Energy Efficient Congestion Control Operation in WSNs Adel Gaafar A. Elrahim Electrical Engineering Dept. Red Sea University, Port Sudan, Sudan



Similar documents
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

TCP in Wireless Mobile Networks

A Survey: High Speed TCP Variants in Wireless Networks

SJBIT, Bangalore, KARNATAKA

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Low-rate TCP-targeted Denial of Service Attack Defense

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Energy-Efficient TCP Operation in Wireless Sensor Networks

TCP over Wireless Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Congestions and Control Mechanisms n Wired and Wireless Networks

An Improved TCP Congestion Control Algorithm for Wireless Networks

Mobile Computing/ Mobile Networks

TTC New Reno - Consistent Control of Packet Traffic

TCP Westwood for Wireless

Data Networks Summer 2007 Homework #3

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

A Passive Method for Estimating End-to-End TCP Packet Loss

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

A Study on TCP Performance over Mobile Ad Hoc Networks

STUDY OF TCP VARIANTS OVER WIRELESS NETWORK

First Midterm for ECE374 03/24/11 Solution!!

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Mobile Communications Chapter 9: Mobile Transport Layer

Transport Layer Protocols

Performance improvement of TCP over wireless network

TCP for Wireless Networks

THE Internet provides a convenient and cost-effective

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

TCP PACKET CONTROL FOR WIRELESS NETWORKS

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

TCP Adaptation for MPI on Long-and-Fat Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Network Friendliness of Mobility Management Protocols

Seamless Congestion Control over Wired and Wireless IEEE Networks

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Performance Enhancement of Transmission Control Protocol over Wireless Ad-hoc Networks

How To Write A Transport Layer Protocol For Wireless Networks

Joint Active Queue Management and Congestion Control Protocol for Healthcare Applications in Wireless Body Sensor Networks

TCP in Wireless Networks

Routing with Load Balancing in Wireless Ad hoc Networks

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Computer Networks. Chapter 5 Transport Protocols

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

The Problem with TCP. Overcoming TCP s Drawbacks

Energy Consumption of TCP Reno, Newreno, and SACK in Multi-Hop Wireless Networks

Secure SCTP against DoS Attacks in Wireless Internet

Comparative Analysis of Congestion Control Algorithms Using ns-2

An enhanced approach for transmission control protocol traffic management Mechanism for Wireless Network

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Chaoyang University of Technology, Taiwan, ROC. 2 Department of Computer Science and Information Engineering

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Comparative Study of High-Speed TCP Variants in Multi-Hop Wireless Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A packet-reordering solution to wireless losses in transmission control protocol

2 TCP-like Design. Answer

15-441: Computer Networks Homework 2 Solution

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Computer Networks - CS132/EECS148 - Spring

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

Security Threats in Mobile Ad Hoc Networks

SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS

Performance Evaluation of Wired and Wireless Local Area Networks

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

High-Speed TCP Performance Characterization under Various Operating Systems

Performance evaluation of TCP connections in ideal and non-ideal network environments

4 High-speed Transmission and Interoperability

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

First Midterm for ECE374 02/25/15 Solution!!

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

An Active Packet can be classified as

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Transcription:

Energy Efficient Congestion Control Operation in WSNs Adel Gaafar A. Elrahim Electrical Engineering Dept. Red Sea University, Port Sudan, Sudan Abstract: The development of wireless technologies makes it necessary to find a way of improving Transmission Control Protocol () efficiency with regards to optimal utilization of wireless channel capacity. This paper describes a modification to the congestion control for use in wireless sensor networks. It shows that by slightly modifying the algorithm of the, it can be made to respond better to wireless links, while maintaining its advantages on the wired networks at the same time. This is certainly a very desirable feature as the conventional in most cases contradicts the demands of the wireless links of the network. Our simulation results indicate that the modified gives better performance in terms of higher throughput, delay, retransmission, and energy consumption than conventional protocol. Keywords: Wireless Sensor Networks; Transmission Control Protocol; Congestion control; Wireless links. I. INTRODUCTION Many applications of wireless sensor networks require connectivity to external networks to let monitoring and controlling entities communicate with the sensors. By using the /IP protocols inside the sensor network, external connectivity can be achieved anywhere in the sensor network. In such IP-based sensor networks, can be used for remote management and reprogramming of sensor nodes. However, the high bit error rates in multi-hop sensor networks lead to energy-inefficiencies that reduce the lifetime of the sensor network. When a packet loss occurs due to corruption incorrectly activates anti-congestion procedures, causing overall throughput over the channel to drop. Constant losses caused by high bit error rates lead to sub-optimal average data throughputs due to s inherent inefficiencies. optimizations to deal with increased random packet losses should preferably maintain s end to-end semantics with minimal dependence on intermediate nodes. In a sensor network, error rate is much higher and bandwidth is smaller than those of fixed networks. As a consequence, running conventional protocol on a sensor network will suffer from severe performance degradation [1]. To handle a packet loss, conventional retransmits the lost packet from its source. However, when error rate is high, it may have to take several retransmissions to deliver a packet to its destination successfully. Furthermore, packets losses may also activate 's congestion control causing too many what is so called (slow start) that will further impair the performance of packet delivery. As a result, the effective throughput is much lower and the average packet delivery time will be much longer. In the worst cases, a may even completely stale when error rate is too high. In fact, most applications on a sensor network prefer faster and reliable packet delivery to higher throughput. However, most versions of are all designed to achieve higher throughput, not faster packet delivery. It may even completely stall in a highly error prone environment. Therefore, it is beneficial to redesign a by trading throughput for faster and reliable packet delivery. The standard fare in implementations today can be found in RFC 2581 [2]. This reference document specifies four standard congestion control algorithms that are now in common use. The four algorithms are Slow Start, Congestion Avoidance, Fast Retransmit and Fast Recovery. Congestion occurs when over a prolonged period of time more packets are generated than the network (as a whole or locally) can actually carry. Usually, nodes have some buffer space available which can handle transient overloads. Any packet in excess of the available buffer space is dropped, wasting all the energy spent on this packet so far. Clearly, the larger this buffer space is, the more overload can be carried and packet dropping occurs later. On the other hand, longer queues impose longer end-to-end delays and the protocols need longer time to react on congestion states. Congestion control is very important in wireless sensor networks, because overloading a wireless network by too many transmissions can increase the collision probability. congestion control limits the maximum window size according to the slow start congestion control algorithm. However, it even might make sense to further limit the window dependent on the number of intermediate hops in a wireless multi-hop network, because the optimal window size in terms of throughput might be below the window size of standard [3]. Improving performance in wireless networks can be classified into two groups. The first group of techniques requires new protocol mechanisms or changes to the existing protocols, while the second groups of methods are Page 72

those that do not need new mechanisms or changes. Improving may not be easy to implement on a Wide Area Network (WAN) because upgrading a large number of routers in a WAN is almost a business impossible. However, a sensor network has no such concern so that it is easy for a sensor network to embrace any new approach. The following sections study the modification of protocol over sensor networks. The rest of this paper is organized as follows: Section II presents related work. Section III describes the proposed algorithm. Section IV describes the details of simulation model. Simulation results and discussions are presented in section V. Section VI concludes this paper. II. RELATED WORK Here we discuss some recently proposed protocols for reliable transport layer in wireless sensor networks. Distributed Caching (DTC) and Support for Sensor networks (TSS) are inspired by the Snoop [4] protocol that has been developed for supporting over wireless access networks. The Snoop agent is deployed at an intermediate system between the wireless and wired part of the network. The agent buffers segments that have not yet been acknowledged by the receiver and detects segment loss by analyzing acknowledgements. In that case, the agent can perform local retransmissions as well as suppress acknowledgements in order to avoid duplicate acknowledgments at the sender. Duplicate acknowledgements might cause end to end retransmissions for packets that could also be recovered locally by the agent. DTC can be considered as a generalization of Snoop for wireless multi-hop networks, while TSS further reduces the number of transmissions and adds mechanisms to throttle the transmission rate in case of packet losses. Event-to-Sink Reliable Transport (ESRT) [5] aims to support reliable sensor data transport in wireless networks. ESRT is a centralized protocol that regulates the reporting rate of sensors in response to congestion detected by a sink. Each sensor node monitors its local buffer level and sets a congestion notification bit in the packets forwarded to the sink if the buffers overflow. When the sink receives a packet with the congestion notification bit set, it infers congestion and broadcasts a control signal notifying all source nodes to reduce their reporting frequency. It includes congestion control and mechanisms to achieve reliability. The reliability is controlled by adapting a rate at which the sink sends state reports back to the source. The frequency of the reports depends on the observed and desired reliability as well as the needs from congestion control. Congestion Detection and Avoidance (CODA) [6] is based on congestion detection by monitoring channel utilization and buffer occupancy at the receiver. Detected congestion situations are signaled towards the source using backpressure signals (open-loop). Nodes receiving backpressure signals throttle down their transmission. In addition, a closed-loop mechanism operates on a longer time-scale. Based on acknowledgements received from the sink, sources regulate themselves. Lost acknowledgements result in reducing the rate at the source. Again, in contrast to TSS, new signaling messages need to be introduced into CODA. In [7] it proposed to hold copies of forwarded packets in a cache. When a downstream node encounters an error with packet forwarding, a route error message might be sent to the upstream node. The cached packet can then be retransmitted possibly on multiple alternative routes in order to repair the route break. with Buffering capability and Sequence information (-BUS) [8] proposes to buffer packets during route disconnection and re-establishment. After a route becomes available again, buffered packets are retransmitted by intermediate nodes. Special control messages are used to indicate route breaks and re-establishments. III. A. Increased Timeout Threshol PROPOSED METHODS OF MODIFICATION FOR USE IN WSN In this section, we begin by discussing the selection of Retransmission Timeout (RTO) value in standard operations [9]. Then, we present our enhancement method by increasing RTO value. A sender constantly tracks the Round Trip Time (RTT) for its packets and uses a timeout mechanism to trigger retransmissions if an ACK is not received before the timer expires. As a de facto standard, sender uses the tracked average (RTT) plus m times the mean deviation of RTTs as the RTO value [9] for the next packet where the typical value of the factor m is 4. More precisely, let RTT (k) denote the k-th measurement value of RTT, where its value is the time interval between the beginning of the packet transmission until an ACK for the packet is received by the sender. Let SRTT (k) be the smoothed average RTT given as SRTT ( k) (1 ) SRTT ( k 1) RTT ( k) (1) where α is the exponential smoothing parameter with typical value of 1/8 [9]. Similarly, we use S (k) to denote the smoothed mean deviation of the RTTs, which is calculated by: S( k) (1 ) S( k 1) RTT ( k) SRTT ( k) (2) Page 73

where β is the smoothing parameter, which has a typical value of ¼ [9]. Finally, the retransmission timeout (RTO) value is obtained by RTO ( k) SRTT ( k) ms( k) (3) where m is typically set to 4 as a de facto standard. According to the standard protocol, the sender records the time when it just starts to forward some packets to the receiver. When the sender eventually receives an ACK associated with the packet, the RTT for the packet is thus computed. Using (1) to (3), the smoothed average and mean deviation of the RTTs, and the new RTO value are obtained, respectively. The RTO value is used for setting the timeout period for the next packets sent by the sender, until the next RTT measurement is obtained and the RTO is updated according to the equations. We note that unless the time-stamping option is activated, a sender does not keep track of the RTT for every packet. Instead, only one packet among the outstanding packets is tracked for RTT at any time. As a result, equations (1) to (3) are invoked to update the RTO value when the ACK for a tracked packet is received by the sender. We note that setting m to 4 in (3) in determining the RTO value can avoid virtually all spurious timeouts with a probability close to 1, if the RTTs do not demonstrate a high degree of variability, as found in wired network. However, due to reasons such as channel fading, retransmissions, packets scheduling and so forth, RTTs in wireless networks tend to have much higher variability than their counterparts in wired networks. For this reason, we propose to use a value larger than 4 for m in computing the RTO threshold value. Clearly, increasing m in (3) increases the RTO value for the given smoothed average and mean deviation of RTTs. Consequently, a larger RTO value can help absorb the high variability of RTTs in wireless networks, thus avoiding unnecessary spurious timeouts and maintaining throughput performance. On the other hand, the RTO value should not be chosen arbitrarily large to enable speedy recovery of actual packet losses. There is a tradeoff between the throughput gain by avoiding spurious timeouts and the throughput degradation due to the delay in recovering from actual packet losses. We have a few notes in place. Although it is normal to increase the RTO value to avoid spurious timeouts in wireless networks, to the best of our knowledge, such a method has not yet been proposed in the literature. This may have been due to the fact that the standard way of calculating the RTO value by (1) to (3) has been widely implemented. It will not be easy, if possible at all, to modify the value of m on existing systems and devices. Nevertheless, our proposed method could be considered in future implementation for wireless sensor applications. B. Modified Congestion Control Algorithm for WSN To estimate the number of packets that can be in transit without causing congestion, maintains a congestion window (cwnd). New packets are only sent if allowed by both this window and the receiver s advertised window. The sender can detect a packet loss in two ways: Timeout and Duplicate ACKs. A timeout occurs when the sender does not receive any acknowledgment from the receiver within a RTO. When a timeout occurs, interprets this as severe congestion in the network and sets the slow start threshold (ssthresh) to 1/2 of the minimum of the current cwnd and the receiver s advertised window. Then it decreases the cwnd to 1 segment and performs a slow start. During the slow start, the sender increases cwnd by 1 segment every time an ACK is received. When the cwnd reaches the ssthresh, it leaves the slow start phase and switches to the congestion avoidance, where new ACK increments the cwnd by 1/cwnd. On the other hand, when duplicate ACKs are received (duplicate ACKs signify that the receiver received out-of-order packets, interprets this as less severe congestion. When the third duplicate ACK is received, goes into the fast retransmit. The ssthresh is set to 1/2 of the minimum of cwnd and the receiver s advertised window and the sender retransmits the lost packet immediately without waiting for the retransmission time-out. During the fast retransmit stage, each duplicate ACK is considered as an acknowledgment of an out-of-order segment and the cwnd is increased by one correspondingly and continues to send packets. Summary of Slow Start and Congestion Avoidance is shown in Figure.1. Concept: The principal problem is the congestion control algorithm. Nearly all implementations nowadays assume that timeouts are caused by congestion, not by lost packets. Consequently, when a timer goes off, slows down and sends less vigorously (e.g., Jacobson's slow start algorithm). The idea behind this approach is to reduce the network load and thus alleviate the congestion. Unfortunately, wireless transmission links are highly unreliable. They lose packets all the time. The proper approach to dealing with lost packets is to send them again, and as quickly as possible. If, say, 2 percent of all packets are lost, then when the sender transmits 1 packets/sec, the throughput is 8 packets /sec. If the sender slows down to 5 packets /sec, the throughput drops to 4 packets /sec. In effect, when a packet is lost on a wired network, the sender should slow down. When one is lost on a wireless network, the sender should try harder. When the sender does not know what the network is, it is difficult to make the correct decision. It should be borne in mind that is an end to end protocol and a connection will almost always be mixed (part wired and part wireless). So, a balance Page 74

has to be kept while making any modifications to suit the wireless links. This balance is between segments dropped due to conventional congestion as opposed to wireless related reasons like high bit error rate and mobility [9]. ssthresh = 1/2 window cwnd =1 MSS Congestion Time-out Slow Start 3 ACKs ssthresh = 1/2 window cwnd =ssthresh cwnd ssthresh Congestion Congestion Time-out Congestion 3 ACKs Avoidance Congestion Figure 1. Summary of Slow Start and Congestion Avoidance ssthresh = 1/2 window cwnd =ssthresh Keeping the above considerations in mind, we have proposed some modifications to the model. The proposed modifications are: a) Reducing the number of duplicate acknowledgements required from 3 to 2 before a Fast Retransmit takes place. This supports the theory of resending a lost segment without delay. does not wait for an entire window s worth of ACKs to add one packet s worth to the congestion window, but instead increments Congestion Window by a little for each ACK that arrives. Specifically, the congestion window is incremented as follows each time an ACK arrives: I MMS ( MSS / cwnd ) (4) cwnd [ new] cwnd I (5) where I is Increment value. That is, rather than incrementing Congestion Window by an entire Maximum Segment Size (MSS) bytes each RTT, we increment it by a fraction of MSS every time an ACK is received. The important concept to understand about Additive Increase Multiplicative Decrease (AIMD) is that the source is willing to reduce its congestion window at a much faster rate than it is willing to increase its congestion window. b) Raising the Slow Start initialization point from 1 MSS to 4 MSS. This will prevent the cwnd from closing all the way and will aid a fast recovery of the cwnd. c) Raising the Slow Start threshold from half the previous cwnd size to ¾ of the previous cwnd. This is done so that the process of slow start continues for a longer period and the cwnd gets back to its original size quickly. ssthresh / 4 cwnd 3 (6) A. Simulation Tool (OPNET) IV. SIMULATION MODEL The well known OPNET simulation tool is used. Different simulations results are presented with different number of nodes in order to check performance of the proposed algorithm. The goal of the study was to investigate the behavior of new congestion control, conventional congestion control for throughput, delay, retransmission, and energy consumption. Page 75

B. Simulation Setup Extensive simulations are carried out to analyze the effectiveness of the proposed congestion control mechanism. 4, 5, 6, 7, 8, 9, 1 sensor nodes are randomly placed in a space of 3 x 3 m. packet size is assumed to be fixed at 128 bytes and each source node generating data at a maximum rate of 8 packets per second, the Slow Start initial count set to 4 Maximum Segment Size (MSS). We assume the presence of one sink located in the centre of WSN. We also assume the presence of three routing protocols which realize multiple paths from the source to sink; these are EAGRP, DSR, and AODV [1]-[13]. In physical layer 1Mbps data rate is used. Simulation time for each scenario was set to 5 seconds and repetitive simulations for each scenario were performed to verify the reliability of our results. Table I summarizes the simulation parameters used in our experimental setup. Evaluation metrics used performance test are: average throughput, average packet delivery time (delay), average number of retransmissions, energy consumption, and the stability of congestion window size (cwnd). TABLE I. SIMULATION PARAMETERS Routing algorithms EAGRP, DSR, AODV Simulation time 5 sec Simulation area 3 m x 3m Number of nodes 4, 5, 6, 7, 8, 9, 1 Packet size 128 bytes Packet rate 8 packets/sec Data Rate 1 Mbps Initial node energy 1 Joule Slow start initial count 4 MSS Duplicate ACK threshold 3 Retransmission Timeout 1 sec C. Selected Performance Metrics for Evaluation 1) Throughput: The throughput reflects the effective network capacity. It is defined as the total number of bits successfully delivered at the destination in a given period of time. Throughput shows protocol s successful deliveries for a time; this means that the higher throughput the better will be the protocol performance 2) End-to-End Delay of Data Packet: This metric measure the average time it takes to route a data packet from the source node to the destination node. The lower the end-to-end delay the better the application performance. If the value of End-to-end delay is high then it means the protocol performance is not good due to the network congestion. 3) Retransmission : Total number of retransmissions in the network. Calculated when data is retransmitted from the unacknowledged buffer. 4) Energy Consumption: The energy metric is taken as the average energy consumption per node calculated through simulation time. V. RESULTS & DISCUSSIONS With the above modifications applied, simulations were run and the results recorded and compared. As shown in Figures 2, 3, and 4, when an error causing a loss of multiple segments occurs, a problem arises with traditional s congestion window. Fast Retransmit closes the congestion window every time a non-duplicated acknowledgement is received. A loss of multiple segments makes the window close to half of its size for every dropped segment, as shown in Figure 2. Besides, the usable window is decreased during the fast recovery phase, as more information is sent; every time a duplicated acknowledge is received. When the congestion window is divided by two for the second time, the usable window closes to zero, thus blocking the communication and forcing the retransmission timeout. When the retransmission timer expires the congestion window is closed to and starts growing with slow start and congestion avoidance algorithms. Traditional problems, when multiple segments are lost, come from applying the Fast Recovery algorithm. Fast Recovery allows sending data while recovering from the first error. This makes the usable window close while this data is not acknowledged. When realizes that another error has happened, it divides the congestion window again by two. Usable window, (calculated as the congestion window minus the sent but not acknowledged data), comes down to a value that does not allow any more data to be sent. At this point the transmission is blocked because duplicated acknowledgements are not received and there are no other mechanisms that inflate the congestion window. So the only event that can trigger the retransmission is the retransmission timer expiration. Page 76

Modified does not apply Fast Recovery in order to avoid the problems described previously. When this algorithm is used, Fast Retransmit is the only algorithm applied. This means that Slow Start and Congestion Avoidance will be working when recovering from an error. As shown in Figures 2 to 4, modified closes the congestion window when the first error is detected. This stops the communication suddenly, but allows the congestion window, and consequently the usable window, to open exponentially. Then the usable window allows the sender to retransmit the lost segments. Figure 2 also shows that the cwnd not only drops at a higher value than in the traditional case but also continues the Slow Start process for a longer time. This has the dual effect of keeping a larger window open and also continuing to open it at a faster rate for a longer time. Figure 2. Changes of congestion window size for EAGRP with 1 nodes Figure 3. Changes of congestion window size for DSR with 1 nodes Modified provides us better performance than traditional, because the former closes the usable window when the first error of a burst is detected, and uses Slow Start from the beginning. From Figures 2 to 4, Modified yields significantly larger values for the time of first Congestion occurred, compared to Traditional. The improvement in the time of first congestion occurred for Modified is 31 sec compared to Traditional is 14 sec when we used EAGRP routing protocol, the improvement in the time of first congestion occurred for Modified is 35 sec compared to Traditional is 185 sec when we used DSR routing protocol, and the improvement in the time of first congestion occurred for Modified is 37 sec compared to Traditional is 25 sec when we used AODV routing protocol. Page 77

Throughput (bits/sec) International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463 Figure 4. Changes of congestion window size for AODV with 1 nodes As we can see in Figures 2 to 4 the cwnd of modified has larger congestion window size, for most of the time while traditional is fairly unstable. The stability of cwnd at its upper bound implies high throughput and short delay time (packet delivery time) as we can see from Figure 5 and Figure 6. When error rate is high, modified not only have a higher throughput, its delay time is significantly lower than its counterparts when the number of hops is high. 7, 6, 5, 4, 3, 2, 1, EAGRP _mo dified EAGRP _traditio nal DSR_mo dified DSR_traditio nal AODV_mo dified AODV_traditio nal 3 4 5 6 7 8 9 1 number of nodes Figure 5. The throughput versus number of nodes It was shown that in Figure 7, our modification protocol has less number of retransmissions and hence less incorrect triggering of the congestion control window reduction. This in turn resulted in more stable throughput.figure 8 presents the energy consumption for the modified and traditional protocols. Modified exhibits the lowest energy overheads as shown for these three routing protocols used. Hence, modified approach conserves more energy and is more efficient than traditional algorithm. This helps to considerably extend the lifetime of the nodes in heavy traffic scenarios. Page 78

Energy Consumption (Joule) Retransmission (Packets) Delay (sec) International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463.35.3.25.2.15.1.5 EAGRP _modified EAGRP _traditional DSR_mo dified DSR_traditio nal AODV_mo dified AODV_traditio nal 3 4 5 6 7 8 9 1 number of nodes Figure 6. The delay versus number of nodes.48.42.36.3.24.18.12.6 EAGRP _modified EAGRP _traditional DSR_mo dified DSR_traditio nal AODV_mo dified AODV_traditio nal 3 4 5 6 7 8 9 1 number of nodes Figure 7. The retransmission versus number of nodes.6.5.4.3.2.1 EAGRP _modified EAGRP _traditional DSR_mo dified DSR_traditio nal AODV_mo dified AODV_traditio nal 3 4 5 6 7 8 9 1 number of nodes Figure 8. The energy consumption versus number of nodes Page 79

VI. CONCLUSION The limited energy, memory, and computational resources of sensor nodes require an energy-efficient transport layer. support in wireless sensor networks is desirable to allow direct communication of sensor nodes with other systems for various purposes such as configuration, re-programming or management. In this paper we show that even in scenarios with high losses, can be used and implemented in an energy-efficient way. Concept presented in this paper drastically reduced the number of segment transmissions that are needed to transfer a certain amount of data across a wireless sensor network with relatively high bit / packet error rates. Simulation results indicate that in wireless sensor networks, modified outperforms traditional algorithm in terms of sending data and information due to its better average throughput, average end-to-end delay, average retransmission, congestion window size, and energy consumption in both high and low traffic. REFERENCES [1]. Z. Fu, X. Meng, and S. Lu, How bad can perform in mobile ad-hoc networks, Proc. IEEE ICNP'2, Paris, France, 22. [2]. Allman, V. Paxson, and W. Stevens, Congestion Control, RFC 2581, April 1999. [3]. Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, The Impact of Multihop Wireless Channel on Throughput and Loss, IEEE Infocom, March 3 - April 3, 23, San Francisco. [4]. H. Balakrishnan, S. Seshan, E. Amir, and R. H. Katz, Improving /IP performance over wireless networks, International ACM Conference on Mobile Computing and Networking, MOBICOM 1995, pp. 2-11, November 1995. [5]. Y. Sankarasubramanian, Ö. Ankan, and I. F. Akyildiz, ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks, ACM MobiHoc, June 1-3, 23, Anaheim. [6]. C.-Y. Wan, S. Eisenman, and A. Campbell, CODA: Congestion Detection and Avoidance in Sensor Networks, ACM SenSys 23, November 3-5, 23, Los Angeles, USA. [7]. A. Valera, W. Seah, and S. Rao, Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad hoc Networks, IEEE Infocom, March 3 - April 3, 23, San Francisco. [8]. D. Kim, C-K Toh and Y. Choi, -BuS: Improving Performance in Wireless Ad Hoc Networks, Journal of Communications and Networks, Vol. 3, No. 2, June 21. [9]. W. Richard Stevens, /IP Illustrated, Vol. 1: The Protocol, Addison Wesley, New York, Jan.1994. [1]. Tao Yang, Performance Behavior of AODV, DSR and DSDV Protocols for Different Radio Models in Ad-Hoc Sensor Networks, In Proceeding International Conference on Parallel Processing Workshops, Sep.27. [11]. Perkins,C.E., E. M. Royer, S. R. Das and M.K. Marine, Performance Comparison of Two On-demand Routing Protocols for Ad hocnetworks, pages 16-28, IEEE Personal Communications, 21. [12]. Adel Gaafar A.Elrahim, Hussein A. Elsayed, Salwa H. Elramly, and Magdy M. Ibrahim, An Energy Aware Routing Protocol for Mixed Static and Mobile Nodes in Wireless Sensor Networks, SpringSim'11,14th Communications and Networking Symposium (CNS'11), April. 211, Boston, MA, USA. [13]. Adel Gaafar A.Elrahim, Hussein A. Elsayed, Salwa H. Elramly, and Magdy M. Ibrahim, An Energy Efficient Routing Protocol Approach for Wireless Sensor Networks, In IEEE Proceedings of the 8th International Conference on Computer as a Tool (EuroCon and ConfTele),April. 211, Lisbon, Portugal. Page 8