Interactive transparent networking-modeling examples of snoop and WTCP protocols

نویسندگان

  • Javed I. Khan
  • Raid Zaghal
چکیده

The layered rigid organization of traditional network service stack currently poses a two fold problem: (i) better solutions/improvements cannot be practically deployed in the service stack –we call this the ‘Evolution’ problem, and (ii) applications are becoming more selective and critically demanding for specialized services –we call this the ‘Implementation Conflict’ problem. The ‘Programmable’ and ‘Active’ network paradigms tried to solve both problems by allowing arbitrary custom codes to be embedded inside network layers. We propose a less radical approach in which required service state information can be pulled-up to the upper layer where ‘actions’ are performed by programmable components, and generated ‘actions’ are pushed down into the network layer. This approach relives lower network layers from housing costly custom components and addresses other practical issues like security and flexibility. We call this mechanism ‘Interactive Transparent Networking’. In this paper, we explain the mechanism and its advantages in creating TCP-friendly applications. We also show by example how it can be used as a protocol augmentation tool by modeling two well-known protocols proposed in the literature to improve TCP performance over wireless networks: Snoop [2] and WTCP [12].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interactive Transparent Networking: Protocol meta modeling based on EFSM

the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network paradigms have been trying to solve the problems emanating from the immutable organization of network software layers by allowing arbitrary custom codes to be embedded inside network layers. In this work, we propose a new approach for build...

متن کامل

WTCP: an efficient mechanism for improving wireless access to TCP services

The Transmission Control Protocol (TCP) has been mainly designed assuming a relatively reliable wireline network. It is known to perform poorly in the presence of wireless links because of its basic assumption that any loss of a data segment is due to congestion and consequently it invokes congestion control measures. However, on wireless access links, a large number of segment losses will occu...

متن کامل

Analysis of reliable transport layer protocols in wireless networks

Reliable transport layer protocols like TCP used in traditional wired networks are not suitable in a wireless scenario. This is due to the potential misinterpretation of lost packets as congestion, which in reality could be attributed to the high bit error rate in the wireless channel, wireless interference or the mobility of the nodes. Several extensions of TCP have been proposed for wireless ...

متن کامل

Effect of Local Retransmission at Wireless Access Points on the Round Trip Time Estimation of TCP

The Transmission Control Protocol (TCP) has been mainly designed assuming a relatively reliable wireline network. It is known to perform poorly in the presence of wireless links because of its basic assumption that any loss of a data segment is due to congestion and consequently it invokes congestion control measures. However, on wireless access links, a large number of segment losses will occu...

متن کامل

Transport Layer Loss Differentiation and Loss Notification

It is a well known problem that errors and losses caused by unfavorable wireless link conditions cause problems for congestion controlled transport protocols such as TCP. TCP assumes that all losses occur due to network congestion. To remedy the perceived congestion, congestion avoidance is employed, typically by the TCP sender halving the sending rate. When congestion avoidance is incorrectly ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2005