CMPE 257: Wireless and Mobile Networking

84
CMPE 257 Spring 2005 1 CMPE 257: Wireless and Mobile Networking Spring 2005 E2E Protocols (point-to- point)

description

CMPE 257: Wireless and Mobile Networking. Spring 2005 E2E Protocols (point-to-point). Announcements. Today. E2E protocols (cont’d). Recap’ing. Cross-Layer Approaches. Link layer error recovery. Link layer retransmission. TCP-awareness. TCP-unawareness. Split connection. - PowerPoint PPT Presentation

Transcript of CMPE 257: Wireless and Mobile Networking

Page 1: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 1

CMPE 257: Wireless and Mobile Networking

Spring 2005E2E Protocols (point-to-point)

Page 2: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 2

Announcements

Page 3: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 3

Today E2E protocols (cont’d).

Page 4: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 4

Recap’ing

Page 5: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 5

Cross-Layer Approaches Link layer error recovery. Link layer retransmission.

TCP-awareness. TCP-unawareness.

Split connection.

Page 6: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 6

Link Layer Mechanisms:Error Correction

Example: Forward Error Correction (FEC) [Lin83] can be used to correct limited number of errors.

Correctable errors hidden from the TCP sender.

FEC incurs overhead even when errors do not occur Adaptive FEC schemes can reduce the overhead

by choosing appropriate FEC dynamically.

Page 7: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 7

Link Layer Mechanisms:Link Level Retransmissions Link level retransmission schemes

retransmit a packet at the link layer, if errors are detected.

Retransmission overhead incurred only if errors occur.

Page 8: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 8

Link Layer Mechanisms

May combine both FEC and retransmissions:

Use FEC to correct small number of errors.

Use link level retransmission when FEC capability is exceeded.

Page 9: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 9

Link Level Retransmissions

wireless

physical

link

network

transport

application

physical

link

network

transport

application

physical

link

network

transport

application

rxmt

TCP connectionLink layer state

Page 10: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 10

Link Level RetransmissionsIssues

How many times to retransmit at the link level before giving up? Finite bound -- semi-reliable link layer No bound -- reliable link layer

What triggers link level retransmissions? Link layer timeout mechanism Link level acks (negative acks,

dupacks, …)

Page 11: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 11

Link Level RetransmissionsIssues

How much time is required to trigger link layer retransmission? Small fraction of end-to-end TCP RTT. Multiple of end-to-end TCP RTT.

Should link layer deliver packets as they arrive, or deliver them in-order? Link layer may need to buffer packets and

reorder if necessary so as to deliver packets in-order.

Page 12: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 12

Link Layer Schemes: Summary

When is a reliable link layer beneficial to TCP performance?

If it provides almost in-order delivery.

and TCP retransmission timeout large

enough to tolerate additional delays due to link level retransmits.

Page 13: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 13

Cross-Layer Approaches Link layer error recovery. Link layer retransmission.

TCP-awareness. TCP-unawareness.

Split connection.

Page 14: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 14

TCP-Aware Link Layer

Page 15: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 15

Snoop Protocol [Balakrishnan95] Retains local recovery of Split

Connection approach. Link level retransmissions. Differs from split connection

schemes: End-to-end semantics retained Soft state at base station.

Page 16: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 16

Snoop Protocol

FH MHBSwireless

physical

link

network

transport

application

physical

link

network

transport

application

physical

link

network

transport

application

rxmt

Per TCP-connection state

TCP connection

Page 17: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 17

Snoop Protocol Buffers data packets at base station.

Data sent by FH not yet ack’d by MH. Allow link layer retransmission.

When dupacks received by BS from MH (or local timeout), retransmit on wireless link, if packet in buffer.

Prevents fast retransmit by TCP sender at FH by suppressing dupacks at BS.

Page 18: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 18

Snoop : Example

FH MHBS

40 39 3738

3634

Example assumes delayed ack - every other packet ack’d

36

37

38

35 TCP statemaintained at

link layer

Page 19: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 19

Snoop : Example

41 40 3839

3634

36

37

38

35 39

Page 20: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 20

Snoop : Example

42 41 3940

36

Duplicate acks are not delayed

36

dupack

37

38

39

40

Page 21: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 21

Snoop : Example

40

363636

Duplicate acks

4143 42

37

38

39

40

41

Page 22: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 22

Snoop : Example

FH MHBS

41

3636

3744 43

36

37

38

39

40

41

42

Discarddupack

Dupack triggers retransmissionof packet 37 from base station

BS needs to be TCP-aware to

be able to interpret TCP headers

Page 23: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 23

Snoop : Example

37

36

36

4245 44

36

37

38

39

40

41

42

43

36

Page 24: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 24

Snoop : Example

42

36

36

4346 45

36

37

38

39

40

41

42

43

41

36

44

TCP sender does notfast retransmit

Page 25: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 25

Snoop : Example

43

3636

4447 46

36

37

38

39

40

41

42

43

41

36

44

TCP sender does notfast retransmit

45

Page 26: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 26

Snoop : Example

FH MHBS

44

3636

4548 47

36

42

43

41

36

44

45

43

46

Page 27: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 27

Performance

0

400000

800000

1200000

1600000

2000000

16K

32K

64K

128K

256K

no e

rror

1/error rate (in bytes)

bit

s/s

ec

base TCP

Snoop

2 Mbps Wireless link

Page 28: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 28

Snoop Protocol: Advantages

Snoop prevents fast retransmit from sender despite transmission errors and out-of-order delivery on the wireless link.

If wireless link delay-bandwidth product less than 4 packets: simple (TCP-unaware) link level retransmission scheme can suffice. Since delay-bandwidth product is small,

retransmission scheme can deliver lost packet without causing MH to send 3 dupacks.

Page 29: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 29

Snoop Protocol: Advantages Higher throughput can be achieved. Local recovery from wireless losses. Fast retransmit not triggered at

sender despite out-of-order link layer delivery.

End-to-end semantics retained. Soft state at base station.

Loss of the soft state affects performance, but not correctness.

Page 30: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 30

Snoop Protocol:Disadvantages Link layer at base station needs to

be TCP-aware. Not useful if TCP headers are

encrypted (IPsec). Cannot be used if TCP data and

TCP ACKs traverse different paths.

Page 31: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 31

Delayed Dupacks Approach TCP-unaware approximation of

TCP-aware link layer. Attempts to imitate Snoop without

making BS TCP-aware. Snoop implements two features at BS:

Link layer retransmission. Dupack handling: reduced interference

between TCP and link layer retransmissions (drop dupacks).

Page 32: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 32

Delayed Dupacks Implements same two features:

at BS : link layer retransmission. at MH : reducing interference

between TCP and link layer retransmissions (by delaying dupacks).

Page 33: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 33

Delayed Dupacks Protocols

TCP receiver delays dupacks (third and subsequent) for interval D, when out-of-order packets received.

Dupack delay intended to give link level retransmit time to succeed.

Benefit: Delayed dupacks can result in recovery from a transmission loss without triggering a response from the TCP sender.

Disadvantage: Recovery from congestion losses delayed.

Page 34: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 34

Delayed Dupacks Protocols Delayed dupacks released after

interval D, if missing packet not received.

Link layer maintains state to allow retransmission.

Page 35: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 35

Delayed Dupacks: Example

40 39 3738

3634

Example assumes delayed ack - every other packet ack’dLink layer acks are not shown

36

37

38

35

Link layer state

Page 36: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 36

Delayed Dupacks: Example

BS

41 40 3839

3634

36

37

38

39

35 Removed from BS link layer buffer on receipt of alink layer ack (LL acks not shown in figure)

Page 37: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 37

Delayed Dupacks: Example

42 41 3940

36

Duplicate acks are not delayed

36

dupack

37

38

39

40

Page 38: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 38

Delayed Dupacks: Example

40

363636

Duplicate acks

4143 42

37

38

39

40

41

Original ack

Page 39: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 39

Delayed Dupacks: Example

41

3636

3744 43

36

37

39

40

41

42

Base station forwards dupacks

dupack dupacksDelayeddupack

Page 40: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 40

Delayed Dupacks: Example

37

3636

4245 44

36

37

40

41

42

36dupacks

Delayed dupacks

43

Page 41: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 41

Delayed Dupacks : Example

424346 45

36

37

41

42

43

41

TCP sender does notfast retransmit

44

Delayed dupacks arediscarded if lost

packet received beforedelay D expires

Page 42: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 42

Delayed Dupacks [Vaidya99]

0

400000

800000

1200000

1600000

2000000

16384

32768

65536

1E+

05

1/error rate (in bytes)

base TCP

dupack delay80ms + LLRetransmit

Only LLretransmit

2 Mbps wireless duplex link with 20 ms delayNo congestion losses

20 ms 20 ms

10 Mbps 2 Mbps

Page 43: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 43

Delayed Dupacks [Vaidya99]

020000400006000080000

100000120000140000160000

16384

32768

65536

1E+

05

1/error rate (in bytes)

base TCP

dupack delay80ms + LLRetransmit

Only LLretransmit

5% packet loss due to congestion

20 ms 20 ms

10 Mbps 2 Mbps

Page 44: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 44

Delayed Dupacks: Advantages Link layer need not be TCP-aware. Can be used even if TCP headers

are encrypted. Works well for relatively small

wireless RTT (compared to end-to-end RTT).

Relatively small D sufficient in such cases.

Page 45: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 45

Delayed Dupacks: Disadvantages Right value of dupack delay D

dependent on wireless link properties.

Mechanisms to determine D needed.

Delays dupacks for congestion losses too, delaying congestion loss recovery.

Page 46: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 46

Cross-Layer Approaches Link layer error recovery. Link layer retransmission.

TCP-awareness. TCP-unawareness.

Split connection.

Page 47: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 47

Split Connection Approach

Page 48: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 48

Split Connection Approach

End-to-end TCP connection is broken into one connection on the wired part of route and one over wireless part.

Page 49: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 49

Split Connection Approach Connection between wireless host

MH and fixed host FH goes through base station BS.

FH-MH = FH-BS + BS-MH

FH MHBS

Base Station Mobile HostFixed Host

Page 50: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 50

Split Connection Approach Split connection results in

independent control for the two parts. Congestion/error control protocols,

packet size, time-outs, may be different for each part.

FH MHBS

Base Station Mobile HostFixed Host

Page 51: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 51

Split Connection Approach

wireless

physical

link

network

transport

application

physical

link

network

transport

application

physical

link

network

transport

application rxmt

Per-TCP connection state

TCP connection TCP connection

Page 52: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 52

Split Connection Approach : Classification

Hides transmission errors from sender

Primary responsibility at base station

If specialized transport protocol used on wireless, then wireless host also needs modification

Page 53: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 53

Split Connection Approach: Example

Indirect TCP [Bakre94] FH - BS connection : Standard TCP. BS - MH connection : Standard TCP.

Page 54: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 54

Split Connection: Advantages

BS-MH connection can be optimized independent of FH-BS connection. Different congestion/error control.

Local recovery of errors. Faster recovery due to relatively shorter

RTT on wireless link. Good performance achievable using

appropriate BS-MH protocol. Standard TCP on BS-MH performs poorly

when multiple packet losses per window. Selective ACKs improve performance.

Page 55: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 55

Split Connection: Disadvantages End-to-end semantics violated.

ACK may be delivered to sender before data delivered to receiver.

FH MHBS

40

39

3738

3640

Page 56: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 56

Split Connection: Disadvantages BS retains hard state.

BS failure can result in loss of data. If BS fails, packets 39 and 40 will be lost. Both ack’d to sender;sender does not

buffer.

FH MHBS

40

39

3738

3640

Page 57: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 57

Split Connection: Disadvantages BS retains hard state.

Hand-off latency increases due to state transfer Data that has been ack’d to sender

must be moved to new base station.

Page 58: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 58

Handoff

FH MHBS

40

39

3738

3640

MH

New base station

Hand-off

40

39

Page 59: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 59

Split Connection: Disadvantages Buffer space needed at BS for each TCP

connection. BS buffers tend to get full, when wireless

link slower (one window worth of data on wired connection could be stored at the base station for each split connection).

Extra copying of data at BS Copying from FH-BS socket buffer to BS-MH

socket buffer. Increases end-to-end latency.

Page 60: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 60

Split Connection:Disadvantages May not be useful if data and acks

traverse different paths. Example: data on a satellite wireless

hop, acks on a dial-up channel.

FH MH

data

ack

BS

Page 61: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 61

E2E Approaches Strict E2E versus E2E with

intermediate node involvement. E2E with intermediate node

involvement: Explicit notifications.

Page 62: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 62

Explicit Notification SchemesGeneral Philosophy Approximate ideal TCP behavior.

Ideally, TCP sender should simply retransmit a packet lost due to transmission errors without taking any congestion control actions.

A node determines whether packets are lost due to errors and informs sender using an “explicit notification”.

Sender, on receiving the notification, does not reduce congestion window, but retransmits lost packet.

Page 63: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 63

Explicit Notification Schemes Motivated by Explicit Congestion

Notification (ECN) proposals [Floyd94].

Variations proposed in literature differ in: Who sends explicit notification. How they decide to send explicit

notification. What sender does on receiving

notification.

Page 64: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 64

Explicit Loss Notification [Balakrishnan98] MH is the TCP sender. Wireless link first on path from sender

to receiver. Base station keeps track of holes in

packet sequence. When a dupack is received from the

receiver, BS compares the dupack sequence number with recorded holes. If there is a match, an ELN bit is set in

dupack.

Dupack with ELN set

Page 65: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 65

ELN When sender receives dupack with

ELN set, it retransmits packet, but does not reduce congestion window.

MH FHBS4 3 2 1 134

wireless

Recordhole at 2

111 1

Page 66: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 66

Explicit Loss Notification [Biaz99thesis]

Adapts ELN proposed in [Balakrishnan98] for the case when MH is receiver.

Caches TCP sequence numbers at base station, similar to Snoop. But does not cache data packets, unlike Snoop.

Duplicate acks are tagged with ELN bit before being forwarded to sender if sequence number for the lost packet is cached at BS.

Sender takes appropriate action on receiving ELN.

Page 67: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 67

ELN [Biaz99thesis]

37

36

37

3839

39

38

Sequence numberscached at base station

37 37

Dupack with ELN

Page 68: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 68

Explicit Bad State Notification [Bakshi97] MH is TCP receiver. BS attempts to deliver packets to MH using

link layer retransmission scheme. If packet cannot be delivered using small

number of retransmissions, BS sends a Explicit Bad State Notification (EBSN) message to TCP sender.

When TCP sender receives EBSN, it resets RTO. Timeout delayed when wireless channel in bad

state.

Page 69: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 69

Partial Ack Protocols [Cobb95][Biaz97] Send two types of

acknowledgements. Partial ACK informs sender that a

packet was received by an intermediate host (typically, base station).

Normal TCP cumulative ACK needed by sender for reliability purposes.

Page 70: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 70

Partial Ack Protocols When packet for which partial ack

is received detected to be lost, sender does not reduce its congestion window Loss assumed to be due to wireless

errors. 37

36

Partial ack

37

Cumulative ack

Page 71: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 71

Variations Base station may or may not

locally buffer and retransmit lost packets.

Page 72: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 72

Strict E2E Schemes

Page 73: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 73

Receiver-Based Scheme [Biaz98Asset] MH is TCP receiver. Receiver uses heuristics to guess cause

of packet loss. When receiver believes that packet loss

is due to errors, it sends notification to sender.

TCP sender, on receiving notification, retransmits lost packet, without reducing congestion window.

Page 74: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 74

Heuristics Receiver uses inter-arrival time between

consecutively received packets to guess cause of packet loss.

On determining a packet loss as being due to errors, the receiver may: Tag corresponding dupacks with an ELN bit,

or Send an explicit notification to sender.

Page 75: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 75

Receiver-Based Scheme Packet loss due to congestion

FH MHBS

1012 11

FH MHBS

11

1012

T

Congestion loss

Page 76: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 76

Receiver-Based Scheme Packet loss due to transmission

error

FH MHBS

1012 11

FH MHBS

101112Error loss

2 T

Page 77: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 77

Sender-Based Discrimination Scheme

Page 78: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 78

Sender-Based Discrimination [Biaz98ic3n,Biaz99techrep] Sender can attempt to determine cause

of a packet loss If packet loss determined to be due to

errors, do not reduce congestion window Sender can only use statistics based on

round-trip times, window sizes, and loss pattern. Unless network provides more information

(example: explicit loss notification)

Page 79: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 79

Heuristics for Congestion Avoidance Define condition C as a function of

congestion window size and observed RTTs.

Condition C evaluated for new RTT. If (C == True) reduce congestion

window.

Page 80: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 80

Heuristics for Congestion Avoidance: Some proposals

TCP Vegas [Brakmo94]

expected throughput ET = W(i) / RTTmin

actual throughput AT = W(i) / RTT(i)

Condition C = ( ET-AT > beta)

Page 81: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 81

Sender-Based Heuristics Record latest value evaluated for

condition C When a packet loss is detected:

If last evaluation of C is TRUE, assume packet loss due to congestion.

Else assume packet loss due to transmission errors.

If packet loss determined to be due to errors, do not reduce congestion window

Page 82: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 82

Sender-Based Heuristics: Disadvantage Does not work quite well enough!!

Reason

Not much correlation between observed short-term statistics, and onset of congestion.

Page 83: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 83

Sender-Based Heuristics: Advantages Only sender needs to be modified

Needs further investigation to develop better heuristics Investigate longer-term heuristics.

Page 84: CMPE 257: Wireless and Mobile Networking

CMPE 257 Spring 2005 84

Reliable Point2Point Transport Layer: Outline

TCP/IP basics. Impact of transmission errors on TCP

performance. Approaches to improve TCP

performance on wireless networks. Classification.

TCP on cellular. TCP on MANETs.