An enhanced approach for transmission control protocol traffic management Mechanism for Wireless Network
|
|
|
- Eustacia Douglas
- 10 years ago
- Views:
Transcription
1 An enhanced approach for transmission control protocol traffic management Mechanism for Wireless Network Nitesh Mishra 1, Prof. Shaileena John 2 Department of Electronics & Communication 1, 2 [email protected] 1, [email protected] 2 Abstract - TCP Congestion management is finish to finish management mechanism. that is enforced through dominant some important parameter amendment scrutiny to wireless networks, there are many various characteristics in wireless environments. In this paper Enhanced mechanism for tcp transmission management protocol TCP protocol communications protocol corruption control is presented. It considers the influences to protocol sender s packet sending rate not solely by the congestion however conjointly by the corruption. The causation window are going to be calculated when every transmission, in line with range of corrupt data packet. So, there is less packet drop occurring in data transmission. The comparative study of recent protocol traffic control with alternative protocol variants is additionally presented with variation in node speeds, pause time and number of nodes in network. The Enhanced Mechanism is simply implemented with fewer overheads and may effectively improve and efficient little variances of out run in this mechanism is performed in QualNet machine. Keywords- TCP, Tahoe, Reno, Enhanced Reno, Wireless. 1. INTRODUCTION Transmission Control Protocol (TCP), is the predominant Internet protocol and carries approximately 90% of Internet traffic in today s heterogeneous wireless and wired networks. TCP is Widely used as a connection oriented transport layer protocol that provides reliable packet delivery over unreliable links. TCP does not depend on the underlying network layers and, hence, design of various TCP variants is based on the properties of wired networks. However, TCP congestion control algorithms may not perform well in heterogeneous networks. Wireless networks have higher bit error rates due to weather conditions, obstacles, and multipath Interferences, mobility of wireless end-devices, and signal attenuation and fading, which may lead to packet loss. Various TCP algorithms and techniques have been proposed to improve congestion and reduce the non-congestion related packet loss. TCP Tahoe, TCP Reno, TCP Enhanced Reno with Selective Acknowledgement (SACK), TCP Enhanced Reno, TCP Vegas, and TCP Binary Increase Congestion (BIC) are examples of proposed end to end solutions. Snoop-TCP is a link layer control approach while N-TCP split connection approaches. They are all proposed to improve network Performance. The end to end techniques are the most promising because they require changes only to the end systems rather than to the intermediate nodes. These endto-end control approaches are used in today s deployed networks. 2. DESCRIPTION OF TCP VARIANTS TCP Reno This Reno retains the basic principle of Tahoe, such as slow starts and the coarse grain re-transmit timer. However it adds some intelligence over it so that lost packets are detected earlier and the pipeline is not emptied every time a packet is lost. Reno requires that we receive immediate acknowledgement whenever a segment is received. The logic behind this is that whenever we receive a duplicate acknowledgment, then his duplicate acknowledgment could have been received if the next segment in sequence expected, has been delayed in the network and the segments reached there out of order or else that the packet is lost. If we receive a number of duplicate acknowledgements then that means that sufficient time have passed and even if the segment had taken a longer path, it should have gotten to the receiver by now. There is a very high probability that it was lost. So, Reno suggests an algorithm called Fast Re- Transmit. Whenever we receive 3 duplicate ACK s we take it as a sign that the segment was lost, so we retransmitted segment without waiting for timeout. The basic algorithm is presented as under: Each time we receive 3 duplicate ACK s we take that Paper ID: 2015/IJTRM/9/2015/5640 1
2 to mean that the segment was lost and we re-transmit the segment immediately and enter Fast-Recovery. Sets ssthresh to half the current window size and also set CWND to the same value. For each duplicate ACK receive increase CWND by one. If the increase CWND is greater than the amount of data in the path then transmit a Enhanced segment else wait. Reno performs very well over TCP when the packet losses are small. But when we have multiple packet losses in one window then RENO doesn t perform too well. The reason is that it can only detect single packet losses. If there is multiple packet drops then the first info about the packet loss comes when we receive the duplicate ACK s. But the information about the second packet which was lost will come only after the ACK for the retransmitted first segment reaches the sender after one RTT (Round-Trip Times). Another problem is that if the widow is very small when the loss occurs then we would never receive enough duplicate acknowledgements for a fast retransmit and we would have to wait for a coarse grained timeout..reno s Fast Recovery algorithm is optimized for the case when a single packet is dropped from a window of data. TCP Lite TCP Lite is a service that provides a transport method that interrupts TCP in order to reduce the overhead involved in session management in which no data is transmitted or received. TCP Lite reduces or eliminates pure TCP protocol data units used in the setup and ACK while maintaining order, integrity, reliability and security of traditional TCP. TCP lite uses large window and protection against wrapped sequence numbers. Lite performs over TCP same as Reno. But when window increases it have some problems to maintain them. TCP Enhanced Reno Enhanced RENO is a slight modification over TCP-RENO. It is able to detect multiple packet losses and thus is much more efficient that RENO in the event of multiple packet losses. Like Reno, Enhanced-Reno also enters into fastretransmit when it receives multiple duplicate packets, however it differs from RENO in that it doesn t exit fastrecovery until all the data which was out standing at the time it entered fast recovery is acknowledged. Thus it overcomes the problem faced by Reno of reducing the CWND multiples times. The fast-transmit phase is the same as in Reno. The difference in the fast recovery phase which allows for multiple re-transmissions in Enhanced-Reno. Whenever Enhanced-Reno enters fast recovery it notes the maximums segment which is outstanding. The fast-recovery phase proceeds as in Reno, however when a fresh ACK is received then there are two cases: If it ACK s all the segments which were outstanding when we entered fast recovery then it exits fast recovery and sets CWND to ss thresh and continues congestion avoidance like Tahoe. If the ACK is a partial ACK then it deduces that the next segment in line was lost and it retransmits that segment and sets the number of duplicate ACKS received to zero. It exits Fast recovery when all the data in the window is acknowledged. Enhanced-Reno suffers from the fact that it takes one RTT to detect each packet loss. When the ACK for the first retransmitted segment is received only then can we reduce which other segment was lost. Round-trip time until all of the lost packets from that window has been retransmitted. 3. PROPOSED WORK Modern implementations of TCP contain four intertwined algorithms that have never been fully documented as standards wireless network: slow starts, congestion avoidance, fast retransmit, and fast recovery and we revise the algorithms for provides the source code for the implementation. TCP must implement slow start and congestion, but fast retransmit and fast recovery were implemented after the purpose of this document. ETCP (Enhanced Transport Control Protocol) is the Enhanced TCP congestion and corruption control mechanism for wireless network. It considers the influences to TCP sender s packet sending rate not only by the congestion but also by the corruption. It is a good reference to apply the TCP to wireless networks. Step 1: Receipt of new ACK (non-repeated acknowledgment): If (E < Et) set E = E++; slow-start phase. Else set E = 1+1/E; congestion avoidance phase. Paper ID: 2015/IJTRM/9/2015/5640 2
3 Step 2: Receipt of NACK: Record the NACK sequence number,and then retransmit the corrupted packet. Step 3: Receipt of duplicate ACK: Increment duplicate ACK count for segment being ACKed. When duplicate AC count exceed specified threshold value, retransmit next expected. if (Pe>= Pemin)Then set {temp = E*Pemin;E =E + temp;} Step 4: If the next expected packet is not a corrupted packet : If (Pe<Pemin) Then set{pemin = Pe;Temp =E *Pemin;E=E-temp;}Resume congestion avoidance using new window size once retransmission has been acknowledged. Step 5: Upon time expiry: Set Et = E/2 And then set E =1. Recover the missing segment from the slow start phase. Note that in above, E and Et denote the current congestion window size and the slow-start threshold, respectively. 4. COMPUTER SIMULATION In this paper all the simulation work is performed in QualNet wireless network simulator version 4.0 [9]. Initially number of nodes are 50, Simulation time was taken 200 seconds and seed as 1. All the scenarios have been designed in 1500m x 1500m area. Mobility model used is Random Way Point (RWP). In this model a mobile node is initially placed in a random location in the simulation area, and then moved in a randomly chosen direction between at a random speed between [SpeedMin, SpeedMax]. The movement proceeds for a specific amount of time or distance, and the process is repeated a predetermined number of times. We choose Min speed = 5 m/s, Max speed = 30m/s, and pause time = 5s to 30s. All the simulation work was carried out using TCP variants (Reno, Lite, Tahoe) with DSR routing protocol.network traffic is provided by using File Transfer Protocol (FTP) application. File Transfer Protocol (FTP) represents the File Transfer Protocol server and client. In wireless network which we have used have following values for different parameter: A. Mobility model Random Way Point Minimum speed 0 mps Maximum speed 5mps, 10 mps, 15 mps, 20mps, 25 mps, and 30 mps Pause time 5s, 10s, 15s, 20s, 25s, 30s. Simulation Time 200s B. Terrain Coordination 1500 * 1500 m C. Connection FTP ( File transfer protocol) : 41 (client) to 1(server) Item size 512(byte) D. Radio/physical layer parameters: Radio type: b Radio Data rate: 2Mbps Packet reception model: Bit error rate (bpsk.ber) E. MAC Protocol F. Routing Protoco DSR (Dynamic Source Routing) G. Transport Protocol TCP Tahoe, TCP Reno, TCP Lite, TCP ETCP. H. Number of Node 50 I. Node Placement Random F. Seed 1 5. SIMULATION METHODOLOGY Parameter Scenario1 Scenario2 Scenario3 Simulation Time Constant constant constant Node constant constant change Area constant constant constant Pause Time constant change constant TCP change change change Protocol Routing constant constant constant Protocol Node Speed change constant constant (m/sec) Paper ID: 2015/IJTRM/9/2015/5640 3
4 A Performance metrics used for this works are as follows: 1. Throughput is the measure of the number of packets successfully transmitted to their final destination per unit time. It is the ratio between the numbers of sent packets vs. received packets. 2. Signal Received with error is the measure of signal received, but they have error. The error may be occurring due to noise or due to heavy traffic. 3. Bytes received are the measure of total packet received by server. The packets may be drop due to heavy traffic. So received packets may be vary according to traffic conditions. 4. Packet loss is the measure of total discarded packet due to corruption or due to packet drop. We can calculate it by subtracting total received packets by server in total sent packet by client. 6. RESULT Paper ID: 2015/IJTRM/9/2015/5640 4
5 7. CONCLUSION We proposed an Enhanced TCP (ETCP) with a Enhanced calculation for sending window and implemented it in a Mobile Ad-Hoc Network. Extensive simulation studies were undertaken to compare its performance with other standards TCP Reno, TCP Enhanced Reno and TCP Sack etc. over Wireless Network. The simulation results show that the performance of ETCP is better than other TCP variants. From result we conclude that the performance of ETCP is better in high density node because in this condition sender can get different paths through different nodes. Thus we conclude that, receiver can receive maximum data when we increase number of nodes in network. The existing TCP variants and its applicable algorithm are analyzed and describe about the protocol which one is better and suitable for packet and link utilization in the network congestion because the traditional TCP treat all packet losses due to the congestion, it does not treat from the link failure. The most of protocol shows better uses and many of them shows poor responsiveness to changing network conditions and network utilization. REFERENCES [1] Perkins, Ad Hoc Networking, Addison-Wesley 2008, ISBN [2] C K Toh, Ad Hoc Mobile Wireless Networks, Prentice Hall Publishers, [3] T.P. Pedersen, A Threshold Cryptosystem without a Trusted Party, In Proc. Of Eurocrypt 91, Lecture Notes in Computer Science, LNCS 547, Springer Verlag, pp , 1991 [4] Kazuo Takaragi, Kunihiko Miyazaki, Masashi Takahashi, A Threshold Digital Signature Issuing Scheme without Secret Communication. [5] R. Vinod Kumar, Dr. R.S.D. Wahida Banu A Enhanced Approach For Load-balancing In EEAODV Protocol IEEE-International Conference On Advances In Engineering, Science And Management (lcaesm -2012) March 30, 31, 2012 [6] Vasilios A. Siris and Despina Triantafyllidou Seamless Congestion Control over Wired and Wireless IEEE Networks NETWORKING 2004, LNCS 3042, pp , IFIP International Federation for Information Processing. [7] K.Srinivasa Rao, R. Sudhistna Kumar, P. Venkatesh, R.V.Sivaram Naidu,and A.Ramesh Development of Energy Efficient and Reliable Congestion Control Protocol for Multicasting in Mobile Adhoc Networks compare with AODV Based on Receivers International Journal of Engineering Research and Applications (IJERA) ISSN: Vol. 2, Issue 2,Mar-Apr 2012, pp [8] Ms. Harshada Pingale, Ms. Ashwini Rakshe, Mr. S.A. Jain, D. Mr. S.R.Kokate A STUDY OF CONGESTION AWARE ADAPTIVE ROUTING PROTOCOLS IN MANET International Journal of Advanced Technology & Engineering Research (IJATER), VOLUME 2, ISSUE 2, MAY [9] Shital kumar Jain, Shrikant Kokate, Pranita Thakur, Shubhangi Takalkar A Study of Congestion Aware Adaptive Routing Protocols in MANET Computer Engineering and Intelligent Systems ISSN (Paper) ISSN Vol 3, No.4, 2012 [10] Mr.S.A.Jain, Ms Aruna.A, Kadam A Study of Congestion Control Mechanism Using Link Failure Detection in MANET International Journal of Engineering Research and Applications (IJERA) ISSN: Vol. 2, Issue 1,Jan-Feb 2012, pp [11] Vishal Sharma, Amitoj Soni, Sodhi Gunjit Singh, Takshi Gupta AN EFFICIENT APPROACH FOR ROUTING IN WIRELESS AD HOC NETWORK USING ARTIFICIAL INTELLIGENCE International Journal on Computer Science and Engineering (IJCSE), ISSN : Vol. 4 No. 02 February [12] Soundararajan, R.S. Bhuvaneswaran Adaptive Multi-Path Routing for Load Balancing in Mobile Ad Hoc Networks, Journal of Computer Science 8 (5): , 2012 ISSN Science Publications. [13] Sanjeev Sharma, Mukesh Kumar Dhariwal An Improved Mechanism for Congestion Control in TCP for Ad Hoc Network International Journal of Computer Applications ( ) Volume 20 No.2, April Paper ID: 2015/IJTRM/9/2015/5640 5
A Study on TCP Performance over Mobile Ad Hoc Networks
215 A Study on TCP Performance over Mobile Ad Hoc Networks Shweta Sharma 1, Anshika Garg 2 1 School of Computing Science and Engineering, Galgotias University, Greater Noida 2 School of Computing Science
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
Congestions and Control Mechanisms n Wired and Wireless Networks
International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Data Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
TCP over Wireless Networks
TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/
STUDY OF TCP VARIANTS OVER WIRELESS NETWORK
STUDY OF VARIANTS OVER WIRELESS NETWORK 1 DEVENDRA SINGH KUSHWAHA, 2 VIKASH K SINGH, 3 SHAIBYA SINGH, 4 SONAL SHARMA 1,2,3,4 Assistant Professor, Dept. of Computer Science, Indira Gandhi National Tribal
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
TCP Westwood for Wireless
TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
An Improved TCP Congestion Control Algorithm for Wireless Networks
An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA [email protected] Md. Humayun
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Reliable Adaptive Lightweight Multicast Protocol
Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies [email protected] Katia Obraczka UC Santa Cruz [email protected] Sung-Ju Lee HP Labs [email protected]
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
Effect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
ECSE-6600: Internet Protocols Exam 2
ECSE-6600: Internet Protocols Exam 2 Time: 75 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT omit necessary detail {Note: Simply copying text directly from the slides or notes will
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Congestion control in Mobile Ad-Hoc Networks (MANETs)
Congestion control in Mobile Ad-Hoc Networks (MANETs) A REPORT SUBMITTED TO SADIA HAMID KAZI OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF BRAC UNIVERSITY IN FULFILLMENT OF THE REQUIREMENTS FOR THESIS
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
High-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
Active Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu ([email protected]) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Stop And Wait. ACK received; transmit frame 2 CS 455 3
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control
Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP
Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
A packet-reordering solution to wireless losses in transmission control protocol
Wireless Netw () 9:577 59 DOI.7/s76--55-6 A packet-reordering solution to wireless losses in transmission control protocol Ka-Cheong Leung Chengdi Lai Victor O. K. Li Daiqin Yang Published online: 6 February
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
TCP/IP Over Lossy Links - TCP SACK without Congestion Control
Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 [email protected] Guevara Noubir College
Performance evaluation of TCP connections in ideal and non-ideal network environments
Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A Qos SCHEME TO ADDRESS COMMUNICATION LATENCY ISSUES FOR CRITICAL NETWORK FLOWS IN BEST-EFFORT NETWORKS USING MOBILE AGENTS
A Qos SCHEME TO ADDRESS COMMUNICATION LATENCY ISSUES FOR CRITICAL NETWORK FLOWS IN BEST-EFFORT NETWORKS USING MOBILE AGENTS Visvasuresh Victor * Gergely Zaruba G. Balasekaran Govindaswamy University of
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Cross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
