• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

"Achieving high data rates using TCP/IP over satellite networks can be difficult" - review and discuss.

Extracts from this document...


CCM 3060        Page         5/6/2007        

Coursework 1

Question 1

a). “Achieving high data rates using TCP/IP over satellite networks can be difficult”- review and discuss  

       some of the reasons TCP/IP has difficulty with satellite links, including the following issues: IP

       Throughput, IP Time To Live, IP Fragmentation, TCP Throughput and Throughput Expectations, TCP

       Sequence Numbers, TCP Transmission Window, Slow Start, and Congestion Avoidance.

Achieving high data rates using Transmission Control Protocol & Internet Protocol (TCP/IP) over satellite networks can be difficult because satellite links have a high latency, which causes the reduction of the performance of some protocols like TCP/IP that are commonly used.

The main reason to this problem is the design of TCP/IP. They were not designed to be applied in wireless environment, they were actually meant to be used in fixed networks only that are end-to-end and based on reliability and connection orientation.

For example, the Internet, which is the biggest computer network consisting of millions of terminals is based on the TCP/IP protocol architecture, since it is a fixed Virtual Area Network (VAN). The architecture of TCP was designed to be used in networks with high Bit Error Rates (BERs), and it will not work well in wireless environment, where losses are due to high BERs. Besides, because IP relies on end-to-end data verification, it is unsuitable for wireless links.

...read more.


www.adec.edu/nsf/tcpipperformance.pdf TCP/IP+and+Satellite+Links&hl=de&ie=UTF-8).

TCP/IP has congestion control features, which makes the throughput drop when file size decreases, and bit error rate increases. Unless it builds up over a period of time, TCP/IP will not perform a file transfer to start at the speed that is actually allowed by its window. Therefore it uses a technique called “Slow Start” that will find out the throughput capacity of the channel. It simply sends a packet across the channel and waits for a response. If it receives a response it will send the next packet a bit faster than the previous one, and thus 50% more data will be sent in every roundtrip. It will repeat this procedure until it has discovered the maximum speed of the link, i.e. until the packet sent is lost.  This loss of the packets will be interpreted that a congestion is indicated. But there are two problems with the Slow Start technique on high speed networks.

...read more.


Andrew S. Tanenbaum, “Structured Computer Organization”, Fourth Edition, Prentice-Hall of India, ISBN 81-203-1553-7

William Stallings, “Data & Computer Communcations”, Sixth Edition, Pearson Education Asia, ISBN 81-7808-442-2

Fred Halsall, “Data Communications, Computer Networks and Open Systems”, Fourth Edition, Pearson Education Asia, ISBN 81-7808-098-2


Ya Xu,“The solution to CSCI 551 Homework Assignment 4”http://netweb.usc.edu/yaxu/551/assign4.html (12/10/02)

Craig Partridge & Timothy J. Shepard, TCP/IP Performance over Satellite Links,

http://mmlab.snu.ac.kr/course/AdvancedInternet/reading/SatelliteTCP.htm (12/10/02)

Heiko Holtkamp, “TCP/IP in Detail”

http://images.google.com/imgres?imgurl=www.rvs.uni-bielefeld.de/~heiko/tcpip/abbildungen/fragmentation.gif&imgrefurl=http://www.rvs.uni-bielefeld.de/~heiko/tcpip/kap_2_3.html&h=133&w=558&prev=/images%3Fq%3DTCP%2BFragmentation%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8 (13/10/02)

Thomas Bonald, “Transmission Control Protocol” http://images.google.com/imgres?imgurl=www-sop.inria.fr/mistral/personnel/Thomas.Bonald/images/tcp.gif&imgrefurl=http://www-sop.inria.fr/mistral/personnel/Thomas.Bonald/tcp_eng.html&h=234&w=583&prev=/images%3Fq%3DTCP%2BTransmission%2BWindow%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8%26sa%3DG (13/10/02)

Mike Andrews, “The Development of TCP/IP”

http://images.google.com/imgres?imgurl=www.gweep.net/~rocko/mqp/img15.gif&imgrefurl=http://www.gweep.net/~rocko/mqp/node8.html&h=304&w=573&prev=/images%3Fq%3DSlow%2BStart%2BTCP/IP%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8 (13/10/02)

Gasthurie Kanagachandran                                                                           Student No. 2035883

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    The other fundamental part of the bill states that the government reserve the right to restrict any website for access by the British public that they see fit. Many ISPs are frustrated with the new bill. They mention that the costs of writing letters and reducing connections between 10,000 and

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    (2003). Where Now for Development Methodologies?. Communication of the ACM. 46(1) pp.79-82. Barclay, S. et al. (nd). CASE TOOLS. [Online]. Available from: http://educ.queensu.ca/~compsci/units/casetools.html [Accessed: 19th April 2009] Batty, P. et al. (1994). USE OF INTEGRATED CASE TOOL FOR GIS CUSTOMISATION. Smallworld Systems LTD. 1(1) pp 852-859 [Online]. Avaliable from: http://libraries.maine.edu/Spatial/gisweb/spatdb/egis/eg94097.html [Accessed 20th April 2009]. Bowles, A.J.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    Y has a nominal range of 16-235; Cb and Cr have a nominal range of 16-240. To accommodate storage and bandwidth limitation, the two color components (Cb and Cr) are compressed by sampling them at lower rate than the brightness component.

  2. TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The ...

    to transfer the file to gaia.cs.umass.edu? IP address: TCP port number: 1161 Destination IP address: TCP port number: 80 TCP Basics 4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu?

  1. Ethics and professionalism in computing - examples from Facebook and Google

    be liable for any loss or damage that is not reasonably foreseeable. 5. Security FACEBOOK Privacy and security mostly are the same. They do their best to keep Facebook safe, but they cannot guarantee it. In considering of security protection: * They use 'HTTPS' to make the platform and the

  2. Toronto Airport Case Study Wireless Applications

    configuration of the core IP network infrastructure (see assumption subsection in this section) Identify the airport services that utilize the wireless infrastructure Establish Objectives for those services Baseline the configuration of the wireless infrastructure and related core network equipment required to support those services Identify the Single Points of Failure (SPOF)

  1. Precise analysis about The legal or illegal utilization of Internet cookies

    As Berteau (2007, para. 2) argues, tracking cookies can pose a threat to privacy as they allow tracking customers' behavior in a way which is invisible to most users. If cookies use users' personal information (such as credit card number and home address)

  2. Methods and technology used in Computer Forensics

    Developed by Bob Boyer and J Strother Moore in the late 70s, essentially finds one string of characters in another21. The algorithim works off of the concept of pattern alignment, which is why it has proved so succesfull in computer forensics, where oftentimes data fragments and recovered bytes are so small and seemingly irrlevant.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work