviation is more conservative Large variations in the RTT increase the deviation, leading to larger RTO 22
21
21 Timeout Granularity RTT is measured as a discrete variable, in multiples of a “tick” 1 tick = 500 ms in many implementations smaller tick sizes in more recent implementations (e.g., Solaris) RTO is at least 2 clock ticks
22
22 Exponential Backoff Double RTO on each timeout Packet transmitted Time-out occurs before ack received, packet retransmitted Timeout interval doubled T1 T2 = 2 * T1
23
23 Fast Retransmission Timeouts can take too long how to initiate retransmission sooner? Fast retransmit
24
24 Detecting Packet Loss Using Dupacks Fast Retransmit Mechanism Dupacks may be generated due to packet loss, or out-of-order packet delivery TCP sender assumes that a packet loss has occurred if it receives three dupacks consecutively 128791011 3 dupacks are also generated if a packet is delivered at least 3 places beyond its in-sequence location Fast retransmit useful only if lower layers deliver packets “almost ordered” ---- otherwise, unnecessary fast retransmit
25
25 Congestion Avoidance and Control Slow Start initially, congestion window size cwnd = 1 MSS (maximum segment size) increment window size by 1 MSS on each new ack slow start phase ends when window size reaches the slow-start threshold cwnd grows exponentially with time during slow start factor of 1.5 per RTT if every other packet ack’d factor of 2 per RTT if every packet ack’d Could be less if sender does not always have data to send
26
26 Congestion Avoidance On each new ack, increase cwnd by 1/cwnd packets cwnd increases linearly with time during congestion avoidance 1/2 MSS per RTT if every other packet ack’d 1 MSS per RTT if every packet ack’d
27
27 Slow start Congestion avoidance Slow start threshold Example assumes that acks are not delayed
28
28 Congestion Control On detecting a packet loss, TCP sender assumes that network congestion has occurred On detecting packet loss, TCP sender drastically reduces the congestion window Reducing congestion window reduces amount of data that can be sent per RTT throughput may decrease
29
29 Congestion Control -- Timeout On a timeout, the congestion window is reduced to the initial value of 1 MSS The slow start threshold is set to half the window size before packet loss more precisely, ssthresh = maximum of min(cwnd,receiver’s advertised window)/2 and 2 MSS Slow start is initiated
30
30 ssthresh = 8 ssthresh = 10 cwnd = 20 After timeout
31
31 Congestion Control - Fast retransmit Fast retransmit occurs when multiple (>= 3) dupacks come back Fast recovery follows fast retransmit Different from timeout : slow start follows timeout timeout occurs when no more packets are getting across fast retransmit occurs when a packet is lost, but latter packets get through ack clock is still there when fast retransmit occurs no need to slow start
32
32 Fast Recovery ssthresh = min(cwnd, receiver’s advertised window)/2 (at least 2 MSS) retransmit the missing segment (fast retransmit) cwnd = ssthresh + number of dupacks when a new ack comes: cwnd = ssthreh enter congestion avoidance Congestion window cut into half
33
33 After fast retransmit and fast recovery window size is reduced in half. Receiver’s advertized window After fast recovery
34
34 TCP Reno Slow-start Congestion avoidance Fast retransmit Fast recovery
35
35 Fast Recovery Fast recovery can result in a timeout with multiple losses per RTT. TCP New-Reno [Hoe96] stay in fast recovery until all packet losses in window are recovered can recover 1 packet loss per RTT without causing a timeout Selective Acknowledgements (SACK) [mathis96rfc2018] provides information about out-of-order packets received by receiver can recover multiple packet losses per RTT
36
36 Does IEEE 802.11 Work Well in Multi-hop Wireless Network? Author: Shugong Xu, Tarek Saadawi City University of New York
37
37 Overview of The Paper This paper is about TCP over multi-hop networks, but its also about cross-layer interactions Conclusion: Cross Layer interactions between 802.11 Protocol, routing and TCP can be destructive. Experimental Scenario: A Static String Topology TCP as Transport Layer Protocol Problems: Instability Problem Unfairness Problem 01234567
38
38 Simulation Environment Simulator: ns-2 with wireless extensions MAC Layer: IEEE 802.11 MAC Distributed Coordination function(DCF). Transport Layer: TCP connections carrying bulk transfers (always have data) Network Scenario A Static String Network Topology Interference range is a little more than two times of the communication range 01234567 Interference Range Communication Range
39
39 Instability Problem—Experiment Setup 12345 Source Destination A single TCP connection, with node 1 as the source and node 5 as the destination. Three sets of experiments with Maximum Window Size(window_) 32, 8, and 4 respectively.
40
40 Instability Problem—Experiment Result When window_=32 or 8, serious oscillation of throughput is observed. When window_4, throughput is stable.
41
41 Instability Problem—Trace Analysis(1) 12345 Data Ack RTS CTS Interference Range of Node 2
42
42 Instability Problem—Summary Collision and exposed terminal problem prevent node 2 from receiving RTS from or sending CTS to node 1. The random back-off, big data packet, and sending back-to-back packets worsen the above problems. When window_ = 4, the chance to send back a CTS is greatly increased, so the throughput becomes stable. After node 1 fails seven times to receive CTS, node 1 believes there is a route failure and starts a route discovery. Before a route is available, node 1 can not send out a data packet. This period usually is long enough to cause a timeout at the TCP sender. For TCP, timeout triggers Slow Start, which significantly reduces the throughput.
43
43 Unfairness Problem—Experiment Setup 23456 Source Destination Source First SessionSecond Session In the first session, data flow from 6 to 4. In the second session, data flow from 2 to 3. The first session starts at 10.0s. The second session starts at 30.0s.
44
44 Unfairness Problem (1) The first session has a throughput of about 450kbps from 10s to 30s, and 0kbps after 30s. The second session has a throughput of about 900kbps from 30s to 130s.
45
45 Unfairness Problem (2) The first session never succeeds to send out packet with sequence number 2164.
46
46 Unfairness Problem—Trace Analysis(1) 23456 RTSData CTS Interfering Range of Node 5 Ack Interfering Range of Node 4 Data No Route
47
47 Unfairness Problem—Trace Analysis(2) 23456 RTSData CTS Interfering Range of Node 5 Ack Interfering Range of Node 4 Data No Route
48
48 Unfairness Problem—Summary In one-hop TCP connections, the interval between packet transmission is larger than that of the multi- hop TCP connections, which gives the one-hop connection more chances to transmit data. Random back-off is actually advantageous to the last succeeding host. Problem called “One-hop unfairness problem” Authors argue that since one-hop connection is common in a wireless network problem must be addressed
49
49 Discussion? Problems Shown: Instability Problem Unfairness problem Conclusions: IEEE 802.11 does not work well in multi-hop wireless networks. It may be inappropriate to take IEEE 802.11 as the MAC layer to simulate routing or transport protocols for multi- hop wireless networks. Are Cross Layer Solutions needed? Maybe a different set of protocols that play nicer together?
50
50 More discussion Rooted in IEEE 802.11 MAC? TCP is not designed with wireless networking in mind. Timeout Slow Start Interfering range and communication range If interfering range is the same as the communication range, the two problems presented in this paper will disappear. Is the configuration of the interfering range simply an engineering issue? Only a simple topology is considered What happens if more complex scenarios are considered? Different traffic? Multiple connections? Different spacing between nodes? More realistic wireless channel? Can you relate to other stuff we have discussed so far?
51
51 Impact of transmission errors on TCP performance
52
52 Random Errors If number of errors is small, they may be corrected by an error correcting code Excessive bit errors result in a packet being discarded, possibly before it reaches the transport layer
53
53 Random Errors May Cause Fast Retransmit 40393738 3634 Example assumes delayed ack - every other packet ack’d
54
54 Random Errors May Cause Fast Retransmit 41403839 3634 Example assumes delayed ack - every other packet ack’d
55
55 Random Errors May Cause Fast Retransmit 42413940 36 Duplicate acks are not delayed 36 dupack
56
56 Random Errors May Cause Fast Retransmit 40 36 Duplicate acks 414342
57
57 Random Errors May Cause Fast Retransmit 41 36 3 duplicate acks trigger fast retransmit at sender 424443 36
58
58 Random Errors May Cause Fast Retransmit Fast retransmit results in retransmission of lost packet reduction in congestion window Reducing congestion window in response to errors is unnecessary Reduction in congestion window reduces the throughput
59
59 Sometimes Congestion Response May be Appropriate in Response to Errors On a CDMA channel, errors occur due to interference from other user, and due to noise [Karn99pilc] Interference due to other users is an indication of congestion. If such interference causes transmission errors, it is appropriate to reduce congestion window If noise causes errors, it is not appropriate to reduce window When a channel is in a bad state for a long duration, it might be better to let TCP backoff, so that it does not unnecessarily attempt retransmissions while the channel remains in the bad state [Padmanabhan99pilc]
60
60 Impact of Random Errors [Vaidya99] Exponential error model 2 Mbps wireless full duplex link No congestion losses
61
61 Burst Errors May Cause Timeouts If wireless link remains unavailable for extended duration, a window worth of data may be lost driving through a tunnel passing a truck Timeout results in slow start Slow start reduces congestion window to 1 MSS, reducing throughput Reduction in window in response to errors unnecessary Multiple packet losses (random) can also result in timeout when using TCP-Reno (and to a lesser extent when using SACK)
62
62 Impact of Transmission Errors TCP cannot distinguish between packet losses due to congestion and transmission errors Unnecessarily reduces congestion window Throughput suffers
63
63 Classification of Schemes to Improve Performance of TCP in Presence of Transmission Errors
64
64 Techniques to Improve TCP Performance in Presence of Errors Classification 1 Classification based on nature of actions taken to improve performance Hide error losses from the sender if sender is unaware of the packet losses due to errors, it will not reduce congestion window Let sender know, or determine, cause of packet loss if sender knows that a packet loss is due to errors, it will not reduce congestion window
65
65 Techniques to Improve TCP Performance in Presence of Errors Classification 2 Classification based on where modifications are needed At the sender node only At the receiver node only At intermediate node(s) only Combinations of the above
66
66 Ideal Behavior Ideal TCP behavior: Ideally, the TCP sender should simply retransmit a packet lost due to transmission errors, without taking any congestion control actions Such a TCP referred to as Ideal TCP Ideal TCP typically not realizable Ideal network behavior: Transmission errors should be hidden from the sender -- the errors should be recovered transparently and efficiently Proposed schemes attempt to approximate one of the above two ideals
67
67 Selected Schemes to Improve Performance of TCP in Presence of Transmission Errors
68
68 Various Schemes Link level mechanisms Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination For a brief overview, see [Dawkins99,Montenegro99]
69
69 Link Level Mechanisms
70
70 Link Layer Mechanisms Forward Error Correction Forward Error Correction (FEC) [Lin83] can be use to correct small number of errors Correctable errors hidden from the TCP sender FEC incurs overhead even when errors do not occur Adaptive FEC schemes [Eckhardt98] can reduce the overhead by choosing appropriate FEC dynamically
71
71 Link Layer Mechanisms Link Level Retransmissions Link level retransmission schemes retransmit a packet at the link layer, if errors are detected Retransmission overhead incurred only if errors occur unlike FEC overhead
72
72 Link Layer Mechanisms In general Use FEC to correct a small number of errors Use link level retransmission when FEC capability is exceeded
73
73 Link Level Retransmissions wireless physical link network transport application physical link network transport application physical link network transport application rxmt TCP connection Link layer state
74
74 Link Level Retransmissions Issues How many times to retransmit at the link level before giving up? Finite bound -- semi-reliable link layer No bound -- reliable link layer What triggers link level retransmissions? Link layer timeout mechanism Link level acks (negative acks, dupacks, …) Other mechanisms (e.g., Snoop, as discussed later) How much time is required for a link layer retransmission? Small fraction of end-to-end TCP RTT Large fraction/multiple of end-to-end TCP RTT Interaction of timers at link level and TCP?
75
75 Link Level Retransmissions Issues Should the link layer deliver packets as they arrive, or deliver them in-order? Link layer may need to buffer packets and reorder if necessary so as to deliver packets in-order
76
76 Link Level Retransmissions Issues Retransmissions can cause head-of-the-line blocking Although link to receiver 1 may be in a bad state, the link to receiver 2 may be in a good state Retransmissions to receiver 1 are lost, and also block a packet from being sent to receiver 2 Base station Receiver 1 Receiver 2
77
77 Link Level Retransmissions (Early Studies) The sender’s Retransmission Timeout (RTO) is a function of measured RTT (round-trip times) Link level retransmits increase RTT, therefore, RTO If errors not frequent, RTO will not account for RTT variations due to link level retransmissions When errors occur, the sender may timeout & retransmit before link level retransmission is successful Sender and link layer both retransmit Duplicate retransmissions (interference) waste wireless bandwidth Timeouts also result in reduced congestion window
78
78 RTO Variations Packet loss RTT sample RTO Wireless
79
79 A More Accurate Picture With large RTO granularity, interference is unlikely, if time required for link-level retransmission is small compared to TCP RTO [Balakrishnan96Sigcomm] Standard TCP RTO granularity is often large Minimum RTO (2*granularity) is large enough to allow a small number of link level retransmissions, if link level RTT is relatively small Interference due to timeout not a significant issue when wireless RTT small, and RTO granularity large [Eckhardt98]
80
80 Link Level Retransmissions A More Accurate Picture Frequent errors increase RTO significantly on slow wireless links RTT on slow links large, retransmissions result in large variance, pushing RTO up Likelihood of interference between link layer and TCP retransmissions smaller But congestion response will be delayed due to larger RTO When wireless losses do cause timeout, much time wasted
81
81 Large TCP Retransmission Timeout Intervals Good for reducing interference with link level retransmits Bad for recovery from congestion losses Need a timeout mechanism that responds appropriately for both types of losses Open problem
82
82 Link Level Retransmissions Selective repeat protocols can deliver packets out of order Significantly out-of-order delivery can trigger TCP fast retransmit Redundant retransmission from TCP sender Reduction in congestion window Example: Receipt of packets 3,4,5 triggers dupacks 6252341 Lost packet Retransmitted packet
83
83 Link Level Retransmissions In-order delivery To avoid unnecessary fast retransmit, link layer using retransmission should attempt to deliver packets “almost in-order” 654223 652234 1 1
84
84 Adaptive Link Layer Strategies [Lettieri98,Eckhardt98,Zorzi97] Adaptive protocols attempt to dynamically choose: FEC code retransmission limit frame size
85
85 Link Layer Retransmissions [Vaidya99] 2 Mbps wireless duplex link with 1 ms delay Exponential error model No congestion losses 20 ms1 ms 10 Mbps2 Mbps
86
86 Link Layer Schemes: Summary When is a reliable link layer beneficial to TCP performance? if it provides almost in-order delivery and TCP retransmission timeout large enough to tolerate additional delays due to link level retransmits
87
87 Link Layer Schemes: Classification Hide wireless losses from TCP sender Link layer modifications needed at both ends of wireless link TCP need not be modified
88
88 Various Schemes Link level mechanisms Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
89
89 Split Connection Approach
90
90 Split Connection Approach End-to-end TCP connection is broken into one connection on the wired part of route and one over wireless part of the route A single TCP connection split into two TCP connections if wireless link is not last on route, then more than two TCP connections may be needed
91
91 Split Connection Approach Connection between wireless host MH and fixed host FH goes through base station BS FH-MH = FH-BS + BS-MH FHMHBS Base StationMobile Host Fixed Host
92
92 Split Connection Approach Split connection results in independent flow control for the two parts Flow/error control protocols, packet size, time-outs, may be different for each part FHMHBS Base StationMobile Host Fixed Host
93
93 Split Connection Approach wireless physical link network transport application physical link network transport application physical link network transport application rxmt Per-TCP connection state TCP connection
94
94 Split Connection Approach Indirect TCP [Bakre95,Bakre97] FH - BS connection : Standard TCP BS - MH connection : Standard TCP
95
95 Split Connection Approach Selective Repeat Protocol (SRP) [Yavatkar94] FH - BS connection : standard TCP BS - FH connection : selective repeat protocol on top of UDP Performance better than Indirect-TCP (I-TCP), because wireless portion of the connection can be tuned to wireless behavior
96
96 Split Connection Approach : Other Variations Asymmetric transport protocol (Mobile-TCP) [Haas97icc] Low overhead protocol at wireless hosts, and higher overhead protocol at wired hosts smaller headers used on wireless hop (header compression) simpler flow control - on/off for MH to BS transfer MH only does error detection, BS does error correction too No congestion control over wireless hop
97
97 Split Connection Approach : Classification Hides transmission errors from sender Primary responsibility at base station If specialized transport protocol used on wireless, then wireless host also needs modification
98
98 Split Connection Approach : Advantages BS-MH connection can be optimized independent of FH-BS connection Different flow / error control on the two connections Local recovery of errors Faster recovery due to relatively shorter RTT on wireless link Good performance achievable using appropriate BS-MH protocol Standard TCP on BS-MH performs poorly when multiple packet losses occur per window (timeouts can occur on the BS-MH connection, stalling during the timeout interval) Selective acks improve performance for such cases
99
99 Split Connection Approach : Disadvantages End-to-end semantics violated ack may be delivered to sender, before data delivered to the receiver May not be a problem for applications that do not rely on TCP for the end-to-end semantics FHMHBS 40 39 3738 36 40
100
100 Split Connection Approach : Disadvantages BS retains hard state BS failure can result in loss of data (unreliability) If BS fails, packet 40 will be lost Because it is ack’d to sender, the sender does not buffer 40 FHMHBS 40 39 3738 36 40
101
101 Split Connection Approach : Disadvantages BS retains hard state Hand-off latency increases due to state transfer Data that has been ack’d to sender, must be moved to new base station FHMHBS 40 39 3738 36 40 MH New base station Hand-off 40 39
102
102 Split Connection Approach : Disadvantages Buffer space needed at BS for each TCP connection BS buffers tend to get full, when wireless link slower (one window worth of data on wired connection could be stored at the base station, for each split connection) Window on BS-MH connection reduced in response to errors may not be an issue for wireless links with small delay-bw product
103
103 Split Connection Approach : Disadvantages Extra copying of data at BS copying from FH-BS socket buffer to BS-MH socket buffer increases end-to-end latency May not be useful if data and acks traverse different paths (both do not go through the base station) Example: data on a satellite wireless hop, acks on a dial-up channel FHMH data ack
104
104 Various Schemes Link layer mechanisms Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
105
105 TCP-Aware Link Layer
106
106 Snoop Protocol [Balakrishnan95acm] Retains local recovery of Split Connection approach and link level retransmission schemes Improves on split connection end-to-end semantics retained soft state at base station, instead of hard state
107
107 Snoop Protocol FHMHBS wireless physical link network transport application physical link network transport application physical link network transport application rxmt Per TCP-connection state TCP connection
108
108 Snoop Protocol Buffers data packets at the base station BS to allow link layer retransmission When dupacks received by BS from MH, retransmit on wireless link, if packet present in buffer Prevents fast retransmit at TCP sender FH by dropping the dupacks at BS FHMHBS
109
109 Snoop : Example FHMHBS 40393738 3634 Example assumes delayed ack - every other packet ack’d 36 37 38 35 TCP state maintained at link layer
110
110 Snoop : Example 41403839 3634 36 37 38 3539
111
111 Snoop : Example 42413940 36 Duplicate acks are not delayed 36 dupack 37 38 39 40
112
112 Snoop : Example 40 36 Duplicate acks 414342 37 38 39 40 41
113
113 Snoop : Example FHMHBS 41 36 374443 36 37 38 39 40 41 42 Discard dupack Dupack triggers retransmission of packet 37 from base station BS needs to be TCP-aware to be able to interpret TCP headers
114
114 Snoop : Example 37 36 424544 36 37 38 39 40 41 42 43 36
115
115 Snoop : Example 42 36 434645 36 37 38 39 40 41 42 43 41 36 44 TCP sender does not fast retransmit
116
116 Snoop : Example 43 36 444746 36 37 38 39 40 41 42 43 41 36 44 TCP sender does not fast retransmit 45
117
117 Snoop : Example FHMHBS 44 36 454847 36 42 43 41 36 44 45 43 46
118
118 Snoop [Balakrishnan95acm] 2 Mbps Wireless link
119
119 Snoop Protocol When Beneficial? Snoop prevents fast retransmit from sender despite transmission errors, and out-of-order delivery on the wireless link OOO delivery causes fast retransmit only if it results in at least 3 dupacks If wireless link level delay-bandwidth product is less than 4 packets, a simple (TCP-unaware) link level retransmission scheme can suffice Since delay-bandwidth product is small, the retransmission scheme can deliver the lost packet without resulting in 3 dupacks from the TCP receiver
120
120 Snoop Protocol : Classification Hides wireless losses from the sender Requires modification to only BS (network-centric approach)
121
121 Snoop Protocol : Advantages High throughput can be achieved performance further improved using selective acks Local recovery from wireless losses Fast retransmit not triggered at sender despite out-of-order link layer delivery End-to-end semantics retained Soft state at base station loss of the soft state affects performance, but not correctness
122
122 Snoop Protocol : Disadvantages Link layer at base station needs to be TCP-aware Not useful if TCP headers are encrypted (IPsec) Cannot be used if TCP data and TCP acks traverse different paths (both do not go through the base station)
123
123 WTCP Protocol [Ratnam98] Snoop hides wireless losses from the sender But sender’s RTT estimates may be larger in presence of errors Larger RTO results in slower response for congestion losses FHMHBS
124
124 WTCP Protocol WTCP performs local recovery, similar to Snoop In addition, WTCP uses the timestamp option to estimate RTT The base station adds base station residence time to the timestamp when processing an ack received from the wireless host Sender’s RTT estimate not affected by retransmissions on wireless link FHMHBS
125
125 WTCP Example FHBSMH 33 34 Numbers in this figure are timestamps Base station residence time is 1 unit
126
126 WTCP : Disadvantages Requires use of the timestamp option May be useful only if retransmission times are large link stays in bad state for a long time link frequently enters a bad state link delay large WTCP does not account for congestion on wireless hop assumes that all delay at base station is due to queuing and retransmissions will not work for shared wireless LAN, where delays also incurred due to contention with other transmitters
127
127 Various Schemes Link layer mechanisms Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
128
128 TCP-Unaware Approximation of TCP-Aware Link Layer
129
129 Delayed Dupacks Protocol [Mehta98,Vaidya99] Attempts to imitate Snoop, without making the base station TCP-aware Snoop implements two features at the base station link layer retransmission reducing interference between TCP and link layer retransmissions (by dropping dupacks) Delayed Dupacks implements the same two features at BS : link layer retransmission at MH : reducing interference between TCP and link layer retransmissions (by delaying dupacks)
130
130 Delayed Dupacks Protocol wireless physical link network transport application physical link network transport application physical link network transport application rxmt TCP connection Link layer state
131
131 Delayed Dupacks Protocol Link layer retransmission scheme at the base station Link layer delivers packets out-of-order when transmission errors occur Why may a link layer deliver packets out-of-order? Only an issue when the link layer does not use stop-and- go protocol With OOO link layer delivery, loss of a packet from one flow does not block delivery of packets from another flow If in-order delivery is enforced, when retransmission for a packet is being performed, packets from other other flows may also be blocked from being delivered to the upper layer
132
132 Delayed Dupacks Protocol TCP receiver delays dupacks (third and subsequent) for interval D, when out-of-order packets received Dupack delay intended to give link level retransmit time to succeed Benefit: Delayed dupacks can result in recovery from a transmission loss without triggering a response from the TCP sender Disadvantage: Recovery from congestion losses delayed
133
133 Delayed Dupacks Protocol Delayed dupacks released after interval D, if missing packet not received by then Link layer maintains state to allow retransmission Link layer state is not TCP-specific
134
134 Delayed Dupacks : Example 40393738 3634 Example assumes delayed ack - every other packet ack’d Link layer acks are not shown 36 37 38 35 Link layer state
135
135 Delayed Dupacks : Example BS 41403839 3634 36 37 38 39 35 Removed from BS link layer buffer on receipt of a link layer ack (LL acks not shown in figure)
136
136 Delayed Dupacks : Example 42413940 36 Duplicate acks are not delayed 36 dupack 37 38 39 40
137
137 Delayed Dupacks : Example 40 36 Duplicate acks 414342 37 38 39 40 41 Original ack
138
138 Delayed Dupacks : Example 41 36 374443 36 37 39 40 41 42 Base station forwards dupacks dupackdupacks Delayed dupack
139
139 Delayed Dupacks : Example 37 36 424544 36 37 40 41 42 36 dupacks Delayed dupacks 43
140
140 Delayed Dupacks : Example 42434645 36 37 41 42 43 41 TCP sender does not fast retransmit 44 Delayed dupacks are discarded if lost packet received before delay D expires
141
141 Delayed Dupacks [Vaidya99] 2 Mbps wireless duplex link with 20 ms delay No congestion losses 20 ms 10 Mbps2 Mbps
142
142 Delayed Dupacks [Vaidya99] 5% packet loss due to congestion 20 ms 10 Mbps2 Mbps
143
143 Delayed Dupacks Scheme : Advantages Link layer need not be TCP-aware Can be used even if TCP headers are encrypted Works well for relatively small wireless RTT (compared to end-to-end RTT) relatively small delay D sufficient in such cases
144
144 Delayed Dupacks Scheme : Disadvantages Right value of dupack delay D dependent on the wireless link properties Mechanisms to automatically choose D needed Delays dupacks for congestion losses too, delaying congestion loss recovery
145
145 Various Schemes Link-layer retransmissions Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
146
146 Explicit Notification
147
147 Explicit Notification Schemes General Philosophy Approximate Ideal TCP behavior: Ideally, the TCP sender should simply retransmit a packet lost due to transmission errors, without taking any congestion control actions A wireless node somehow determines that packets are lost due to errors and informs the sender using an explicit notification Sender, on receiving the notification, does not reduce congestion window, but retransmits lost packet
148
148 Explicit Notification Schemes Motivated by the Explicit Congestion Notification (ECN) proposals [Floyd94] Variations proposed in literature differ in who sends explicit notification how they know to send the explicit notification what the sender does on receiving the notification
149
149 Explicit Notification Space Communication Protocol Standards- Transport Protocol (SCPS-TP) Satellite Ground station wireless TCP destinations
150
150 Space Communication Protocol Standards- Transport Protocol (SCPS-TP) The receiving ground station keeps track of how many packets with errors are received (their checksums failed) When the error rate exceeds a threshold, the ground station sends corruption experienced messages to destinations of recent error-free TCP packets destinations are cached The TCP destinations tag acks with corruption-experienced bit TCP sender, after receiving an ack with corruption-experienced bit, does not back off until it receives an ack without that bit (even if timeout or fast retransmit occurs)
151
151 Explicit Loss Notification [Balakrishnan98] when MH is the TCP sender Wireless link first on the path from sender to receiver The base station keeps track of holes in the packet sequence received from the sender When a dupack is received from the receiver, the base station compares the dupack sequence number with the recorded holes if there is a match, an ELN bit is set in the dupack When sender receives dupack with ELN set, it retransmits packet, but does not reduce congestion window MHFHBS 4321134 wireless Record hole at 2 11 11 Dupack with ELN set
152
152 Explicit Bad State Notification [Bakshi97] when MH is TCP receiver Base station attempts to deliver packets to the MH using a link layer retransmission scheme If packet cannot be delivered using a small number of retransmissions, BS sends a Explicit Bad State Notification (EBSN) message to TCP sender When TCP sender receives EBSN, it resets its timer timeout delayed, when wireless channel in bad state
153
153 Partial Ack Protocols [Cobb95][Biaz97] Send two types of acknowledgements A partial acknowledgement informs the sender that a packet was received by an intermediate host (typically, base station) Normal TCP cumulative ack needed by the sender for reliability purposes
154
154 Partial Ack Protocols When a packet for which a partial ack is received is detected to be lost, the sender does not reduce its congestion window loss assumed to be due to wireless errors 37 36 Partial ack 37 Cumulative ack
155
155 Variations Base station may or may not locally buffer and retransmit lost packets Partial ack for all packets or a subset ? 37 36 Partial ack 37 Cumulative ack
156
156 Explicit Loss Notification [Biaz99thesis] when MH is TCP receiver Attempts to approximate hypothetical ELN proposed in [Balakrishnan96] for the case when MH is receiver Caches TCP sequence numbers at base station, similar to Snoop. But does not cache data packets, unlike Snoop. Duplicate acks are tagged with ELN bit before being forwarded to sender if sequence number for the lost packet is cached at the base station Sender takes appropriate action on receiving ELN
157
157 Explicit Loss Notification [Biaz99thesis] when MH is TCP receiver 37 36 37 3839 38 Sequence numbers cached at base station 37 Dupack with ELN
158
158 Various Schemes Link-layer retransmissions Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
159
159 Receiver-Based Discrimination Scheme
160
160 Receiver-Based Scheme [Biaz98Asset] MH is TCP receiver Receiver uses a heuristic to guess cause of packet loss When receiver believes that packet loss is due to errors, it sends a notification to the TCP sender TCP sender, on receiving the notification, retransmits the lost packet, but does not reduce congestion window
161
161 Receiver-Based Scheme Packet loss due to congestion FHMHBS 101211 FHMHBS 11 1012 T Congestion loss
162
162 Receiver-Based Scheme Packet loss due to transmission error FHMHBS 101211 FHMHBS 101112 Error loss 2 T
163
163 Receiver-Based Scheme Receiver uses the inter-arrival time between consecutively received packets to guess the cause of a packet loss On determining a packet loss as being due to errors, the receiver may tag corresponding dupacks with an ELN bit, or send an explicit notification to sender
164
164 Receiver-Based Scheme Diagnostic Accuracy [Biaz99Asset] Congestion losses Error losses
165
165 Receiver-Based Scheme : Disadvantages Limited applicability The slowest link on the path must be the last wireless hop to ensure some queuing will occur at the base station The queueing delays for all packets (at the base station) should be somewhat uniform multiple connections on the link will make inter-packet delays variable
166
166 Receiver-Based Scheme : Advantages Can be implemented without modifying the base station (an “end-to-end” scheme) May be used despite encryption, or if data & acks traverse different paths
167
167 Various Schemes Link-layer retransmissions Split connection approach TCP-Aware link layer TCP-Unaware approximation of TCP-aware link layer Explicit notification Receiver-based discrimination Sender-based discrimination
168
168 Sender-Based Discrimination Scheme
169
169 Sender-Based Discrimination Scheme [Biaz98ic3n,Biaz99techrep] Sender can attempt to determine cause of a packet loss If packet loss determined to be due to errors, do not reduce congestion window Sender can only use statistics based on round-trip times, window sizes, and loss pattern unless network provides more information (example: explicit loss notification)
170
170 Heuristics for Congestion Avoidance load RTT throughput knee cliff
171
171 Heuristics for Congestion Avoidance Define condition C as a function of congestion window size and observed RTTs Condition C evaluated when a new RTT is calculated condition C typically evaluates to 2 or 3 possible values for now assume 2 values: TRUE or FALSE If (C == True) reduce congestion window Several proposals for condition C
172
172 Heuristics for Congestion Avoidance Some proposals Normalized Delay Gradient [jain89] r = [RTT(i)-RTT(i-1)] / [RTT(i)+RTT(i-1)] w = [W(i)-W(i-1)] / [W(i)+W(i-1)] Condition C = (r/w > 0)
173
173 Heuristics for Congestion Avoidance Some proposals Normalized Throughput Gradient [Wang91] Throughput gradient TG(i) = [T(i) - T(i-1) ] / [ W(i)-W(i-1)] Normalized Throughout Gradient NTG = TG(i) / TG(1) Condition C = (NTG < 0.5)
174
174 Heuristics for Congestion Avoidance Some proposals TCP Vegas [Brakmo94] expected throughput ET = W(i) / RTTmin actual throughput AT = W(i) / RTT(i) Condition C = ( ET-AT > beta)
175
175 Sender-Based Heuristics Record latest value evaluated for condition C When a packet loss is detected if last evaluation of C is TRUE, assume packet loss is due to congestion else assume that packet loss is due to transmission errors If packet loss determined to be due to errors, do not reduce congestion window
176
176 Sender-Based Schemes Diagnostic Accuracy [Biaz99ic3n]
177
177 Sender-Based Schemes Diagnostic Accuracy [Biaz99ic3n]
178
178 Sender-Based Heuristics : Disadvantage Does not work quite well enough as yet !! Reason Statistics collected by the sender garbled by other traffic on the network Not much correlation between observed short-term statistics, and onset of congestion
179
179 Sender-Based Heuristics : Advantages Only sender needs to be modified Needs further investigation to develop better heuristics investigate longer-term heuristics
180
180 Why do Statistical Technique Perform Poorly? The techniques we evaluated use simple statistics on RTT and window size W to draw conclusions about state of the network Unfortunately, correlation between RTT and W is often weak Fraction of TCP connections Coefficient of correlation (RTT,W)
181
181 Statistical Techniques Future Work Other statistical measures ? Mechanisms that achieve good TCP throughput despite not-too-good diagnostic accuracy
182
182 TCP in Presence of Transmission Errors Summary Many techniques have been proposed, and several approaches perform well in many environments Recommendation: Prefer end-to-end techniques End-to-end techniques are those which do not require TCP-Specific help from lower layers Lower layers may help improve TCP performance without taking TCP-specific actions. Examples: Semi-reliable link level retransmission schemes Explicit notification
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.