Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Snooping TCP
Next article icon

Snooping TCP

Last Updated : 03 Aug, 2022
Comments
Improve
Suggest changes
Like Article
Like
Report

In this article, we will discuss the overview of Snooping TCP, and its working, and then will discuss the advantages and disadvantages of Snooping TCP. Let's discuss it one by one.

Overview :
Snooping TCP is one of the classical TCP improvement approaches.  This approach is designed to solve the end-to-end semantics loss in I-TCP. The basic concept is to buffer packets close to the mobile node and retransmit them locally if a packet is lost.

Working of Snooping TCP :
Here, we will discuss the working of TCP as follows. 

  • Until it receives an acknowledgement from the mobile node, the foreign agent buffers the packet.
  • A foreign agent snoops the packet flow and acknowledgement in both directions.
  • If the foreign agent does not receive an acknowledgement from the mobile node, or if it receives duplicate acknowledgements, it believes that the packet or acknowledgement has been lost. The packet is immediately retransmitted by the foreign agent from its buffer.
  • In addition, the foreign agent maintains its own timer for retransmission of buffered packets in case it is lost on the wireless link.
  • While data transfer from the mobile node to the correspondent node, if the foreign agent detects a missing packet, it returns NACK-Negative Acknowledgment to the mobile node. It can now retransmit missing packet immediately. Reordering of packets is done automatically at the correspondent node by TCP.
  • In the concept of snooping TCP, the Time-out of the correspondent node still works and triggers retransmission, If the foreign agent now crashes. The foreign agent may discard duplicates of packets already retransmitted locally and acknowledged by the mobile node. This avoids unnecessary traffic on the wireless link.
  • To maintain transparency foreign agent does not acknowledge the packet to the fixed node, but the mobile node acknowledges the packets(END-TO-END Semantics is maintained).

Advantages :
Here, we will discuss the advantages as follows.

  1. The end-to-end TCP semantic is preserved -
    The packet is not acknowledged by the FA. And if the foreign agent (FA) or base station (BS) fails, the solution reverts to standard TCP.
     
  2. No Modifications at Fixed Host -
    The fixed computer TCP does not need any changes. The majority of the changes are made at the foreign agent (FA).
     
  3. No packet loss during handovers - 
    In the case of a handover, if any data is not passed to the new foreign agent, there will be a time-out at the fixed host and activating retransmission of the packet, via mobile IP, to a new COA.

Disadvantages :
Here, we will discuss the disadvantages as follows.

  1. The behavior of the wireless link - 
    Snooping TCP does not isolate the behavior of the wireless link or I-TCP. Transmission errors can spread to the correspondent nodes (CH). 
     
  2. A mobile node needs additional mechanisms - 
    The use of NACK between the foreign agent and the mobile node requires the mobile node to have additional mechanisms. For arbitrary mobile nodes, this method is no longer transparent.
     
  3. Encryption at end-to-end -
    If such encryption schemes are used end-to-end between the correspondent node and mobile node, snooping and buffering data can be considered worthless. Snooping TCP may be used if encryption is used above the transport layer (e.g. SSL/TLS).

Next Article
Snooping TCP

H

happymakadiya
Improve
Article Tags :
  • Technical Scripter
  • Computer Networks

Similar Reads

    DHCP Snooping
    Prerequisite - Dynamic Host Configuration Protocol (DHCP) Every protocol that we learn in Computer Network have some rules, these rules govern working of protocols. These rules sometimes provide way for attackers to take advantage of network. Attackers can also use working of DHCP to compromise our
    3 min read
    TCP/IP in Computer Networking
    Introduction : TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols that define the standards for transmitting data over computer networks, including the internet. The TCP/IP protocol is the foundation of the internet and enables devices to communicate with
    8 min read
    TCP/IP Model
    The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking framework that enables reliable communication between devices over interconnected networks. It provides a standardized set of protocols for transmitting data across interconnected networks, ensuring efficie
    7 min read
    Introduction to Netcat
    Netcat or NC is a utility tool that uses TCP and UDP connections to read and write in a network. It can be used for both attacking and security. In the case of attacking. It helps us to debug the network along with investigating it. It runs on all operating systems. Getting Started with Netcat To st
    3 min read
    What is Ports in Networking?
    Whenever any application in one computer sends data to another application of a different computer then it sends using IP Address and MAC Address but how does our computer know that this data is for a specific application and this data is sent by any specific application? There comes the concept of
    4 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences