Journal of Environmental Science, Computer Science and Engineering & Technology

Similar documents
Effect of Packet-Size over Network Performance

Transport Layer Protocols

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Computer Networks CS321

Per-Flow Queuing Allot's Approach to Bandwidth Management

Ethernet. Ethernet. Network Devices

Data Communication and Computer Network

Lecture 28: Internet Protocols

Objectives of Lecture. Network Architecture. Protocols. Contents

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

PART III. OPS-based wide area networks

IT4405 Computer Networks (Compulsory)

CPS221 Lecture: Layered Network Architecture

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Networking Test 4 Study Guide

CSMA/CA. Information Networks p. 1

RARP: Reverse Address Resolution Protocol

Adaptive DCF of MAC for VoIP services using IEEE networks

Final for ECE374 05/06/13 Solution!!

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Architecture and Performance of the Internet

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

IT Data Communication and Networks (Optional)

Protocols. Packets. What's in an IP packet

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

SBSCET, Firozpur (Punjab), India

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Requirements of Voice in an IP Internetwork

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

The OSI and TCP/IP Models. Lesson 2

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

How do I get to

What is Network Latency and Why Does It Matter?

Protocols and Architecture. Protocol Architecture.

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Congestions and Control Mechanisms n Wired and Wireless Networks

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

First Midterm for ECE374 03/09/12 Solution!!

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Question: 3 When using Application Intelligence, Server Time may be defined as.

Introduction to Ethernet

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Mathatma Gandhi University

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

The Impact of QoS Changes towards Network Performance

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Performance Evaluation of Wired and Wireless Local Area Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Internet Concepts. What is a Network?

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

QoS issues in Voice over IP

Access Control: Firewalls (1)

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Protocol Data Units and Encapsulation

A Survey: High Speed TCP Variants in Wireless Networks

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

1 Introduction to mobile telecommunications

How To Analyze The Security On An Ipa Wireless Sensor Network

SJBIT, Bangalore, KARNATAKA

Overview of TCP/IP. TCP/IP and Internet

Communication Networks. MAP-TELE 2011/12 José Ruela

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

CS268 Exam Solutions. 1) End-to-End (20 pts)

Performance Measurement of Wireless LAN Using Open Source

VoIP network planning guide

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Introduction to Metropolitan Area Networks and Wide Area Networks

Computer Networks Vs. Distributed Systems

Communications and Computer Networks

How To Understand The Internet Of S (Netware)

TCP Westwood for Wireless

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Overview of Computer Networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Introduction, Rate and Latency

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

524 Computer Networks

TCP in Wireless Mobile Networks

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency

Distributed Systems 3. Network Quality of Service (QoS)

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Transcription:

JECET; December2014-February 2015; Sec. B; Vol.4.No.1, 13-18. E-ISSN: 2278 179X Research Article Journal of Environmental Science, Computer Science and Engineering & Technology An International Peer Review E-3 Journal of Sciences and Technology Available online atwww.jecet.org Section B: Computer Science Analysis of User Datagram Protocol and Transmission Control Protocol Communication in Wired Networks Meenakshi Moza 1* and Suresh Kumar 2 1, 2 Department of F.E.T., ECE, Manav Rachna International University Faridabad, Haryana Received: 23 December 2014; Revised: 12 January 2015; Accepted: 22 January 2015 Abstract: Information in a network is transmitted on the basis of traffic scenario namely application traffic agent and data traffic. The importance of traffic scenario necessitates the reliability and capability of the information transmitted thereby rendering it important to go for performance analysis. The objective of this paper is to draw comparison between performances of transmission control protocol / file transfer protocol and user datagram protocol / constant bit rate traffic based communication in wired networks. Network Simulator-2 (NS-2) is used for simulation and evaluation of their performance. Parameters like Throughput, Packet delivery ratio, Packet loss and Delay have been extensively analyzed by varying the packet size and time intervals. Keywords: Transmission Control Protocol (TCP), File transfer protocol (FTP), User Datagram Protocol (UDP), Constant Bit rate (CBR), Network simulator, packet loss, Packet delivery ratio, Quality of service. INTRODUCTION A network is a collection of devices (often referred to as nodes) connected together by communication links. A node is any device having the capability of sending and receiving data, eg. Computer, printer, router etc. These nodes are connected using communication link. A communication link can be a cable, JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 13

air, optical fiber, or any medium used for carrying a signal which is comprised of information. It can be simply stated that a network is formed by connecting a group of computers and related devices. Sharing resources, file transferring and information transfer are the basic requisites of a network. The networks are characterized on the basis of speed of network, capacity of network and physical coverage of network 1-4. Computer networks form the core of modern day communication. Simplification in network design is carried out by layered architecture. To simplify things it can be said that debugging network applications is eased out in a layered architecture network. The various layers of network follow a set of rules called protocols. There are two main protocols namely UDP and TCP, specified for the transport layer in the layered architecture as shown in Figure-1. Figure-1: Simplified IP protocol stack The application decides which one is to be used. Internet applications like email, file transfer and web application make use of TCP for reliable and connection-oriented service. Retransmission is carried out so as to guarantee that all packets reach the destination. Congestion control in the internet is carried out by varying the speed of transmission. Four algorithms namely slow start, congestion avoidance, fast retransmit and fast recovery are used by TCP to provide congestion control. In these protocols packet loss is used as an indicator of congestion, and the number of packets TCP will send is altered before waiting for acknowledgments of those packets. This alteration affects the bandwidth available and is also responsible for delay changes on a link. The UDP, on the other hand, provides unreliable and connectionless service to the internet applications such as streaming multimedia and voice over IP. Here datagram is sent from a sender to receiver as fast as possible. In UDP there is no guarantee that packets will be received at the destination, and it does not perform any congestion control in the network 5-8. Thus, the data transfer in UDP environment can be accomplished without significant time delay and variations. TCP and UDP are different from each other on the basis of data transfer features as listed below: Reliable delivery: TCP is more reliable as compared to UDP. The reason for this is usage of message acknowledgment and retransmissions. Hence possibility of data loss is negligible. But in UDP there is no acknowledgement and no retransmission. Ordering of messages: In TCP, messages are transmitted in a sequence and received in the same order at the destination. But in UDP, there is no transmission message sequence and no ordered data delivery at receiver end. JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 14

Transfer features: TCP reads data as a stream of bytes and message is transmitted in the form of segments. UDP messages are sent in the form of datagrams into the network. Here, in this paper, the TCP and UDP are compared on the basis of the data transfer. METHODOLOGY Performance of any network is evaluated on the basis of certain criteria namely Throughput: Throughput is defined as the measurement of how fast, data can be sent across the network. It is calculated by taking the number of packets transmitted through the network in a unit of time. Throughput = ( received packet size) / (stop time start time) Packet Delivery Ratio (PDR %): It is the ratio of packets received at the intended destination, to the packets sent from the source. The PDR is mainly used as the parameter for evaluating the network performance. Higher the value of PDR, better is the network. Packet Delivery Ratio = (Number of packets received / Number of packets generated)*100 Packet Loss: This parameter is an indicator of the number of packets lost (dropped) during transmission. It is the difference between the number of packets generated and the number of packets received. Packet Loss = (Number of packets received - Number of packets generated) Average end-to-end delay: It is the average time taken by a packet from source to destination. This includes all the delays including queuing delay, propagation delay, processing delay at intermediate nodes etc. Lower the value of the delay, better is the network 9-12. Average end-to-end delay = ( packet receive time - packet sent time) SIMULATION ENVIRONMENT NS2 is an event driven simulator used for simulating wired and wireless networks 13. It is used to analyze events to have a better understanding of the behaviour of network. The topology as shown in Figure-2 has been used to study the performance of UDP and TCP traffic based communication by varying the 14, 15. packet sizes Figure-2: Network topology JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 15

The topology consists of five sender nodes and five receiver nodes with two routers in between connected by a 5Mbps channel. The senders and receivers are connected to routers through a 1Mbps channel. Data flows from node n0 to n7, n1 to n8, n2 to n9, n3 to n10 and n4 to n11. For UDP communication a UDP agent, CBR traffic generator, and a null agent as a traffic sink is required. And similarly for TCP communication a TCP agent, FTP traffic generator and TCP sink is required. The simulation is run for 5 seconds. The size of packets is varied from 200 to 1500, to analyses its effect on the parameters such as throughput, packet delivery ratio, packet loss and average end-to-end delay. RESULT ANALYSIS The main focus in this paper is to analyse the effect of varied packet sizes and interval on throughput, packet delivery ratio, packet loss and average end-to-end delay for TCP and UDP based communication for a particular topology created in NS2. Figure-3 below shows the effect of varied packet size on throughput for both UDP and TCP traffic. Throughput drops significantly with an increase in packet size in both because a bursty traffic is generated that increases contention in the MAC layer which results in collision and packet losses. Throughput is higher in UDP based communication because the retransmitted packets in TCP arrive with high latency as they travel part of the way twice. Figure-3: Packet Size vs Throughput Similarly, Figure-4 shown below depicts the effect of varying packet size on Packet loss. Figure-4: Packet Size vs Packet loss JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 16

Further, effect of varied packet size on average end-to-end delay for both TCP and UDP is analysed. Average end-to-end delay increases with increase in packet size in both the cases as shown in Figure-5. The average delay in case of TCP is higher as compared to UDP. Delay for each packet adds up so average delay increases and unbounded latency is the price to pay for reliable delivery. The effect of varying the packet size on packet delivery ratio is shown in Figure-6. Packet delivery ratio decreases with increase in packet size for UDP. This is because throughput decreases as packet size increases. Decrease of throughput means, packets received decreases. Hence packet delivery ratio decreases. However packet delivery ratio in case of TCP is almost 100% as TCP ensures that every bit of data is delivered correctly. Figure-5: Packet Size vs Av. end-to-end delay CONCLUSION AND FUTURE SCOPE Figure-6: Packet size versus Packet delivery ratio In this paper the effect of varying the packet size and the time interval between the packets on the performance of both TCP and UDP based network is analyzed. It is observed that for both the scenarios the average end-to-end delay is directly proportional to the packet size. The number of packets generated JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 17

is same for the same interval irrespective of the packet sizes 200, 500, 1000 and this value doubles after packet size increases beyond 1000 bytes. In future, soft computing techniques can be used to decide the optimal size of packet to improve the performance of network. REFERENCES 1. Breslan et al. Advances in network simulation in IEEE computer, 2000, 33 (5), 59-67. 2. Fahim and Vilas, Optimization of IPV4 Packet headers, International Journal of Computer science Issues, 2013,10, 1,212-214 3. Gitlin and Haas, On the packet size in integrated networks, 10 th Annual Joint Conference of the IEEE Computer and Communications Societies, Networking in the 90 s,732 740 Volume 2, INFOCOMM 91. 4. Ikegawa and Takahashi, The effect of Retransmitted packet size preservation property on TCP goodput over links with bit errors, Modelling and Optimization in Mobile, Adhoc and Wireless Networks, IEEE WIOPT 2005. 5. Jingsong and Mcleod, A UDP based file transfer protocol with flow control using fuzzy logic approach, Electrical and Computer Engineering, IEEE CCECE 2003. 6. Kim & Krunz, Bandwidth allocation with guaranteed packet loss performance, 2000, 8, 3, 337 349. 7. Li Yantao, Zhen Ren and Gang Zhou, Energy modeling and Optimization through joint packet size analysis of RSN and WIFI networks, Performance Computing and Communication Conference (IPCCC) 30 th IEEE International Conference,2011. 8. Meenakshi, Impact of network size and link bandwidth in wired TCP and UDP network topologies, International Journal of Engineering Research and General science, 2014, 2, 5. 215-223 9. Petrovic Improving TCP/IP performance over wireless LAN s, Department of Computer science, York University, Toronto, Canada, 2012. 10. Kevin and Kannan, the NS Manual. 11. Samprati Next Generation of Internet Protocol for TCP/IP Protocol suite, International Journal of Scientific and Research Publications, 2012, 2, 6,212-214. 12. Santosh Kumar And Sonam Rai, Survey on Transport Layer Protocols TCP &UDP,International Journal of Computer Applications,2012, 46(7): 20-25. 13. Shah et al. Effect of Packet size over Network Performance, International Journal of Electronics and Computer Science Engineering, ISSN: 2277 1956, 2012. 14. Teerawat and Ekram Hossain, Text Book Introduction to NS2, Second Edition. 15. Zhang, Floyd and Peterson, A Reordering robust TCP with DSACK, Network Protocols 11 th IEEE International Conference 2003. Corresponding Author: Meenakshi Moza Department of F.E.T., ECE, Manav Rachna International University Faridabad, Haryana, India JECET; December 2014-February 2015; Sec. B; Vol.4.No.1, 13-18. 18