• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

"Achieving high data rates using TCP/IP over satellite networks can be difficult" - review and discuss.

Extracts from this document...

Introduction

CCM 3060        Page         5/6/2007        

Coursework 1

Question 1

a). “Achieving high data rates using TCP/IP over satellite networks can be difficult”- review and discuss  

       some of the reasons TCP/IP has difficulty with satellite links, including the following issues: IP

       Throughput, IP Time To Live, IP Fragmentation, TCP Throughput and Throughput Expectations, TCP

       Sequence Numbers, TCP Transmission Window, Slow Start, and Congestion Avoidance.

Achieving high data rates using Transmission Control Protocol & Internet Protocol (TCP/IP) over satellite networks can be difficult because satellite links have a high latency, which causes the reduction of the performance of some protocols like TCP/IP that are commonly used.

The main reason to this problem is the design of TCP/IP. They were not designed to be applied in wireless environment, they were actually meant to be used in fixed networks only that are end-to-end and based on reliability and connection orientation.

For example, the Internet, which is the biggest computer network consisting of millions of terminals is based on the TCP/IP protocol architecture, since it is a fixed Virtual Area Network (VAN). The architecture of TCP was designed to be used in networks with high Bit Error Rates (BERs), and it will not work well in wireless environment, where losses are due to high BERs. Besides, because IP relies on end-to-end data verification, it is unsuitable for wireless links.

...read more.

Middle

www.adec.edu/nsf/tcpipperformance.pdf TCP/IP+and+Satellite+Links&hl=de&ie=UTF-8).

TCP/IP has congestion control features, which makes the throughput drop when file size decreases, and bit error rate increases. Unless it builds up over a period of time, TCP/IP will not perform a file transfer to start at the speed that is actually allowed by its window. Therefore it uses a technique called “Slow Start” that will find out the throughput capacity of the channel. It simply sends a packet across the channel and waits for a response. If it receives a response it will send the next packet a bit faster than the previous one, and thus 50% more data will be sent in every roundtrip. It will repeat this procedure until it has discovered the maximum speed of the link, i.e. until the packet sent is lost.  This loss of the packets will be interpreted that a congestion is indicated. But there are two problems with the Slow Start technique on high speed networks.

...read more.

Conclusion

Andrew S. Tanenbaum, “Structured Computer Organization”, Fourth Edition, Prentice-Hall of India, ISBN 81-203-1553-7

William Stallings, “Data & Computer Communcations”, Sixth Edition, Pearson Education Asia, ISBN 81-7808-442-2

Fred Halsall, “Data Communications, Computer Networks and Open Systems”, Fourth Edition, Pearson Education Asia, ISBN 81-7808-098-2

Websites

Ya Xu,“The solution to CSCI 551 Homework Assignment 4”http://netweb.usc.edu/yaxu/551/assign4.html (12/10/02)

Craig Partridge & Timothy J. Shepard, TCP/IP Performance over Satellite Links,

http://mmlab.snu.ac.kr/course/AdvancedInternet/reading/SatelliteTCP.htm (12/10/02)

Heiko Holtkamp, “TCP/IP in Detail”

http://images.google.com/imgres?imgurl=www.rvs.uni-bielefeld.de/~heiko/tcpip/abbildungen/fragmentation.gif&imgrefurl=http://www.rvs.uni-bielefeld.de/~heiko/tcpip/kap_2_3.html&h=133&w=558&prev=/images%3Fq%3DTCP%2BFragmentation%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8 (13/10/02)

Thomas Bonald, “Transmission Control Protocol” http://images.google.com/imgres?imgurl=www-sop.inria.fr/mistral/personnel/Thomas.Bonald/images/tcp.gif&imgrefurl=http://www-sop.inria.fr/mistral/personnel/Thomas.Bonald/tcp_eng.html&h=234&w=583&prev=/images%3Fq%3DTCP%2BTransmission%2BWindow%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8%26sa%3DG (13/10/02)

Mike Andrews, “The Development of TCP/IP”

http://images.google.com/imgres?imgurl=www.gweep.net/~rocko/mqp/img15.gif&imgrefurl=http://www.gweep.net/~rocko/mqp/node8.html&h=304&w=573&prev=/images%3Fq%3DSlow%2BStart%2BTCP/IP%26svnum%3D10%26hl%3Dde%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8 (13/10/02)

Gasthurie Kanagachandran                                                                           Student No. 2035883

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    40,000 subscribers could "cost consumers up to �500m" (Fiveash, 2009), and clearly they themselves would see their profit margins shrink noticeably. Along with ISP's, other firms such as Google Inc. question the need for restricting access to websites when users will inevitably find ways around the restrictions before long anyway.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    For this project, in order to generate four 16-bit vectors, the whole template needs to be divided into blocks of 8 � 16 pixels, which is the next step after resizing. Based on this block size and length of the vector (16 bit), the size of the template was decided.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    large scaled project which SSADM is originally intended for, a number of these weren't conducted, e.g. the entire Feasibility study, elements of the Requirements analysis, Requirements catalogue etc. This methodology does include a detailed thorough account correctly stated by author MIT Notes Home.

  2. TCP wireshark. This assignment will investigate the behaviour of TCP (Transmission Control Protocol). The ...

    to transfer the file to gaia.cs.umass.edu? IP address: 192.168.1.102 TCP port number: 1161 Destination IP address: 128.119.245.12 TCP port number: 80 TCP Basics 4. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu?

  1. Ethics and professionalism in computing - examples from Facebook and Google

    such disclosure o sending unsolicited emails to significant numbers of email addresses belonging to individuals and/or entities with whom you have no preexisting relationship * Send, upload, distribute or disseminate or offer to do the same with respect to any unlawful, defamatory, harassing, abusive, fraudulent, infringing, obscene, or otherwise objectionable

  2. Toronto Airport Case Study Wireless Applications

    Therefore, this is a significant risk that needs to be accounted for. For the purposes of this study, it is assumed that the basic infrastructure of the airport has already been setup to provide for a duplicate power feed to the airport in case of a failure in the primary power feed.

  1. Precise analysis about The legal or illegal utilization of Internet cookies

    EC 4.05) that cookies are a serious privacy threat because they usually contain precise data such as users' address, name and credit card number. So far it has been discussed about cookies' threats and their probable dangers. However, in spite of these negative points of view about cookies, there are many positive standpoints referring to cookies.

  2. Methods and technology used in Computer Forensics

    This returned a 9KB JPEG image. The name of the image is not visible, which demonstrates the process by which files are stored when deleted using the INFO byte, as discussed in Section A of the document. However, Pandora does offer a preview of the file, so it is possible to identify, at least as far as imagery is concerned, what the data contains.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work