logo

Details About Snooping TCP

Jan, 04 2021, 08:14 pm [IST]
Details About Snooping TCP

One of the disadvantages of I-TCP is the segmentation of the single TCP connection into TCP connections, thereby losing the original end to end TCP semantic. This TCP enhancement was quite transparently and transmits the TCP end to end connection intact. The main role of this improvement is to buffer data close to the fast local retransmission in case of packet loss.

In this method, the foreign agent buffers are packets with the destination mobile host and additionally snoops the packet flow in both directions. The foreign agent buffers every packet until it receives an acknowledgment from the mobile host. If the foreign agent did not receive an acknowledgment from the mobile host within a certain amount of time.

Alternatively, the foreign agent could receive a duplicate acknowledgment also showing the mass of a packet. Now the foreign agent transmits the packet directly from the buffer, thus performing a much faster transmission compared to the correspondent host. The time out for acknowledgment can be said much shorter, for it reflects only the delay of one-hop plus passing time.

To remain transparent, the foreign agent must not acknowledge data to the respondent host. Doing so so would make the correspondent host believe that the mobile host had received the data. This would violet the end-to-end semantic in case of a foreign agent failure. However, the foreign agent can filter the duplicate acknowledgment to avoid unnecessary retransmissions of data from the correspondent host. If the foreign agent now crashes, the Timeout of the correspondent host still works and triggers retransmission.

Furthermore, the foreign agent may drop duplicates of packets already transmitted locally and acknowledged by the mobile host. This avoids redundant traffic on the wireless connection.

Extending the functions of a foreign agent with a snooping TCP has several advantages:

  • The best benefit of this method is the preservation of the end-to-end TCP semantic. No need at what time the foreign agent crashes, neither the correspondent host nor the mobile host has an irregular way of the TCP link as is possible with I-TCP. The strategy automatically drops back to standard TCP if the enhancements stop running.
  • No corresponding to the first needs to be changed, most of the enhancements are in the foreign agent. Supporting only the packet stream to the mobile host does not even require changes in the mobile host.
  • A good effect of this method is that it requires no handover of the state as soon as the mobile host change to another foreign agent. Assume there might still be data in the buffer not transferred to the next form agent. All that happens is a time out at the correspondent host and retransmission of the packets, possibly ready to the new care-of address.
  • Furthermore, it does not matter if the next agent uses the enhancement or not. If not, the approach automatically falls back to the standard solution. This is one of the difficulties of I-TCP, for the old foreign agent I have already indicated the correct received update via to the correspondent host and now has to transfer these packets to the mobile host via a new foreign agent.

However, the simplicity of this came also results in some disadvantages:

  • Snooping TCP does not isolate the behavior of the wireless link as well as I-TCP.
  • Using negative acknowledgments between the foreign tool and mobile host allows an extra tool on the mobile host. Thus, this method is no longer transparent for arbitrary mobile hosts.
  • Finally, all efforts for snooping and buffering the data may be useless if Saturn encryption skills are applied end-to-end between the correspondent host Anda mobile host.

Share this: FACEBOOK TWITTER WHATSAPP


YOU MAY LIKE

MOST VIEWED

Details About Software Quality Assurance

Dec, 16 2020, 12:02 pm [IST]
Details About Software Quality Assurance

SOFTWARE ENGINEERING

Software quality assurance Software quality is described as conformance to explicitly state functional and performance requirements, explicitly documented standards and implicit features that are anticipated of all professionally developer software ... Read More


Details About Tunnelling and Encapsulation in Mobile IP

Dec, 10 2020, 02:19 pm [IST]
Details About Tunnelling and Encapsulation in Mobile IP

MOBILE COMMUNICATIONS

A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel endpoint. Packets entering a tunnel are forwarded inside the tunnel leave the tunnel unchanged. Tunneling, that is, sending a packet through a tunnel, is achieved by using encapsulation ... Read More


Details About Software Architecture

Dec, 06 2020, 12:17 pm [IST]
Details About Software Architecture

SOFTWARE ENGINEERING

The overall structure of the software components and how the success provides a conceptual integrated file system. In other words, architecture is the hierarchical structure of program components, how these components interact, and the structure of data that are used by the components ... Read More


Details About Real-Time And Distributed System Design

Dec, 04 2020, 01:28 pm [IST]
Details About Real-Time And Distributed System Design

SOFTWARE ENGINEERING

Real-time and distributed system design The real-time system is a software system the correct functioning of the system depends on the results produced by the system the time at which these results are produced ... Read More


Explanation About Software Project Lifecycle Model

Dec, 02 2020, 12:39 pm [IST]
Explanation About Software Project Lifecycle Model

SOFTWARE ENGINEERING

Waterfall Model The waterfall model also called classic life cycle requirements is well defined and stable. It suggests a systematic, sequential approach to software development. It begins with customer specification of requirements and processes through planning, modeling, instruction, and deployment ... Read More


Software Design Concepts in Software Engineering

Dec, 13 2020, 12:01 pm [IST]
Software Design Concepts in Software Engineering

SOFTWARE ENGINEERING

Software Design A software design is an essential engineering description of some software product that is to be established. A design can be determined to the customer's requirements and can be assessed for quality against predefined patterns ... Read More


Go to Top

FOLLOW US: FACEBOOK

About Us | Contact Us | Disclaimer | Privacy Policy | Sitemap | Terms and Conditions

Copyright © 2021 TeluguAsami. All rights reserved.