SlideShare une entreprise Scribd logo
1  sur  13
SNOOP+α
PROTOCOL
The snoop agent
THE SNOOP PROTOCOL
1-a snoop agent, is introduced at the AP (Access Point) that acts as the last

2-The snoop agent monitors every packet that passes through the AP in eith

3-he Snoop agent operates differently on TCP data and ACK channels, as w


4-For data transfer from an MT to the FH, t
control procedures.
1-If BS sends duplicate A2 FH will think that there is congestion and lowers speed
2-Disadvantage will send P4 and after P3 he will send P3 and P4.

                                                       MH
           FH                BS snoop agent


         P2   P1
         P3                               P1
         P4                              P2
                                   X

                                  X      Ack1

                   Ack1
                                          Ack2

                      Ack2                    Ack2
                                                     P3
                                                P4
                                       Ack3
                   Ack3

                          Ack4                       Ack4
Advantages of Snoop protocol




1-offered End-to-End connections for TCP
2-prevents Fixed Host from generating congestion algorithms
3-Improved performance
4-decreased End-to-End Average delay.
5-High throughput
Protocols combined with snoop
protocol

TCP Tahoe
Reno
New Reno
SACK
Vegas
Simulation Results
Improvement of TCP protocols
using snoop

1-As expected, most TCP versions improve compared to the
plain wireless environment without Snoop. For instance,
TCP Tahoe, Reno and New Reno improve.

2- However, two important aspects need further
investigation. TCP Vegas, which was the worst performing
version without Snoop, now is the best performing version,
and TCP SACK that was the best performing version without
Snoop is now the worst version.
Snoop+ α Protocol

1-snoop has a problem; when there are no duplicate ACKs, the Snoop protocol cannot notice the

2- the Snoop+ α protocol to solve the Snoop protocol’s problem. Because the Snoop+ α agent ad
These ACKs fall into one of three categories:




1-Duplicate ACK : this is an ACK identical to the previously received ACK nu
2- A spurious ACK : this is an ACK whose number is less than that of the las
3-A new ACK : this is an ACK not received previously by the snoop+ α agen
Procedure for packets loss

For data transfer from an FH (Fixed Host) to an MT, the
Snoop agent caches unacknowledged TCP data segments,
which it forwards to the TCP receiver, and monitors the
corresponding ACKs. In particular, it provides for:

1.Retransmission  of any lost data segments locally by
1.using local timers or TCP duplicate acknowledgments to

identify packet loss, instead of waiting for the FH to do so.
2. Suppressing the duplicate ACKs on their way from
the MT back to the FH, thus avoiding fast retransmit and
congestion control at the latter.
Tcp snoop protocols
Tcp snoop protocols

Contenu connexe

Tendances

C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
Rio Nguyen
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
Farooq Khan
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
myrajendra
 

Tendances (20)

C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Pause frames an overview
Pause frames an overviewPause frames an overview
Pause frames an overview
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Tcp
TcpTcp
Tcp
 
A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...A Survey of Different Approaches for Differentiating Bit Error and Congestion...
A Survey of Different Approaches for Differentiating Bit Error and Congestion...
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)
 
Lect9
Lect9Lect9
Lect9
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 

Similaire à Tcp snoop protocols

Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
sangusajjan
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)
NYversity
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.
aghacrom
 
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDKLF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 

Similaire à Tcp snoop protocols (20)

Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Datalink control(framing,protocols)
Datalink control(framing,protocols)Datalink control(framing,protocols)
Datalink control(framing,protocols)
 
Computer network (11)
Computer network (11)Computer network (11)
Computer network (11)
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
features of tcp important for the web
features of tcp  important for the webfeatures of tcp  important for the web
features of tcp important for the web
 
Parallel computing(1)
Parallel computing(1)Parallel computing(1)
Parallel computing(1)
 
09 coms 525 tcpip - tcp 2
09   coms 525 tcpip - tcp 209   coms 525 tcpip - tcp 2
09 coms 525 tcpip - tcp 2
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to Computer Networks
Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Sack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.pptSack TCP Lecture13 all in one easily explain.ppt
Sack TCP Lecture13 all in one easily explain.ppt
 
Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.Expl sw chapter_05_stp_part_i-rev2.
Expl sw chapter_05_stp_part_i-rev2.
 
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDKLF_DPDK17_Accelerating P4-based Dataplane with DPDK
LF_DPDK17_Accelerating P4-based Dataplane with DPDK
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDP
 
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP ProtocolsTCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
TCP & UDP Streaming Comparison and a Study on DCCP & SCTP Protocols
 
7. protocols
7. protocols7. protocols
7. protocols
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tcp (1)
Tcp (1)Tcp (1)
Tcp (1)
 

Plus de Amr Nasr (16)

Comparison of image fusion methods
Comparison of image fusion methodsComparison of image fusion methods
Comparison of image fusion methods
 
6 big google buys of 2012
6 big google buys of 20126 big google buys of 2012
6 big google buys of 2012
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Scaling compression2
Scaling compression2Scaling compression2
Scaling compression2
 
Compression one example
Compression one exampleCompression one example
Compression one example
 
Video watermarking
Video watermarkingVideo watermarking
Video watermarking
 
Watermark
WatermarkWatermark
Watermark
 
Whitebalance
WhitebalanceWhitebalance
Whitebalance
 
Wavelet
WaveletWavelet
Wavelet
 
Wavelet watermark level3
Wavelet watermark level3Wavelet watermark level3
Wavelet watermark level3
 
Wavelet watermark level2
Wavelet watermark level2Wavelet watermark level2
Wavelet watermark level2
 
Two dimensional true wavelet compression
Two dimensional true wavelet compressionTwo dimensional true wavelet compression
Two dimensional true wavelet compression
 
Image fft
Image fftImage fft
Image fft
 
Image dct shifting
Image dct shiftingImage dct shifting
Image dct shifting
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Crypt
CryptCrypt
Crypt
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Tcp snoop protocols

  • 3. THE SNOOP PROTOCOL 1-a snoop agent, is introduced at the AP (Access Point) that acts as the last 2-The snoop agent monitors every packet that passes through the AP in eith 3-he Snoop agent operates differently on TCP data and ACK channels, as w 4-For data transfer from an MT to the FH, t control procedures.
  • 4. 1-If BS sends duplicate A2 FH will think that there is congestion and lowers speed 2-Disadvantage will send P4 and after P3 he will send P3 and P4. MH FH BS snoop agent P2 P1 P3 P1 P4 P2 X X Ack1 Ack1 Ack2 Ack2 Ack2 P3 P4 Ack3 Ack3 Ack4 Ack4
  • 5. Advantages of Snoop protocol 1-offered End-to-End connections for TCP 2-prevents Fixed Host from generating congestion algorithms 3-Improved performance 4-decreased End-to-End Average delay. 5-High throughput
  • 6. Protocols combined with snoop protocol TCP Tahoe Reno New Reno SACK Vegas
  • 8. Improvement of TCP protocols using snoop 1-As expected, most TCP versions improve compared to the plain wireless environment without Snoop. For instance, TCP Tahoe, Reno and New Reno improve. 2- However, two important aspects need further investigation. TCP Vegas, which was the worst performing version without Snoop, now is the best performing version, and TCP SACK that was the best performing version without Snoop is now the worst version.
  • 9. Snoop+ α Protocol 1-snoop has a problem; when there are no duplicate ACKs, the Snoop protocol cannot notice the 2- the Snoop+ α protocol to solve the Snoop protocol’s problem. Because the Snoop+ α agent ad
  • 10. These ACKs fall into one of three categories: 1-Duplicate ACK : this is an ACK identical to the previously received ACK nu 2- A spurious ACK : this is an ACK whose number is less than that of the las 3-A new ACK : this is an ACK not received previously by the snoop+ α agen
  • 11. Procedure for packets loss For data transfer from an FH (Fixed Host) to an MT, the Snoop agent caches unacknowledged TCP data segments, which it forwards to the TCP receiver, and monitors the corresponding ACKs. In particular, it provides for: 1.Retransmission of any lost data segments locally by 1.using local timers or TCP duplicate acknowledgments to identify packet loss, instead of waiting for the FH to do so. 2. Suppressing the duplicate ACKs on their way from the MT back to the FH, thus avoiding fast retransmit and congestion control at the latter.