Professional Documents
Culture Documents
TRANSPORT PROTOCOL
*1 *2
Ms. Ramya P., Saravanan A. M.,
*1
M.phil Research Scholar, Department of computer Science Muthurangam Government Arts
College (Autonomous), Vellore, TamilNadu, India.
*2
Assistant Prof, Department of Computer Science Muthurangam Government Arts College
(Autonomous), Vellore.
---------------------------------------------------------------------
***---------------------------------------------------------------------
Abstract - In this Paper, a new transport challenges to be tackled only get bigger when
protocol, the Access Multi-Path Access considering real-time video/audio streams owing
to the time-sensitive nature of real-time data. As
Transmission Control Protocol (ACLs) is
stated in, application level end-to-end delays
proposed. The proposed protocol has been exceeding 250 ms affect data delivery of real-
designed to handle real-time streams time streams leading to unintelligible real-time
(video and audio) over IP-networks. One of interaction from an end-users perspective. Also,
the key strengths of this protocol lies in its real-time data transfers cannot be compared with
ability to intelligently exploit the voluminous file data transfers because the idea is
availability of multiple paths between not to utilize the highest available network
bandwidth for fast transmission but rather
multi-homed hosts for Synchronized
transmit data at the rate at which it is dispatched
transmission of unicast Synchronized by the real-time source while ensuring minimal
streams. This work describes the jitter.
architecture and operation of ACLs in Currently, real-time applications utilize the
detail. In addition, the limitations of user datagram protocol (UDP) at the transport
currently used transport protocols in layer for their transmissions. UDP is connection-
handling real-time streams are also less and does not re-transmit packets, making it
a lightweight protocol. Also, UDP does not take
discussed. These limitations of other
care of re-ordering packets arriving out of order
protocols have played a vital role in the at the destination. Applications using UDP have
design process of the proposed protocol. no knowledge of network status and hence may
Experiments to evaluate the performance under-utilize available bandwidth or worsen the
of ACLs against other protocols and the congestion in the network. The standard
results obtained therein are also Transmission Control Protocol (TCP) on the other
documented in this work. Results show that hand is connection-oriented, takes care of
retransmission and does re-ordering of packets
ACLs is a best effort protocol that tries to
arriving out of order at the destination. Although
maximize the amount of data that is TCP does have some knowledge of the network
successfully delivered to the destination in congestion status; TCPs retransmission to ensure
a timely manner under varying drop and that each and every packet does reach the
delay conditions of the network. destination is an expensive (time consuming)
process for real-time streams. Retransmitted
Key Words: synchronized Transmission packets over networks with reasonable delays
Control, MAC, Transport Protocol, ACLs, Access have little value at the receiving end in real-time
applications such as Voice over IP (VoIP) and
Control firewall.
Digital Video over IP (DVIP) because of their late
arrival. Also, in the process of retransmission of a
set of data packets, newer data being dispatched
I. INTRODUCTION from the source gets held up until the
retransmission is complete [3]. Thus a cycle of
Recent advances in digital networking constantly increasing delay in data delivery sets
technology coupled with the rapid increase in in during the length of the transmission which is
consumption of digital content over the intra / unacceptable for real-time streams.
internet have placed a greater emphasis on Another limitation of both TCP and UDP is
bandwidth aggregation, network load balancing their inability to probe for and utilize multiple
(NLB) and reliable communication. The
paths if available between hosts equipped with Table 2.1: Protocol Feature Comparison
multiple network interfaces (multi-homed hosts). Chart
TCP / UDP can bind to only one IP-endpoint at
either end. Applications can however split data
across multiple connections to enable multi- 2.1 TCP
homed streaming. It is shown in that multi- Transmission Control Protocol is the core
homed streaming can improve quality of protocol used on the internet for reliable
reception (Q) by 30% or more. While some transmission of data. TCP is categorized as a
studies on non real-time traffic have pro-posed single-path, loss aware, reliable and fully ordered
multipath data transfer solutions at application delivery transport (refer Table 2.1). TCP is stream
layer and network layer, it has been clearly oriented in nature which means that data is
shown in that it is the transport layer that is best received by applications at the destination as a
equipped with end-to-end information and hence continuous stream of bytes without any
most suitable for positioning the multipath data demarcation at message boundaries. The strict
transport capability. ordering and reliability of TCP makes it extremely
useful for lossless transfer of data from source to
II. RELATED WORK destination. However, there are problems when
The Multipath State Aware Access using TCP for real-time data (refer section 2.4).
Multipath Transfer- Redundant Transmission
(MSACMT-RT) algorithm observes the path status 2.2 Multi-path Transport
and assigns the path priorities before Protocols that belong to this family, bind
transmission. The observation is to identify a to multiple IP endpoints at both the source and
path that is expected to face failure (Weak Path). the destination ends (refer Fig. 2.1) at the
In order to support this weak path previous beginning of a user session. Data transmission is
findings proposed a suitable path. Due to the along one or more paths connecting the multiple
dynamic nature of the internet traffic flow, the IP endpoints for the session. Some of these
characteristic of the path also varies dynamically. protocols also support addition of new IP
Therefore, it is injustice to maintain the initially endpoints as well as removal of IP endpoints
identified weak path as weak throughout the when a session is in progress. ACL, ACL-PR, ACL
period of transmission. Thus in order to fulfil the (CDT), ACL-PR (CDT) and cmpTCP belong to this
dynamic nature of the internet path family of protocols.
characteristics, the MSACMT-RT algorithm is
reviewed periodically and the path priority is 2.3 Multi-path Non-Access Transport
reassigned before re-scheduling the CMT. The These are protocols that establish multiple
MSACMT-RT reviewing considers the loss paths between source and destination but utilize
probability and additional unnecessary overhead. only one path for transmission while reserving
the rest for fail-over.
This test finds the appropriate period
when the MSACMT-RT algorithm should be 2.4 ACL
reviewed. The experiment is carried out for The Stream Control Transmission Protocol
various file sizes, and the resulting MSACMT-RT (ACL) was the first protocol of its kind that
review period is ideal when reviewed after every enabled multi-homed hosts to communicate via
ten successful transmissions. Since Internet multiple paths. ACL provides features such as
setups have dynamic path characteristics, the sequenced delivery of user messages within
ACL's MSACMT-RT policy is investigated in multiple streams, optional bundling of multiple
challenging scenarios of equal and unequal user messages into a single ACL packet and
number of interfaces with failure and non-failure network- level fault tolerance through supporting
conditions in each scenario. As the network load of multi-homing at either or both ends of an ACL
is uncertain, various robustness tests are association.
performed on systems, with symmetric and
asymmetric interfaces, to ensure and to exploit
the multihoming benefits of ACL. Extensive
simulation studies have been performed using
the University of Delawares ns-2 ACL/CMT
module (ns-2 V2.29, 2005) (Caro and Iyengar
2006)..
Fig 2.1 Block Diagram of Multi-Path to the task running on the relevant core. When a
Transport provides task receives such a signal, it returns control to
On a multi-homed host, ACL has the the backup thread on that core by lowering its
capability to tie down multiple IP addresses of the priority.
host to a common ACL endpoint that can be used
for data transmission or reception. This means
that when an ACL association is established
between two multi-homed hosts, all potential
network paths for data transfer are scouted for
and kept track of by the protocol. ACLs ability to
scout for and establish multiple paths for
communication has in fact made it the backbone
for Access data transport protocols
Nonetheless, the implementation given Let j be the first path from PathSet;
leaves critical shared scheduling data structures
vulnerable to corruption. If one of these data While data is pending transmission do
structures were to become corrupted, it could
If (obpa(j) < cwnd(j)) or (missing(j) +
cause the failure of all tasks in the system. The
sentAlready(j) < missing(j +1))
only way around this problem is to prevent any
task application code from being able to write to Then
these shared scheduling data structures. (We
assume that the virtual scheduler runtime library Transmit on path j;
code is trusted not to cause corruption;
ultimately, some code in the system must be End
trusted to update scheduling data structures.)
Below, we outline how the implementation from Else
Section 3 can be modified to achieve this
property. (There are many specific Choose path j + 1;
implementation tradeoffs that may be worth
investigating in future work. Here, our concern is If j + 1 is not a valid path number
simply to show that our virtual scheduler then
mechanism can be modified to enable memory
Break out of the loop;
protection.) ACLs a the variant of ACLs , is based
on the idea that information about the missing End
packets can not only be used to control the End
amount of data being dispatched on each path The variant thus operates by sorting the
but also direct the decision control of choosing a paths in the increasing order of the number of
path. packets missing on the respective paths and then
choosing paths in that order, dispatches packets
Algorithm1: ACLs Scheduler
as much as their respective congestion windows
For all i such that i is a valid path number do would permit. In addition, ACLs may dispatch
data exceeding the path capacity if it finds that
If obpa (i) < cwnd(i) then loss of all of that data in excess of the capacity
still does not make that path worse than the next
Transmit on path i until obpa (i) = cwnd(i); best.
Idle Path
Condition: No transmission on path p for sender is notified about the last TSN flushed to
duration of 1x ATO the upper layer via a selective acknowledgement
Cwnd (p) = integral multiple of MTU(p) (SACK) packet.