Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Size: px
Start display at page:

Download "Reliable Multicast Protocol with Packet Forwarding in Wireless Internet"

Transcription

1 Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi, Kusatsu-Shi, Shiga, , Japan, Department of Communications Engineering, Graduate School of Engineering, Osaka University ABSTRACT One of the most important problems in reliable multicast communication is reducing generated redundant NAKs to avoid NAK implosion. A number of NAK suppression mechanisms which try to resolve this technical problem have been proposed thus far. In wireless multicast which includes mobile hosts with wireless access channel, packet losses occur because of not only low quality of wireless communication channel but also tentative shutdown of connection due to handover. When remote subscription which enables effective usage of network resources is applied, a host re-joins to a multicast group when handover occurs. This means handover will introduce long shutdown of connection, because not only handover process in layer 2 but also multicast join and multicast tree reconstruction is necessary. This causes loss of large amount of packets and finally causes NAK implosion. In this paper, we claim that packet forwarding which is originally applied to unicast communication can be applied to multicast communications and resolve this NAK implosion problem caused by handover. Our simulation results show that packet forwarding mechanism significantly improves scalability of NAK suppression-base reliable multicast protocol. Keywords: wireless multicast, reliable multicast, NAK suppression, handover, packet forwarding 1 Introduction Multicast communication can support dissemination of the same data to potentially large number of receivers. IP multicast[1]is the multicast protocol which supports network-layer multicasting in the Internet. In IP multicast, a source sends a single data packet whose destination IP address is the corresponding multicast group. A data packet is replicated at an adequate router and forwarded to an interface below which there are receivers. IP multicast uses UDP in the transport layer, so originally it does not support any reliability. To support reliability, reliable multicast protocol[2][3] should be implemented in the transport layer. In reliable multicast, retransmission of lost packet is necessary for maintaining reliability. In multicast communication, a lot of participants are included in general. This character of multicast communication easily leads to overload of retransmission process at the sender, receivers and network nodes. For example, concentration of control packets, acknowledgement packets(acks) or negative acknowledgement packets(naks) sent to the sender degrades performance of the sender. This problem is well known as the feedback implosion problem (ACK implosion or NAK implosion). A number of feedback suppression mechanisms have been proposed to deal with this problem. One of the most popular and effective solutions is NAK suppression mechanism used in SRM(Scalable Reliable Multicast)[4]. NAK suppression mechanism uses timer-based approach. Whenever a receiver detects a packet loss, it schedules a pending NAK transmission at a randomly chosen point of time in the future. If the receiver receives a NAK generated by another receiver, it cancels its NAK transmission. This mechanism is called NAK suppression. When a timer expires without receiving a NAK from other receivers, the receiver multicast a NAK. NAK suppression mechanism reduces the number of generated NAKs[6], which brings good scalability to reliable multicast protocol. So, we focus on reliable multicast protocol with NAK suppression mechanism. Today, it is natural to use wireless access for accessing the Internet and mobile communication environment is now becoming general. This technical trend makes wireless multicast attractive. When reliable multicast is served in wireless environment, several technical problems arise. One of the most serious problems is packet loss in wireless networks. Causes of packet loss in wireless network can be categorized into wireless-link-caused loss and handover-caused loss[7]. Wireless-link-caused loss is packet loss caused by low quality of wireless link. Handover-caused loss is packet loss caused by handover operation. The latter packet losses have more significant impact to reliable multicast in wireless communications, because handover causes long-period bursty loss. This bursty loss may cause tentative serious increase of generated NAKs and leads to performance degradation due to NAK implosion. This paper focuses on this handover-caused loss in wireless reliable multicast. In unicast communication, packet forwarding[8] can resolve handover-caused packet loss. When handover of mobile host is predicted, an access point caches some packets during handover period, and forwards this cached packet to a new access point of the corresponding mobile host. In wireless multicast, however, this packet forwarding is not easy to be applied. This is because mobile host will leave an old access point by leaving the multicast group and join to a new access point by re-joining to the corresponding multicast group. A new access point only manages multicast group, i.e. existence of at least one host which has an interest of receiving the corresponding multicast group datagram beneath it, and does not manage all hosts of a multicast group. This feature makes it a little difficult to apply packet forwarding mechanism to wire-

2 less reliable multicast. In this paper, we claim that packet forwarding mechanism brings significant performance improvement to wireless reliable multicast even though it has some disadvantage that an access point should manage all nodes beneath it. We think this kind of host management will resolve deployment problems of IP multicast[9] and be beneficial from the viewpoint of security and accounting reasons as well. Our simulation results show that packet forwarding in wireless reliable multicast improves scalability significantly, compared with reliable multicast protocol without packet forwarding. Remainder of the paper is structured as follows. Section 2 shows overview of reliable multicast and its technical problems. Section 3 explains mobile multicast and influence of mobility to reliable multicast. This section also includes brief introduction of packet forwarding. Section 4 presents packet forwarding mechanism in wireless reliable multicast. In section5, we evaluate packet forwarding in wireless reliable multicast and show its improvement in scalability. Finally, section 6 concludes the paper. 2 Reliable Multicast Protocol IP multicast provides an efficient way to disseminate the same data to potentially large number of receivers. However, IP multicast generally uses UDP in the transport layer, which means it does not provide any support for reliable data dissemination. To support reliability, retransmission control, congestion control and flow control should be implemented at the transport layer. A number of proposals for reliable multicast protocols have been proposed so far[2]. In this section, we briefly explain about reliable multicast protocols and show our simple protocol model which we focus on in the paper. 2.1 NAK-based or ACK-based There are two approaches for retransmission control, an ACK-based one and a NAK-based one. For an ACK-based approach, all receivers send an ACK to the source, so ACK implosion is a serious problem. For a NAK-based approach, only receivers suffering packet loss send a NAK to the source, so the number of feedback packets should be small than an ACK-based approach. Both approaches are mathematically analyzed and evaluated from the viewpoint throughput performance in [1] and from the viewpoint of delay performance in [6]. Performance evaluation results in these papers show that a NAK-based approach has better scalability than an ACK-based one. Simulation results in [5] show that an ACK-based approach has worse scalability even though a hierarchical structure, e.g. RMTP(Reliable Multicast Transport Protocol)[11], is applied. Even though a NAK-based protocol has better scalability than an ACK-based one, NAK implosion may cause performance degradation when multicast group size is large. To resolve this implosion problem, several approaches have been proposed. SRM(Scalable Reliable Multicast)[4] applies a timerbased approach. Whenever a receiver detects a packet loss, it schedules a pending NAK transmission at a randomly chosen point of time in the future. If the receiver receives a NAK generated by another receiver, it cancels its NAK transmission. This mechanism is called NAK suppression. When a timer expires without receiving a NAK from other receivers, the receiver multicast a NAK. With this NAK suppression mechanism, the number of generated NAKs is significantly reduced[6], which brings good scalability. Because of its good scalability, we focus on NAK-based approach, especially a NAK suppression protocol, in this paper. 2.2 NAK Suppression Protocol In this paper, we focus on wireless handover issues in wireless reliable multicast communications. It is not our purpose of this paper to develop a specific protocol, so we use a general protocol model for NAK-based protocol and applies it to mobile communication environment. General NAK-suppression protocol behaves as follows. The sender multicast all packets to all receivers. Whenever a receiver detects a lost packet, it schedules a pending NAK transmission at a randomly chosen point of time in the future. In the meantime, if the receiver receives a NAK(generated by another receiver) for this packet, it cancels the transmission of its own pending NAK(NAK suppression). If, at the scheduled time for a pending NAK transmission, a NAK for this packet has not been received since the pending NAK transmission was first scheduled, the receiver multicast a NAK to the sender an all other receivers, and starts a timer. When a receiver receives a NAK for a packet that it has not yet received and it has initiated the random delay prior to sending a NAK, the receiver sets a timer and behaves as if it had sent the NAK. The expiration of a timer without prior reception of the corresponding packet causes the receiver infers that a packet has been lost, and operates as it detects a packet loss (as in item2 above). Whenever the sender receives a NAK, it re-multicast a corresponding packet to all receivers. 3 Wireless Multicast In this section, we discuss about multicast communications in wireless networks and also describe about reliable multicast in wireless networks. 3.1 Multicast Communications in Wireless Networks In today s Internet, a multicast member can access to the Internet via not only wired access but also wireless access. Nomadic users require a new kind of network host that can

3 Figure 1: Wireless Mulitcast move from one access point to another easily. We call this kind of host as a mobile host(mh). For mobility management in the Internet, Mobile IP[12] has been proposed. When a MH moves to a new subnet(foreign network), care-of-address(coa) is assigned temporally to this MN. The network portion of CoA matches that of the foreign network, which means by CoA a datagram can be forwarded to a foreign network by ordinary IP routing. A MN also has its IP address in its permanent home network, home address. A CoA of MN is registered at the agent located at the home network, which is called home agent. When a correspondent node would like to communicate with a MN, it can forward a datagram to its home address. When this datagram reaches a home network, a home agent can identify the CoA of MN and forwards this datagram to a foreign network by encapsulation technique. For mobility management in wireless multicast, two techniques have been proposed, bidirectional tunneling and remote subscription[13](fig.1). Bidirectional tunneling looks like Mobile IP for unicast traffic. In bidirectional tunneling, a home agent receives multicast datagram and forwards it to CoA of MN by making use of unicast tunneling. By this new subnet, when a mobile host moves from a subnet where method, mobility of MN can be hidden to the sender(correspondent). wireless channel quality is bad and to a new subnet where However, it uses unicast tunneling from the home network to wireless channel quality is good, packet losses detected at a a MN, so redundant path caused indirect routing wastes network resources. When the source multicast these lost packets to all members, mobile host may be packet losses occurred at the old subnet. Remote subscription is a simple approach for mobility management in wireless multicast. When a MH moves to a new ets should receiver them, which leads to inefficient network receivers in this new subnet which correctly receive these pack- subnet, it obtains its CoA of this foreign network. The MH rejoins a multicast group by using this CoA. For re-join, modi- From these reasons, handover loss should not be recovered resource usage. fication of IGMP for Mobile IP, MLD(Multicast Listener Discovery)[14] is used. In remote subscription, delay for re-join point, we propose a new packet recovery mechanism for wire- globally and should be recovered locally. From this view- may be a little large because it needs not only general Mobile IP process but also multicast tree construction process. the next section. less multicast, packet forwarding, which will be explained in However, it can achieve efficient usage of network resource because it does not use unicast tunneling which is necessary 4 Wireless Reliable Multicast with Packet for bidirectional tunneling. So, remote subscription should be preferable approach for wireless multicast which potentially Forwarding includes many mobile multicast hosts. 3.2 Reliable Multicast in Wireless Networks When remote subscription is applied for wireless multicast communications, a mobile multicast receiver suffers from Figure 2: Scalable NAK Suppression Protocol with Packet Forwarding handover delay when it moves towards a new subnet. This is because not only handover operation, i.e. obtaining CoA, but also multicast joining operation such as join latency and tree reconstruction delay is necessary. In remote subscription, this delay highly depends on whether there exists another receiver(s) of the corresponding multicast group in a new subnet. When there exists another receiver in a new subnet, multicast tree has already a branch to this subnet and multicast datagram has already come there. In this case, handover delay is not so large. When there exists no receiver in a new subnet, multicast joining operation takes a little time period, which leads to bursty packet loss. In this paper, we call this kind of busrty packet loss a handover loss. When this handover loss occurs, NAK suppression mechanism may not work well. This is because during handover period a mobile node cannot receive not only a data packet but also NAK sent by other receivers. In this case, a NAK is multicast to all other members of the corresponding multicast group from the mobile node. Even in the case that another multicast member exists in a As an effective way to resolve handover loss discussed in the previous section, we claim that packet forwarding technique which is originally proposed for wireless TCP[8] can be a good solution(fig.2). General NAK suppression protocol applied packet forwarding behaves as follows.

4 The sender multicast all data packets to all receivers in a multicast group. A receiver detects a packet loss when there is a gap of sequence number of received packets and recovers this packet loss using NAK suppression protocol described in Section 2.2. When a mobile host detects packet loss during handover operation(exactly this can be detected just after the handover operation), it uses packet forwarding mechanism described below. When an access point predicts(or detects) handover of a mobile multicast host, it caches arrived packets of the corresponding multicast group. After handover operation completed, a mobile multicast host sends the transmission demand packet to the old access point. When the old access point receives this request, it forwards cached packets to the mobile multicast host. When the access point receives a demand packet and it does not have cached data of the corresponding multicast group, it sends a control packet notifying this. When a mobile multicast host receives this control packet, it starts ordinary NAK suppression protocol. In order to apply packet forwarding technique towards wireless multicast, an access point should identify which mobile host(mobile multicast host) exists beneath it. This is because it should identify mobility(handover) of each mobile multicast host in order to start caching mechanism. In general, an access point has only a necessity to manage existence of a least one multicast member. Thus, for packet forwarding technique, overhead for an access point increases, but we believe this overhead is acceptable because of the following two reasons. One reason is that as shown in the next section performance improvement obtained by packet forwarding technique is significant. The other reason is that for security and accounting reason management of mobile hosts will be managed by the network. For security and accounting, all members of each multicast group should be managed. When this kind of management is implemented, our proposed scheme can be easily deployed because management of all mobile hosts for each multicast group can be realized. Reliable multicast protocol is implemented in transport layer of end hosts and our proposed packet forwarding method is implemented in network layer of an access point. It is desirable that packet forwarding method is only applied to reliable multicast traffic. In order realize this operation, transport layer processing is necessary at an access point. Active network technology[17] which is a new network architecture and realizes higher layer operation than network layer, is a candidate technology which enables this transport layer operation at an access point. Figure 3: Parameters in Simulation Figure 4: Network Topology for Simulation (Tires Model) 5 Performance Evaluation We evaluate performance of packet forwarding technique applied for NAK suppression protocol by computer simulation. For evaluation, we especially focus on scalability. 5.1 Simulation Model For network topology model, we use a sophisticated model, Tiers model[15](fig.4). For LAN, we assume two kinds of networks, one is wired and the other is wireless. 5% of LANs in generated topology are assumed to be wireless LAN. Location of wireless LAN is located randomly in the network. Multicast hosts are connected to MAN router with probability of.2 and LAN(wireless and wired) with.8. We assume one static host as the source of a multicast group. Loss probabilities and other simulation parameters are shown in Fig.3. Packet loss probability is assigned to each Tier from measured results reported in [16]. For mobility of mobile multicast hosts, distribution of their mobility speed is truncated exponential distribution in 4 1[km/h] with average of 1[km/h]. For handover delay, 1[sec] handover delay is assumed for the case that another multicast member does not exist, and [sec] is assumed in the case that another member exists already in a new network. This means Layer 2 handover delay is assumed to be. And Layer 3 handover delay is assumed to be in the situation that another member exists already. It is easily predicted that our proposed packet forwarding method has better performance for higher handover delay. Thus, simulation results obtained under the condition that L2 handover is, will give the lower bound of the performance of our proposed scheme. When handover of a mobile multicast host is

5 predicted(detected), an access point caches arrived packet of the corresponding multicast group during 2[sec]. Reliable multicast protocol is implemented in transport layer of end hosts and our proposed packet forwarding method is implemented in network layer of an access point. It is desirable that packet forwarding method is only applied to reliable multicast traffic. In order realize this operation, transport layer processing is necessary at an access point. Active network technology[*****] which is a new network architecture and realizes higher layer operation than network layer, is a candidate technology which enables this transport layer operation at an access point. 5.2 Simulation Results Figure 5 shows average delay characteristics of NAK suppression protocol without Packet Forwarding mechanism and NAK suppression protocol with Packet Forwarding mechanism. Delay is normalized with one-way delay for ideal transmission, i.e. transmission delay of ideal case transmission with no queueing delay at a router. Horizontal axis shows the number of receivers in a multicast group. As shown in this figure, normalized delay is slightly improved with Packet Forwarding mechanism. This is because with Packet Forwarding lost packets are forwarded from not the source but the old access point which is generally located closer than the source. As shown in Fig.5, average delay characteristics of general NAK suppression protocol saturates when the number of receivers is around 4. With Packet Forwarding mechanism, delay performance saturates where the number of receivers is around 7. These saturations of delay characteristics are caused by NAK implosion at the sender. This means from the scalability viewpoint Packet Forwarding improves scalability of NAK suppression protocol significantly because NAK suppression protocol with Packet Forwarding mechanism can include more receivers. Figure 6 shows the total number of hops for data packets, NAKs and transmission demand packets(only for Packet Forwarding). This total number of hops can be used as performance metric for efficient usage of network resource. As shown in Fig.6, Packet Forwarding mechanism decreases this total number of hops. In NAK suppression protocol without Packet Forwarding mechanism, lots of NAKs are multicast to all members when handover loss occurs. However, with Packet Forwarding mechanism, a transmission demand packet is unicast to the old access point and lost packet which are cached at the old access point can be forwarded to the mobile multicast host by unicast. On the contrary, in NAK suppression mechanism, not only NAKs but also retransmitted packets are also multicast to all members, which leads inefficient usage of network resources. Figures 7 and 8 show similar characteristics of Figs. 5 and 6, but they show characteristics for only lost packets during handover period. For example, Fig.7 shows average delay characteristics measured only for lost packets during handover period. As shown in these figures, Packet Forwarding mechanism brings significant performance improvement to handover packet loss from the viewpoint of both delay performance and network resource usage. Figure 9 shows similar characteristics of Fig.8, but it shows characteristics for packets excluding lost packets(this means packets not averaged in Fig.8). As shown in Fig.9, even for not lost packets some performance improvement is obtained. This is because redundant packets generated for retransmission is reduced by our proposed packet forwarding, which leads to performance improvement for not lost packets. These results show that our proposed packet forwarding brings performance improvement not only for lost packets but also correctly received packets. In our performance evaluation thus far, we use homogeneous model for wireless networks, i.e. packet loss in wireless network occurs similarly in every network. Here, we evaluate our proposed packet forwarding mechanism in the situation that there are several WLAN in bad quality. We assign packet loss probability of % and 1% by turns. In this case, a mobile host may move towards good quality WLAN form bad quality WLAN. Figure 1 shows normalized delay characteristics of our proposed packet forwarding and general NAK protocol in this situation( heterogeneous in the figure). Simulation results for homogeneous model is also shown in the figure(this part is the same as Fig.5). As shown in this figure, general saturates with smaller number of receivers compared with performance results in homogeneous model. For our proposed packet forwarding mechanism, performance results almost the same as the homogeneous model. When a mobile host moves to WLAN with good quality, it receives further packets than its last received packet. However, our packet forwarding mechanism will forward these packets and prevent redundant generation of NAKs. 6 Conclusions In the paper, we discuss how bad handover packet loss is for wireless reliable multicast. We claim that packet forwarding which recovers packet loss caused by handover by forwarding cached packets from the old access point to the mobile multicast host, will bring significant performance improvement. This is because packet forwarding mechanism only needs unicast transmission of forward request packet and unicast transmission for lost packets(cached packets). On the contrary, general requires multicast transmission of NAKs and multicast retransmission from the source. Our simulation results show that Packet Forwarding mechanism brings significant performance improvement from the viewpoint of scalability and efficient network resource usage. REFERENCES [1] S.Deering, Host Extensions for IP Multicasting, IETF RFC 1112, Aug [2] J.W Atwood, Classification of Reliable Multicast Protocols, IEEE Net., pp.24-34, Vo.13, No.3, May-June, 24.

6 Normalized Delay ( 1 7 ) Total number of hop 1.5 Normalized Delay Figure 5: Normalized Delay Characteristics 1.5 ( 1 6 ) Total number of hop 1.5 Figure 6: Total Number of Hops for Data, NAKs and Control Packets 1.5 ( 1 7 ) Total number of hop 1.5 Figure 7: Normalized Delay Characteristics (Only for Lost Packets) Normalized Delay heterogeneous () heterogeneous () homogeneous () homogeneous () Figure 8: Total Number of Hops for Data, NAKs and Control Packets(Only for Lost Packets) Figure 9: Total Number of Hops for Data, NAKs and Control Packets(Excluding Lost Packets) Figure 1: Normalized Delay Characteristics for Heterogeneous WLAN Environment [3] M. Yamamoto, Reliable Multicsat, The Journal of IE- ICE, pp , Vol.85, No.9, Sep. 22. [4] S. Floyd et al., A Reliable Multicast Framework for Light-Weight Sessions and Application Level Framing, IEEE/ACM Trans. on Net., Vol.5, No.6, pp , Dec [5] K.Yamamoto et al., Performance Evaluation of ACKbased and NAK-based Flow Control Mechanisms for Reliable Multicast Communications, IEICE Trans. on Comm., vol.e84-b, no.8, pp , Aug. 21. [6] M.Yamamoto et al., A Delay Analysis of Sender- Initiated and Receiver-Initiated Reliable Multicast Protocols, IEEE INFOCOM 97, pp , Kobe, Apr [7] M. Yamamoto and T. Matsuda, Recent Research Activities in Wireless TCP, Technical Report of IEICE, MoMuC23-58, November, 23. [8] G. Krishnamurthi et al., Buffer Management for Smooth Handovers in Mobile IPv6, IETF Internet Draft draft-krishnamurthi-mobileip-.txt, July 2. [9] M. Yamamoto, Multicast Communications -Present and Future(Invited Paper), IEICE Trans. on Commun., Vol.E86-B, No.6, pp , June 23. [1] S. Pingali et al., A Comparison of Sender-initiated and Receiver-initiated Reliable Multicast Protocols, ACM SIGMETRICS 94, pp , May [11] S. Paul et al., Reliable Multicast Transport Protocol (RMTP), IEEE J. Select. Areas Commun., Vol.15, No.3, pp , April [12] D. Johnson et al., Mobility Support in IPv6, IETF Internet Draft, draft-ietf-mobile-ipv6-24.txt, work in progress, June 23. [13] G. Xylomenos and G.Polyzos, IP Multicast for Mobile Hosts, IEEE Commun. Mag., pp.54-58, Vol.35, No.1, Jan [14] S. Deering et al., Multicast Listener Discovery(MLD) for IPv6, IETF RFC 271, Oct [15] M. Doar, A Better Model for Generating Test Network, 1996 IEEE GLOBECOM 96, pp.86-93, London, UK, Nov [16] M. Yajnik et al., Packet Loss Correlation in the MBone Multicast Network, IEEE Global Internet, pp.94-99, London, UK, Nov [17] D.J. Wetherall et al., Introducing New Internet Services: Why and How, IEEE Network Mag., vol.12, no.3, pp.12-19, July/August 1998.

A Loss Detection Service for Active Reliable Multicast Protocols

A Loss Detection Service for Active Reliable Multicast Protocols A Loss Detection Service for Active Reliable Multicast Protocols M. Maimour and C. D. Pham RESAM, Lyon1. ENS, 46 allee d Italie 69364 Lyon Cedex 07 - France email:{mmaimour,cpham}@ens-lyon.fr Abstract

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

On the Design of Mobility Management Scheme for 802.16-based Network Environment

On the Design of Mobility Management Scheme for 802.16-based Network Environment On the Design of obility anagement Scheme for 802.16-based Network Environment Junn-Yen Hu and Chun-Chuan Yang ultimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Handover Management based on the Number of Retries for VoIP on WLANs

Handover Management based on the Number of Retries for VoIP on WLANs Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff. Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

USING MULTICAST IN THE GLOBAL COMMUNICATIONS INFRASTRUCTURE FOR GROUP COMMUNICATION

USING MULTICAST IN THE GLOBAL COMMUNICATIONS INFRASTRUCTURE FOR GROUP COMMUNICATION USING MULTICAST IN THE GLOBAL COMMUNICATIONS INFRASTRUCTURE FOR GROUP COMMUNICATION Deborah A. Agarwal, Information and Computing Sciences Division, Ernest Orlando Lawrence Berkeley National Laboratory

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Tunnel Broker System Using IPv4 Anycast

Tunnel Broker System Using IPv4 Anycast Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Introduction to IP Multicast Routing

Introduction to IP Multicast Routing Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and

More information

A Study of Internet Packet Reordering

A Study of Internet Packet Reordering A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 wangyi@ns.6test.edu.cn 2 China Education

More information

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction

IP Anycast: Point to (Any) Point Communications. Draft 0.3. Chris Metz, chmetz@cisco.com. Introduction IP Anycast: Point to (Any) Point Communications Draft 0.3 Chris Metz, chmetz@cisco.com Introduction The Internet supports several different communication paradigms. Unicast is defined as a point-to-point

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks

Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks JKAU: Comp. IT, Vol. 2, pp: 45-56 (2013 A.D./ 1435 A.H.) DOI: 10.4197 / Comp. 2-3 Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks Jeddah University, Alkamil Branch, Alkamil, Saudi Arabia

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Multicast Over Wireless Networks

Multicast Over Wireless Networks Multicast Over Wireless Networks How to ensure the participation of mobile users (no matter how disruptive the circumstances), especially for mobile commerce applications distributed over multiple networks.

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios

Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Thomas Kunz Systems and Computer Engineering Carleton University Abstract Multicasting is intended for group-oriented computing.

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

A Performance Study of VoIP Applications: MSN vs. Skype

A Performance Study of VoIP Applications: MSN vs. Skype This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Network Friendliness of Mobility Management Protocols

Network Friendliness of Mobility Management Protocols Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions CSN-s 5/1 College 5, Routing, Internet College stof 1 Inleiding: geschiedenis, OSI model, standaarden, ISOC/IETF/IRTF structuur Secties: 1.2, 1.3, 1.4, 1.5 2 Fysieke laag: Bandbreedte/bitrate Secties:

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

TCP and UDP Performance for Internet over Optical Packet-Switched Networks

TCP and UDP Performance for Internet over Optical Packet-Switched Networks TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

School of Computer Science

School of Computer Science Cost and Scalability Analysis of Mobility Management Entities of NEMO Md. Shohrab Hossain and Mohammed Atiquzzaman TR-OU-TNRL-11-102 February 2011 Telecommunication & Network Research Lab School of Computer

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Introduction to Mobile IPv6

Introduction to Mobile IPv6 1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks Beini Ouyang and Xiaoyan Hong Dept. of Computer Science University of Alabama bouyang@cs.ua.edu Yunjung Yi Honeywell Technology Center

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

IPv6 Networks: Protocol Selection for Mobile Node

IPv6 Networks: Protocol Selection for Mobile Node International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 16-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) IPv6 Networks: Protocol Selection for Mobile

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering TCP-Taichung: A RTT-based Predictive Bandwidth Based with Optimal Shrink Factor for TCP Congestion Control in Heterogeneous Wired and Wireless Networks Ben-Jye Chang 1, Shu-Yu Lin 1, and Ying-Hsin Liang

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Mobility on IPv6 Networks

Mobility on IPv6 Networks Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Mobility Management Framework in Software Defined Networks

Mobility Management Framework in Software Defined Networks , pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea leekhe@pcu.ac.kr

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information