Performance Evaluation of TCP Westwood. Summary

Size: px
Start display at page:

Download "Performance Evaluation of TCP Westwood. Summary"

Transcription

1 Summary This project looks at a fairly new Transmission Control Protocol flavour, TCP Westwood and aims to investigate how this flavour of TCP differs from other flavours of the protocol, especially TCP Reno which is currently the most commonly used version in the Internet. The purpose of the project is to discover, via simulation, how the changes which TCP Westwood implements in the TCP sender affect the transmission of TCP packets and to evaluate its performance, in comparison with TCP Reno, to see if the changes constitute an improvement in the protocol. There were several stages involved in the process of conducting the project: investigating the Transmission Control Protocol investigating the differences between the various flavours of TCP, especially TCP Westwood and TCP Reno learning how to use the network simulator ns-2 designing simulation experiments writing simulation scripts for the ns simulator running these scripts and collating their results using these results to evaluate the performance of TCP Westwood comparing the findings with those of other researchers. i

2 Contents Chapter 1 - Introduction Aims of the project Minimum Requirements 1 Chapter 2 - Background to the Problem Introduction TCP Basics Congestion Control TCP Flavours TCP Tahoe TCP Reno TCP Vegas TCP SACK TCP Westwood Comparison of TCP Flavours 11 Chapter 3 - Experiment Design Introduction Dumb-bell Topology Experiments to be conducted Sending Two Types of Traffic across a Network Lossy Links Summary 14 Chapter 4 - Implementation Introduction Simulation Discussion of the experiments TCP Traffic across a bottleneck link TCP Traffic across a lossy link TCP Traffic competing with UDP Traffic Comparison of results with findings of other research 26 Chapter 5 - Project Evaluation Introduction Experimental Conclusions Packets Dropped Throughput Success of the Project Possible Improvements Possible Extensions 29 Chapter 6 - Conclusion 30 References 31 Appendix A - Reflection on the Project Experience 33 ii

3 Appendix B - Simulation Scripts 34 B.1 TCP Traffic over a Bottleneck Link 34 B.2 Mixed Traffic over a Bottleneck Link 36 B.3 TCP Traffic over a Lossy Link 38 Appendix C - Perl Scripts for Data Extraction 41 Appendix D - Experiment Results 45 D.1 Packets Dropped 45 D.2 Average TCP Throughput 47 D.3 Variation in TCP Throughput 49 D.4 UDP Throughput 50 D.5 Slow Start Threshold and Congestion Window 51 iii

4 Table of Figures The congestion control algorithm Fast recovery Dumb-bell topology EXPERIMENT RESULTS TCP Traffic across a bottleneck link Packets dropped when bottleneck bandwidth causes congestion Average throughput when bottleneck bandwidth causes congestion Variation in throughput when bottleneck bandwidth causes congestion Packets dropped when buffer size causes congestion Average throughput when buffer size causes congestion Variation in throughput when buffer size causes congestion TCP Traffic across a lossy link Packets dropped with lossy link Average throughput with lossy link Variation in throughput with lossy link cwnd and ssthresh for TCP Reno cwnd and ssthresh for TCP Westwood TCP competing with UDP Packets dropped when bottleneck bandwidth causes congestion Average throughput when bottleneck bandwidth causes congestion UDP throughput when bottleneck bandwidth causes congestion Packets dropped when buffer size causes congestion and TCP competing with UDP Average throughput when buffer size causes congestion and TCP competing with UDP UDP throughput when buffer size causes congestion 26 Appendix D: EXPERIMENT RESULTS D.1 Packets dropped D.1.1 when bottleneck bandwidth causes congestion 45 D.1.2 dropped when buffer size causes congestion 45 D.1.3 with lossy link 46 D.1.4 when bottleneck bandwidth causes congestion and TCP competing with UDP 46 D.1.5 when buffer size causes congestion and TCP competing with UDP 46 D.2 Average throughput D.2.1 when bottleneck bandwidth causes congestion 47 D.2.2 when buffer size causes congestion 47 D.2.3 with lossy link 47 D.2.4 when bottleneck bandwidth causes congestion and TCP competing with UDP 48 D.2.5 when buffer size causes congestion and TCP competing with UDP 48 D.3 Variation in throughput D.3.1 when bottleneck bandwidth causes congestion 49 D.3.2 when buffer size causes congestion 49 D.3.3 with lossy link 50 iv

5 D.4 UDP throughput D.4.1 when bottleneck bandwidth causes congestion 50 D.4.2 when buffer size causes congestion 51 D.5 cwnd and ssthresh D.5.1 cwnd and ssthresh for TCP Reno 51 D.5.2 cwnd and ssthresh for TCP Westwood 51 v

6 Chapter 1. Introduction 1.1 Aims of the project The aim of this project is to investigate a new flavour of the Transmission Control Protocol, TCP Westwood, and to evaluate its performance, comparing it with the currently predominant flavour, TCP Reno. TCP Westwood was recently proposed to modify TCP Reno in such a way as to provide faster recovery (by not reducing the values of the congestion window and the slow start threshold too conservatively) and to provide better congestion avoidance than Reno. TCP Westwood can be deployed in wired, wireless and mixed networks [5]. Westwood sets its slow start threshold in a completely different way to Reno and this should cause the protocol to perform differently. Research literature (including [5] which states that improvements in throughput of up to 550% have been observed) suggests vast improvements in performance occur when TCP Westwood is utilised. This makes the protocol interesting and worth further investigation. The purpose of this project is, therefore, to investigate this new flavour's enhancements and to see how they affect the performance in various congestion situations. The method used to evaluate the performance of TCP Westwood in this project is simulation, using the network simulator ns Minimum Requirements The project had the following minimum requirements: to gain an understanding of TCP to understand the differences between the various TCP flavours to understand how TCP Westwood is different from the other flavours and how these differences affect its performance to design simulation experiments to compare TCP Westwood with TCP Reno 1

7 The following tasks were possible extensions to these minimum requirements: to write and run simulation scripts to conduct the above experiments to use the results of these scripts to evaluate the performance of TCP Westwood to compare these results with those obtained by other researchers The next chapter introduces the Transfer Control Protocol and explores the differences between some of its many flavours. 2

8 Chapter 2. Background to the Problem 2.1 Introduction An understanding of how the various flavours of TCP differ and how these differences affect their performance is necessary for the purpose of evaluating the performance of TCP Westwood. TCP Westwood was recently proposed to modify TCP Reno in such a way as to provide faster recovery (by not reducing the values of the congestion window and the slow start threshold too conservatively) and to provide better congestion avoidance than Reno. Its performance is better than that of TCP Reno in both wired and wireless networks and also in mixed networks which use both wired and wireless connections [5]. 2.2 TCP Basics TCP stands for Transmission Control Protocol. TCP is a reliable end-to-end protocol which adapts to network conditions to guarantee transmission of data. It was designed to provide reliable performance even when the network on which it runs is unreliable [18]. It is the Transmission Control Protocol, rather than the Internet protocol (IP), which is responsible for guaranteeing the delivery of packets. This means that TCP needs to implement timers or some other mechanism to discern when packet loss occurs. It also needs to retransmit packets when they are lost. TCP uses a sliding window protocol to determine when packet loss has occurred. This works as follows: Whenever the sender transmits a segment, it also starts a timer When the segment arrives at the receiver, the receiver sends back a segment (which may or may not contain data, depending on whether the receiver has any data it wishes to transmit) which include an acknowledgement number which identifies the next segment the receiver expects to receive. If the sender's timer expires before it receives the acknowledgement (ACK), then the sender retransmits the segment. Otherwise (i.e. if the ACK is received before the timer expires) the segment has been received successfully and no further action is necessary. This protocol is not foolproof. It is possible for segments to experience long delays in transmission. They eventually arrive at the receiver, but in the meantime the sender has timed out and retransmitted such packets since it believes them to have been lost. It is also possible that segments arrive at the 3

9 receiver out of order (it is the TCP receiver which is responsible for rearranging packets into the correct order once they have been received) causing some packets to be received but not acknowledged since TCP acknowledges segments in order. Hence higher numbered packets may be received but cannot be acknowledged until a lower numbered segment, which has taken a different route through the network and been delayed, arrives. If this occurs it is possible that the sender will time out for these higher numbered segments since the delay in acknowledgement is so great. The sender will then retransmit all such segments, even though this is unnecessary [18]. TCP Selective Acknowledgements (see section 2.3.4) attempts to address this problem. The size of the segments which are transmitted is decided by the TCP software. However, each segment. including its header, must fit into 65,515 bytes, which is the size of the IP payload. The size of segments may also be constrained by the segment size which the network over which they are being transmitted can support and by the amount of data the receiver can cope with. These considerations aside, TCP may put data from more than one write operation into one segment. Similarly, it may split the data from one write and put it into several separate packets. No matter what size the segment is, every TCP segment has a header which is always 20 bytes. It may also include data, although it is permissible for a segment to be solely a header [18]. When an application passes data to TCP to be transmitted, the TCP software may decide to transmit it immediately, or it may buffer the data. The application can override this decision to buffer in the case of urgent data, by using a PUSH flag [18]. A TCP connection requires both the sender and the receiver to create TCP sockets and to explicitly establish a connection between these sockets. This connection is full duplex i.e. data can travel in both directions at the same time [18]. TCP uses acknowledgements and for this reason does not support multicasting or broadcasting since the large number of acknowledgement packets which would be generated in such circumstances could overwhelm the sender [18] Congestion Control TCP congestion control uses an end-to-end approach since TCP receives no feedback about the state of the network from the IP layer. The TCP sender must therefore monitor the network to infer when 4

10 congestion is occurring. For example, when packet loss occurs, the TCP sender knows that there is congestion. Packet loss can be identified in two ways. Firstly, the TCP sender may time out. Secondly, the sender may receive three duplicate acknowledgements for the same segment of data. This indicates that the next segment in the sequence has been lost [13]. The TCP sender uses slow start and congestion avoidance algorithms to control the amount of data it transmits. These algorithms require a variable known as the congestion window (cwnd) which limits the amount of data the sender can send without the receipt of an ACK. Another variable, the slow start threshold (ssthresh) is also needed. The decision regarding which algorithm (slow start or congestion avoidance) to use at any given time is based on the value of ssthresh [1]. The decision criteria are as follows: when cwnd < ssthresh, slow start should be used when cwnd > ssthresh, congestion avoidance should be used [17] These two algorithms are described in greater detail below, and the way in which they affect the size of the congestion window is depicted in fig 2.1. TCP uses an additive-increase multiplicative-decrease (AIMD) algorithm to control congestion [11]. When a TCP connection is initialised, the congestion window is set to the size of the maximum segment permissible [1]. The slow start threshold variable is initially 64KB [18]. This initial period is known as slow start since the transmission begins very slowly. However, during slow start, the transmission rate increases exponentially since it is likely that the sender is greatly under-using the available bandwidth. Every time an ACK is received by the sender before its timer expires, the sender doubles its congestion window [1]. This exponential growth occurs until cwnd becomes equal to ssthresh, at which point the sender begins to increase its cwnd linearly. Every time an ACK is received by the sender before its timer expires, the sender increases its cwnd by one segment. This is the congestion avoidance stage [18]. This linear growth continues until a loss event occurs. The way in which TCP reacts depends on the type of loss event [18]. 5

11 If a timeout occurs, the sender resets ssthresh to be equal to half the value of cwnd at the time of the timeout. The variable cwnd is also reset to one maximum segment and the slow start phase is re-entered [18]. This is demonstrated in fig 2.2.1, below. cwnd (Kb) transmission fig the congestion control algorithm At the start of fig 2.2.1, the slow start threshold is currently set to 16Kb. When transmission begins, the amount of data sent in each transmission is doubled until this threshold value is reached - this occurs at the fourth transmission in the graph. At this point, transmission begins to increase linearly. At transmission 8, when the congestion window has reached a value of 20Kb, a timeout occurs and the slow start threshold is reset to half the value of the congestion window (1/2 * 20 = 10), while the congestion window itself is reset to 1Kb. At this point, slow start begins again, until the new threshold value (cwnd becomes 10Kb in transmission 13) is reached and transmission continues to grow linearly. If the sender receives triple duplicate acknowledgements, it resets cwnd to be equal to half the value of cwnd at the time of the receipt of the ACKs and resets ssthresh to be equal to the new value of cwnd. This is known as fast recovery [17]. As well as fast recovery, TCP uses a fast retransmit algorithm when triple duplicate acknowledgements occur. When the third duplicate acknowledgement arrives at the sender, the sender takes this as an indication that a packet has been lost and immediately retransmits it, without waiting for a time-out [1]. Fig 2.2.2, below, demonstrates the fast recovery mechanism. 6

12 20 cwnd (Kb) transmission fig fast recovery As in fig 2.2.1, ssthresh is currently valued at 16Kb at the start of the graph in fig Once again there is exponential growth of cwnd until this threshold is reached, at which point linear growth begins. The difference is that, at the 8 th transmission, triple duplicate acknowledgements are received by the sender. At this point, cwnd is halved, to become 10Kb and ssthresh is also reset to 10Kb. Linear growth then continues, since the value of cwnd is already equal to the value of ssthresh. 2.3 TCP Flavours There are many different flavours of the Transmission Control Protocol. The differences between the flavours mostly lie in the congestion control algorithms they implement. This section describes some of the flavours in use today - Tahoe, Reno, Vegas, SACK and Westwood TCP Tahoe TCP Tahoe was the predecessor to TCP Reno. In the case of either type of loss event, Tahoe cut its congestion window to 1 packet and began the slow start algorithm [13]. Fig 2.1 above would therefore depict the cwnd for TCP Tahoe for both types of loss event TCP Reno Reno is the TCP flavour predominantly in use on the Internet at this time. Its congestion control mechanism is the additive-increase multiplicative-decrease algorithm (AIMD) explained in section

13 and depicted in figs and Reno improved upon Tahoe by introducing the fast recovery mechanism. The AIMD algorithm means that TCP Reno overreacts to loss events [11] TCP Vegas TCP Vegas attempts to avoid congestion from occurring in the network at all. It attempts to detect network congestion before packets are lost. When it detects congestion it lowers its transmission rate in order to reduce congestion, and thus prevent packets from being lost. Vegas predicts packet loss by monitoring the round trip time (RTT) of packets. The longer the round trip time observed, the more congested the network is [13]. Unlike Reno, which uses multiplicative decrease of cwnd in the occurrence of a loss event, Vegas uses linear decrease. The reason this is feasible is that Vegas performs its decrease before loss events occur [15]. Vegas can be implemented alongside any other flavour of TCP on a network. The differences all occur at the TCP sender, the receiver is unchanged [3]. Although Vegas can interoperate with TCP Reno, its performance is affected by Reno in the case of a bottleneck in the network [12]. Since Vegas detects congestion earlier than Reno (which only becomes aware of congestion when packets are actually lost) and reduces its transmissions it sacrifices some of the bandwidth available to it. Reno, however, continues to increase its congestion window so long as no packet loss occurs and, in this instance, will take over the bandwidth which Vegas has given up. Although Vegas is attempting to reduce congestion, Reno will continue to increase congestion by increasing its transmissions. In the presence of a bottleneck, Reno is not fair towards the Vegas implementation. Vegas is also unable to obtain a fair share of the available bandwidth in the presence of TCP Westwood. Vegas itself is fair [11]. Brakmo et al [3] found that TCP Vegas achieved between 40% and 70% better throughput than TCP Reno thanks to its more efficient use of the bandwidth available to it. They also found that the amount of 8

14 data Vegas retransmitted was between one-half and one-fifth the amount retransmitted by Reno, showing that less packet loss occurred TCP SACK TCP Selective Acknowledgements, or TCP SACK, attempts to avoid the problems that can occur due to data packets arriving out of order (as explained in section 2.1). It also attempts to improve the performance when multiple packets from one window of data are lost [14]. SACK works by the receiver acknowledging all packets it has received, not just those received in order. This means that the sender knows exactly which packets have been lost and need not retransmit those packets which have been correctly received [14]. Providing this extra information to the TCP sender makes the TCP implementation more complex [15] TCP Westwood TCP Westwood was recently proposed to modify TCP Reno in such a way as to provide faster recovery (by not reducing the values of the congestion window and the slow start threshold too conservatively) and to provide better congestion avoidance than Reno. Its performance is better than that of TCP Reno in both wired and wireless networks and also in mixed networks which use both wired and wireless connections [5]. TCP Westwood monitors the rate at which the sender receives ACKs and uses this to calculate the available bandwidth of the connection being used. This measurement is done continuously. The sender can then use this estimate of the bandwidth to determine the new size of its congestion window and slow start threshold when loss events occur. This is known as faster recovery [5]. The congestion control mechanism of TCP Westwood is an additive-increase adaptive-decrease (AIAD) algorithm. When ACK packets are received, the sender increases its congestion window in the same way as TCP Reno increases its value of cwnd. In other words, the value of cwnd grows exponentially until ssthresh is reached, at which point it begins to grow linearly. The difference between Reno and Westwood is in the way they react to loss events. TCP Westwood computes its new cwnd and ssthresh 9

15 values based on the bandwidth available to it, thus utilising the bandwidth more efficiently and reducing the rate of sending as little as possible [11]. If there are long periods of time during which no acknowledgements are received, then the estimate of the bandwidth is decreased. Duplicate ACKs cause the bandwidth estimation to be increased in the same way as first ACKs since they show that a packet has got through [5]. The following equation shows how the bandwidth estimate, b k is calculated upon receipt of an ACK at time t k : b k = d k / t k - t k-1 where d k is the number of bytes acknowledged at time t k t k-1 is the time at which the previous ACK was received by the sender [5]. TCP Westwood, like Reno, is unable to tell the difference between losses caused by congestion and random losses i.e. those caused by a lossy link [19]. Grieco and Mascolo [11] found that TCP Westwood is fair when co-existing with TCP Reno. Not only is it fair, it is actually fairer than Reno in allocating bandwidth. However, it is not fair towards Vegas which is unable to obtain a fair amount of bandwidth when co-existing with either Reno or Westwood. They also found that TCP Westwood provides better goodput than TCP Reno. Casetti et al [5] found that TCP Westwood greatly improves performance over mixed wired and wireless networks. They observed throughput improvements of up to 550% over TCP Reno. Gerla et al [9] investigated how the use of multiple paths affects TCP transmissions. If packets are sent over different paths, it is likely that they will arrive out of order at the TCP receiver, causing duplicate acknowledgements to be generated. It was found that TCP Reno misinterprets these duplicate acknowledgements as a sign of network congestion whereas TCP Westwood is not sensitive to these duplicate acknowledgements since it uses an estimate of the available bandwidth in order to detect congestion. TCP Westwood has been further developed into several new flavours including Westwood+ [8] and Paced-Westwood [16]. These flavours are outside the scope of this project. 10

16 2.3.6 Comparison of TCP Flavours The table below shows how three TCP flavours - Reno, Vegas and Westwood - react when both types of packet loss event occur. Loss event: 3 duplicate ACKs Timeout TCP Flavour cwnd ssthresh cwnd ssthresh Reno ssthresh ½ current cwnd 1 packet ½ current cwnd Vegas ssthresh ½ current cwnd 1 packet ½ current cwnd Westwood BWE * RTT min / segment size BWE * RTT min / segment size 1 packet BWE * RTT min / segment size Abbreviations: cwnd - congestion window ssthresh - slow start threshold BWE - bandwidth estimation RTT min - minimum round trip time Note that although TCP Vegas reacts to loss events in exactly the same way as TCP Reno, these loss events occur less often with TCP Vegas due to its congestion avoidance mechanism, as described in section In the next chapter, the experimental design is presented. 11

17 Chapter 3. Experiment Design 3.1 Introduction Since the improvements which have been made in TCP Westwood are modifications to the congestion control mechanism of the protocol, the experiments which should be used to evaluate its performance should simulate congestion situations within a network. Each congestion situation investigated must also be simulated using TCP Reno in order to compare the two flavours of the protocol and to establish whether Westwood does, indeed, provide an improvement. There are various factors which contribute to congestion in a network. These include the number of data senders, the protocol the senders implement, the rate at which the senders transmit their data, the bandwidth available, the size of the buffers available at each router in the network and the type of data (TCP, UDP etc.) being sent. 3.2 Dumb-bell Topology The basic network topology to be used in the performance evaluation experiments is the dumb-bell topology, which is illustrated in fig 3.2 below. TCP Senders TCP Receivers Router A Bottleneck link Router B fig dumb-bell topology The parameters of this simple topology can be varied in several ways in order to create congestion situations which will allow the performance of TCP Westwood to be investigated. For each situation, the topology must be implemented twice - once with all senders implementing TCP Reno, and once with all senders implementing TCP Westwood. In each experiment, only one parameter should be varied. All 12

18 other parameters should remain the same throughout the experiment to ensure that the cause of the congestion is known. It is also important that the length of each simulation is sensible. If the duration is too short, not enough data will be gathered and few events will occur in the simulation. If the duration is too long, the trace files generated will be so huge that the post processing of the data will take an unreasonable amount of time Experiments to be conducted with the dumb-bell topology Using the topology depicted in fig 3.2 above, the following means of creating a congestion situation in the network will be investigated: - varying the bandwidth of the bottleneck link - varying the size of the buffer at Router A 3.3 Sending two types of traffic across a network The User Datagram Protocol (UDP) is a connectionless protocol which, unlike TCP, does not implement any flow control or error control [18]. This means that when congestion occurs in a network across which UDP senders are transmitting data, the senders do not modify their behaviour in any way. By failing to respond to congestion situations, UDP senders can make congestion in a network worse. Further problems arise when UDP and TCP both run across the same network, since TCP will reduce its transmission in the case of congestion while UDP uses any available bandwidth. As the TCP sender reduces its transmission, the UDP sender will take the bandwidth surrendered by the TCP sender. TCP Reno may overreact in its reduction of its congestion window and slow start threshold when congestion occurs. TCP Westwood, however, alters its congestion window and slow start threshold according to the bandwidth it perceives to be available [5]. This may allow TCP Westwood to perform better when competing for bandwidth with a UDP sender, since it will relinquish less of the available bandwidth when congestion occurs, and this possibility should be investigated. To this end, the experiments described in section above should be conducted a second time, with two of the senders and receivers in the dumb-bell topology implementing UDP rather than TCP. 13

19 3.4 Lossy Links During transmission, packet loss is not always due to congestion in the network. The presence of a lossy link in the network, that is one with physical defects which interfere with transmission, may also cause packets to be dropped. Both Reno and Westwood are unable to tell the difference between losses caused by congestion and random losses i.e. those caused by a lossy link [19]. Since Westwood reacts to packet loss differently to Reno, experiments in which the bottleneck link is lossy should be conducted to see whether TCP Westwood can provide an improvement in performance in these situations. 3.5 Summary Each experiment will involve various parameters. The following parameters will remain constant in every experiment: packet size bandwidth of access links delay of access links delay of the bottleneck link Overall the number of senders and receivers will also remain constant, although in certain experiments some of these nodes may implement UDP rather than TCP, while in other experiments only TCP will be implemented. According to the experiment being conducted, the following parameters will be varied: bandwidth of bottleneck link buffer size at router A probability of loss on bottleneck link The next chapter explains the implementation of the experiments. 14

20 Chapter 4. Implementation 4.1 Introduction This chapter begins with a brief discussion of why simulation was considered the appropriate methodology for the performance evaluation. It then goes on to discuss the simulation experiments which were conducted and the results obtained. The graphs which depict the results for each experiment are provided in the appropriate sections of this chapter. They can also be found in Appendix D, grouped according to the data they represent in order to enable an easier comparison of the way each performance metric is affected. The conclusions which can be drawn from the results provided here, can be found in chapter Simulation There are various methods available for evaluating the performance of a protocol. These include direct experimentation on a network, mathematical modelling and simulation. Direct experimentation may yield results which other methods miss. However, it is expensive and complex [4]. The downside to mathematical modelling is that it requires assumptions to be made, which may mean that the models may not accurately reflect reality. The tool of simulation was chosen for this investigation because it offers a good compromise and is easier and cheaper than the other methods. Although other simulators such as YATS (Yet Another Tiny Simulator) [2] exist, it was the network simulator ns-2 which was used for the purpose of performance evaluation. This particular simulator was chosen since it supports a wide range of protocols [4]. This range includes TCP Westwood, which led to ns-2 being chosen since other simulators do not support this new flavour, which is essential for the purposes of this project. In order to obtain data from the simulator, scripts (see Appendix B) were written which created trace files. These trace files were then post processed using two Perl scripts (see Appendix C) to extract the required data. In the writing of ns scripts, two tutorials [6, 10] were useful, as was the ns manual [7]. 15

21 4.3 Discussion of the Experiments Five experiments were conducted for the purposes of performance evaluation and these are described in detail below. Each experiment used the dumb-bell topology (see fig 3.2, section 3.2) and investigated the throughput (the amount of data received per second by the TCP receivers) and the number of packets lost when a given parameter was altered in the network. In the experiments which involved only TCP traffic, the throughput was looked at in two ways - firstly, the average throughput across the TCP receivers was calculated; and secondly, the variation in the throughput was calculated since throughput was not always equally shared among the TCP receivers. Throughput was studied since it is a good indicator of performance across a network - a large throughput indicates that a large amount of data is being correctly transmitted and received and that this is taking place quickly. The greater the throughput, the better the performance of the protocol being used. The number of packets dropped was chosen as a performance metric to be studied since the loss of packets indicates a congestion situation has occurred and it is the congestion control mechanism which differs between TCP Reno and TCP Westwood, and thus creates the potential for improvement. When TCP is used, any packets which are dropped must be retransmitted which may affect performance by increasing the volume of traffic to be sent. In each experiment the access links between the senders and router A, and between router B and the receivers, each had a bandwidth of 100Mb and a delay of 1ms (see fig 3.2). The size of all packets transmitted was The parameters of the bottleneck link between routers A and B, and the size of the buffer at A were dependent on the experiment being conducted. Each simulation was run several times to test the scripts when they were initially written. The results which follow were obtained from one run of each experiment. Ideally, simulations would be run several times and the results averaged (see section 5.4). Some of the experiments provided results which appeared unusual (see fig , where the throughput variation for TCP Reno increases greatly when the buffer size is 40, for example) and these experiments were repeated to ensure the results were correct. 16

22 4.3.1 TCP Traffic across a bottleneck link For the purposes of the two experiments described in this section, a dumb-bell topology with four TCP senders and four TCP receivers was used. The bottleneck link had a delay of 40ms. Each simulation ran for 40s and each sender transmitted File Transfer Protocol (FTP) packets throughout the simulation. The first experiment used a buffer size of 50 at router A, and the parameter which was varied was the bandwidth of the bottleneck link. This was varied from 0.5Mb to 5Mb in 0.5Mb increments. The results can be seen in figs , and below. Packets dropped Bandwidth (Mb) Reno Westwood fig packets dropped when bottleneck bandwidth causes congestion Throughput (Kbps) Bandwidth (Mb) Reno Westwood fig average throughput when bottleneck bandwidth causes congestion 17

23 Variation in throughput (Kbps) Bandwidth (Mb) Reno Westwood fig variation in throughput when bottleneck bandwidth causes congestion Fig shows that the number of packets dropped when using TCP Westwood tends to be fairly high regardless of the bandwidth, while the number of packets dropped when using Reno reduces as the bandwidth increases and thus congestion decreases. Based on this performance metric, Reno tends to (although does not always) outperform TCP Westwood. Fig shows that in this scenario TCP Westwood provided only a very slight improvement over Reno in terms over average throughput across the four receivers. However, in general, the throughput was shared more fairly among the receivers when TCP Westwood was used as demonstrated by fig which shows a smaller variation in the throughput at the receivers with Westwood for most of the simulations. The second experiment kept the bottleneck bandwidth constant at 5Mb, and varied the buffer size at router A from 10 to 70 in increments of 10. The results can be seen in figs , and Packets dropped Buffer size Reno Westwood fig packets dropped when buffer size causes congestion 18

24 Throughput (Kbps) Reno Westwood Buffer size fig average throughput when buffer size causes congestion Variation in throughput (Kbps) Buffer size Reno Westwood fig variation in throughput when buffer size causes congestion This second experiment provided results very similar to the first. In this case, TCP Westwood always caused more packets to be dropped than TCP Reno, although the number of packets dropped by Westwood did decrease as the buffer size increased as would be expected since the larger buffer was able to store the packets the TCP Westwood senders were transmitting (see fig ). Again, as fig shows, average throughput was generally slightly higher with TCP Westwood, although this was not always the case. In this experiment, however, TCP Westwood shows a marked improvement over TCP Reno when the variation in throughput is examined, demonstrating a much greater fairness than Reno provides. 19

25 4.3.2 TCP Traffic across a lossy link For the experiment described in this section, a dumb-bell topology with four TCP senders and four TCP receivers was again used. Each simulation ran for 40s and each sender transmitted FTP packets throughout the simulation. Routers A and B each had a buffer size of 50, and the bottleneck link had a bandwidth of 5Mb and a delay of 40 ms. The bottleneck link was a lossy link, whose probability of loss was varied from 0% to 0.5% in increments of 0.1%. The results can be seen in figs , and Packets dropped Probability of loss (%) Reno Westwood fig packets dropped with lossy link Throughput (Kbps) Probability of loss (%) Reno Westwood fig average throughput with lossy link 20

26 Variation in throughput (Kbps) Reno Westwood Probability of loss (%) fig variation in throughput with lossy link Fig shows that, no matter what the probability of loss across the lossy link might be, TCP Westwood always causes more packets to be dropped than TCP Reno. This seems to indicate that it is not just the lossy link which is causing packet loss (see section for a discussion of this). Fig , showing the average throughput, appears to be inconclusive - in some situations Westwood provides improvements of up to 0.5Kbps, while in others Reno provides similar improvements over Westwood. With this experiment, a comparison of figs and is useful, since it can be seen that in each case where Reno provided an improvement in average throughput, TCP Westwood was actually providing a fairer distribution of that throughput amongst the receivers. That is, Reno was causing one or two receivers to enjoy large throughputs at the expense of the other nodes, while Westwood distributed the throughput more fairly. Although this lowered the overall throughput slightly, each receiver obtained a fairly large throughput. An extra experiment using a lossy link was conducted to demonstrate how the two TCP flavours vary their slow start thresholds and congestion windows when loss events occur. This experiment used only one TCP sender and one receiver. The access links had a bandwidth of 100Mb and a delay of 1ms. The bottleneck link had a bandwidth of 5Mb, a delay of 40ms and a probability of loss of 0.5%. The results of this experiment can be seen in figs and

27 fig cwnd and ssthresh for TCP Reno fig cwnd and ssthresh for TCP Westwood A comparison of these two graphs shows that the two TCP flavours set their slow start thresholds very differently. In fig , which depicts the threshold and the congestion window as set by TCP Reno, the threshold is is relatively low for much of the simulation's duration. In contrast, fig , which shows TCP Westwood's slow start threshold and congestion window values, shows clear evidence of the faster recovery of TCP Westwood. That is, the slow start threshold is set equal to the estimate of the available bandwidth after a timeout. This leads to a much higher slow start threshold being implemented by TCP Westwood, and this is clearly visible in fig It should be noted that fig shows no timeout events, whereas fig shows two, where the value of cwnd suddenly drops. Despite the fact that timeouts have occurred with TCP Westwood, and not with TCP Reno, Westwood still implements a greater ssthresh TCP Traffic competing with UDP traffic The two experiments described in this section used a dumb-bell topology with two TCP senders, two UDP senders, two TCP receivers and two UDP receivers. Each simulation ran for 40s and both TCP senders transmitted FTP packets throughout the simulation while both UDP senders transmitted Constant Bit Rate (CBR) packets throughout. For these experiments, the total throughput for the UDP receivers was calculated along with the average throughput for the TCP receivers. The two experiments conducted 22

28 with UDP competing for bandwidth used the same network parameters as the two experiments described in section That is, one experiment investigated the effects of altering the bottleneck bandwidth, while the other investigated the alteration of the buffer size. The results of the first experiment involving UDP, in which the bottleneck bandwidth was altered from 0.5Mb to 5Mb in 0.5Mb increments to create a congestion situation, can be observed in figs , and below. Number of packets dropped Reno Westwood Bandwidth of bottleneck link (Mb) fig packets dropped when bottleneck bandwidth causes congestion and TCP competing with UDP 23

29 120 Throughput (Kbps) Reno Westwood Bandwidth (Mb) fig average TCP throughput when bottleneck bandwidth causes congestion and TCP competing with UDP Throughput (Kbps) Bandwidth (Mb) UDP competing with Reno UDP competing with Westwood fig UDP throughput when bottleneck bandwidth causes congestion Yet again, shows that TCP Reno causes less packets to be dropped than does TCP Westwood. However, in this experiment TCP Westwood shows, in fig , a more notable increase in average 24

30 throughput compared to TCP Reno, and this average throughput is higher for TCP Westwood in all cases. Fig shows the total UDP throughput when the protocol is competing with each flavour of TCP. It can be seen that TCP Westwood reduces the UDP throughput slightly, thus ensuring a more friendly distribution of the bandwidth and showing that TCP Westwood can compete more effectively with UDP than can Reno. The results of the second experiment, in which the buffer size was altered, from 10 to 70 in increments of 10, to create congestion, can be seen in figs , and Number of packets dropped Buffer size Reno Westwood fig packets dropped when buffer size causes congestion and TCP competing with UDP Throughput (Kbps) Reno Westwood Buffer size fig average TCP throughput when buffer size causes congestion and TCP competing with UDP 25

31 Throughput (Kbps) Buffer size UDP competing with Reno UDP competing with W estwood fig UDP throughput when buffer size causes congestion Fig shows TCP Westwood still causing more packets to be dropped than TCP Reno. Fig , however, shows the greatest improvement seen in the average throughput when TCP Westwood is used. Fig confirms these findings, showing a marked reduction in UDP throughput when TCP Westwood is competing for bandwidth, compared with TCP Reno, which struggles against UDP. 4.4 Comparison of results with findings of other research Comparing the findings of the above experiments with those reported in the literature on TCP Westwood, will provide a basis for examining the validity of the results obtained. This will be useful in evaluating the success of the project in the next chapter. Much of the literature [5, 9, 11] has looked at scenarios, such as wireless or satellite links, not studied in this project and thus their findings are not directly comparable with the results discussed here. Their findings were mentioned, however, in section Zanella et al [19] found that the use of TCP Westwood always led to higher average throughput than did Reno. This clearly undermines some of the results discussed in section 4.3 since Westwood was found to achieve lower average throughput than Reno in some situations. Casetti et al [5] investigated the fairness of TCP Westwood and showed it to be as good as, if not better than, the fairness of TCP Reno. This supports the results discussed above, whereby the variation in throughput at the receivers was generally lower (and thus fairer) when TCP Westwood was used. This was also shown to be the case by Grieco and Mascolo [11]. In the next chapter, conclusions are drawn from these results, and the project is evaluated. 26

32 Chapter 5. Project Evaluation 5.1 Introduction This chapter looks at the way in which the project was conducted and evaluates the level of success which was achieved. It also aims to explain how the project could have been improved and to look at ways in which the project could be further developed in the future. 5.2 Experimental Conclusions The performance evaluation conducted here is based upon the results obtained through experimentation and discussed in chapter 4. It should be borne in mind that these results did not always agree with the literature on the topic. Sections and 4.4 provide more detail on the findings reported in the literature and the way in which the performance of TCP Westwood was evaluated in these papers Packets Dropped It has been seen that TCP Westwood usually causes more packets to be dropped than TCP Reno in a congestion situation. This indicates that TCP Westwood, depending on the limiting factor in the network, is causing buffer capacity to be reached more quickly and more often than TCP Reno or is causing the bottleneck bandwidth to be fully utilised quicker than TCP Reno. Given the way in which the protocol's congestion control mechanism has been altered, this is to be expected. While TCP Reno has what is known as fast recovery, TCP Westwood has faster recovery. That is, Westwood resets its slow start threshold using its estimation of the available bandwidth after a loss event. This means that TCP Westwood generally sets a much higher threshold than does TCP Reno (see figs D.5.1 and D.5.2 in Appendix D) and so saturation of the available bandwidth is achieved much quicker. This would account for more packets being dropped, since Westwood does not reduce its transmission rate as much as Reno Throughput In the majority of cases, a higher throughput was achieved when TCP Westwood was used than when TCP Reno was implemented. However, in some instances (see figs D.2.2 and D.2.3 in Appendix D) 27

33 Reno did provide a slightly higher throughput. The experiments in which Westwood always outperformed Reno were those involving competition between TCP and UDP for the available bandwidth. This improvement was especially noticeable when the size of the buffer at the router caused the congestion situation (see fig D.2.5). The variation in the throughput was also investigated. Although Reno occasionally out-performed Westwood, in general TCP Westwood provided a fairer distribution of the available bandwidth, so that each receiver had a similar throughput. In every instance of Reno providing a higher average throughput than Westwood, a lower variation in throughput amongst the receivers, and thus a fairer distribution, was obtained by TCP Westwood. In those experiments involving UDP, the overall UDP throughput was also investigated. The findings here reinforced the observations made earlier, whereby TCP Westwood always provided a higher throughput in the presence of UDP transmissions. In both UDP experiments, the UDP throughput was lower in the presence of TCP Westwood than in the presence of TCP Reno. This indicates that Westwood is more able to compete with Reno, due to its faster recovery mechanism. By not backing off as much as Reno after loss events occur, TCP Westwood sacrifices less of its bandwidth to the UDP and thus achieves a better throughput. 5.3 Success of the Project The project has been successful in that it has fulfilled the objectives which were originally stated. That is, the Transmission Control Protocol and its various flavours have been investigated, simulation experiments have been designed and scripts to conduct these experiments using the network simulator ns- 2 have been written and run, the results obtained have been collated and discussed and, finally, the results have been used to compare the performance of TCP Westwood with that of TCP Reno and thus to evaluate the new flavour. However, although the overall aims have been achieved, this has not necessarily been done in the optimum manner. As discussed in section 4.4, the results obtained did not always agree with the results of other researchers. As already mentioned, however, much of the other research studied investigated different scenarios to those investigated here and thus direct comparison may not be conclusive in establishing the validity of the experiments'results. Had time permitted, the results could have been 28

34 improved and made more reliable by running each experiment multiple times and conducting statistical analyses of the results. 5.4 Possible Improvements The data extracted from the trace files generated by the simulation scripts were used to investigate two performance metrics - throughput and the number of packets dropped. There are, however, various other performance metrics such as the number of packets retransmitted, the goodput (throughput with retransmitted packets subtracted) and the packet delay in the network. Since it has been shown in chapter 4 that TCP Westwood does not provide an improvement in the number of packets dropped but does, sometimes, provide an improvement in the throughput, it would have been useful to investigate one or more of these other performance metrics to give a better overall picture of the way in which using TCP Westwood affects the transmission of packets. As mentioned in section 5.3, it would have been useful to conduct each experiment many times. The mean of the results could then have been calculated, along with such statistical derivatives as the standard deviation. This would have made the results more robust and more reliable by reducing the effects of any faulty results. 5.5 Potential Extensions The experiments conducted for the purposes of this investigation used a single, very simple topology. Real-world situations in which TCP is used are likely to involve much more complex topologies than the dumb-bell topology. Such topologies could be an area for further investigation into the differences in performance between TCP Westwood and Reno. The experiments have also been limited in the transmission media simulated - all the links in the dumbbell topology were physical links. Modern computer networks may involve wireless or satellite links in addition to or instead of fibre connections. Such wireless and mixed media networks have been investigated in the literature [5, 9, 11] and have shown TCP Westwood to provide significant improvements in throughput and goodput in such scenarios. A study of Westwood's performance over different transmission media would provide an interesting and possibly insightful extension to this project. 29

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 24: Congestion Control Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica,

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

Performance Analysis of TCP Variants

Performance Analysis of TCP Variants 102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Transport Layer PREPARED BY AHMED ABDEL-RAOUF Transport Layer PREPARED BY AHMED ABDEL-RAOUF TCP Flow Control TCP Flow Control 32 bits source port # dest port # head len sequence number acknowledgement number not used U A P R S F checksum Receive window

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER Vilma Tomço, 1 Aleksandër Xhuvani 2 Abstract: The purpose of this work is

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

CSCI Topics: Internet Programming Fall 2008

CSCI Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Transport Layer Derek Leonard Hendrix College October 20, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 3: Roadmap 3.1 Transport-layer

More information

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018 CS 43: Computer Networks 19: TCP Flow and Congestion Control October 31, Nov 2, 2018 Five-layer Internet Model Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control Lecture material taken from Computer Networks A Systems Approach, Third Ed.,Peterson and Davie, Morgan Kaufmann, 2003. Computer Networks: TCP Congestion Control 1 TCP Congestion

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018 TCP Review Carey Williamson Department of Computer Science University of Calgary Winter 2018 Credit: Much of this content came courtesy of Erich Nahum (IBM Research) The TCP Protocol Connection-oriented,

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Congestion Control. Principles of Congestion Control. Network-assisted Congestion Control: ATM. Congestion Control. Computer Networks 10/21/2009

Congestion Control. Principles of Congestion Control. Network-assisted Congestion Control: ATM. Congestion Control. Computer Networks 10/21/2009 Congestion Control Kai Shen Principles of Congestion Control Congestion: informally: too many sources sending too much data too fast for the network to handle results of congestion: long delays (e.g. queueing

More information

Transport Protocols and TCP

Transport Protocols and TCP Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

CSCI Topics: Internet Programming Fall 2008

CSCI Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Transport Layer Derek Leonard Hendrix College October 22, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 3: Roadmap 3.1 Transport-layer

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD Overview 15-441 Computer Networking Lecture 9 More TCP & Congestion Control TCP congestion control TCP modern loss recovery TCP modeling Lecture 9: 09-25-2002 2 TCP Congestion Control Changes to TCP motivated

More information

TCP Westwood and Easy Red to Improve Fairness in High-speed Networks. PfHsn 2002 Berlin, 22 April 2002

TCP Westwood and Easy Red to Improve Fairness in High-speed Networks. PfHsn 2002 Berlin, 22 April 2002 TCP Westwood and Easy Red to Improve Fairness in High-speed Networks L. A. Grieco, S. Mascolo Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari, Italy PfHsn 2002 Berlin, 22 April 2002 Outline

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Brad Karp UCL Computer Science CS 3035/GZ01 31 st October 2013 Outline Slow Start AIMD Congestion control Throughput, loss, and RTT equation Connection

More information

Fall 2012: FCM 708 Bridge Foundation I

Fall 2012: FCM 708 Bridge Foundation I Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport

More information

TCP WITH FASTER RECOVERY. Claudio Casetti Mario Gerla Scott Seongwook Lee Saverio Mascolo Medy Sanadidi

TCP WITH FASTER RECOVERY. Claudio Casetti Mario Gerla Scott Seongwook Lee Saverio Mascolo Medy Sanadidi TCP WITH FASTER RECOVERY Claudio Casetti Mario Gerla Scott Seongwook Lee Saverio Mascolo Medy Sanadidi Computer Science Department University of California, Los Angeles, USA ABSTRACT Among the problems

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

ENSC 835: COMMUNICATION NETWORKS

ENSC 835: COMMUNICATION NETWORKS ENSC 835: COMMUNICATION NETWORKS Evaluation of TCP congestion control mechanisms using OPNET simulator Spring 2008 FINAL PROJECT REPORT LAXMI SUBEDI http://www.sfu.ca/~lsa38/project.html lsa38@cs.sfu.ca

More information

Congestion Control. Principles of Congestion Control. Network assisted congestion. Asynchronous Transfer Mode. Computer Networks 10/23/2013

Congestion Control. Principles of Congestion Control. Network assisted congestion. Asynchronous Transfer Mode. Computer Networks 10/23/2013 Congestion Control Kai Shen Principles of Congestion Control Congestion: Informally: too many sources sending too much data too fast for the network to handle Results of congestion: long delays (e.g. queueing

More information

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control Transport layer Review principles: Reliable data transfer Flow control Congestion control Instantiation in the Internet UDP TCP 1 UDP: User Datagram Protocol [RFC 768] No frills, bare bones Internet transport

More information

TCP congestion control:

TCP congestion control: TCP congestion control: Probing for usable bandwidth: Ideally: transmit as fast as possible (cwnd as large as possible) without loss Increase cwnd until loss (congestion) Loss: decrease cwnd, then begin

More information

Lecture 4: Congestion Control

Lecture 4: Congestion Control Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols Outline r Development of reliable protocol r Sliding window protocols m Go-Back-N, Selective Repeat r Protocol performance r Sockets, UDP, TCP, and IP r UDP operation r TCP operation m connection management

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols Outline Development of reliable protocol Sliding window protocols Go-Back-N, Selective Repeat Protocol performance Sockets, UDP, TCP, and IP UDP operation TCP operation connection management flow control

More information

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Transport Layer By: Dr. Alireza Abdollahpouri TCP/IP protocol suite 2 Transport Layer The transport layer is responsible for process-to-process

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS NETWORKS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2015 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data layer Physical layer service

More information

TCP Congestion Control

TCP Congestion Control 6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

Flow and Congestion Control Marcos Vieira

Flow and Congestion Control Marcos Vieira Flow and Congestion Control 2014 Marcos Vieira Flow Control Part of TCP specification (even before 1988) Goal: not send more data than the receiver can handle Sliding window protocol Receiver uses window

More information

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Flow and Congestion Control (Hosts)

Flow and Congestion Control (Hosts) Flow and Congestion Control (Hosts) 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Flow Control

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer Part c Congestion Control Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Transport Layer 3-1 Chapter 3 outline 3.1 transport-layer

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

TCP Congestion Control

TCP Congestion Control 1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control

More information

Lecture 8. TCP/IP Transport Layer (2)

Lecture 8. TCP/IP Transport Layer (2) Lecture 8 TCP/IP Transport Layer (2) Outline (Transport Layer) Principles behind transport layer services: multiplexing/demultiplexing principles of reliable data transfer learn about transport layer protocols

More information

Internet Networking recitation #10 TCP New Reno Vs. Reno

Internet Networking recitation #10 TCP New Reno Vs. Reno recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

Congestions and Control Mechanisms in Wired and Wireless Networks

Congestions and Control Mechanisms in Wired and Wireless Networks Research Inventy: International Journal of Engineering And Science Vol.4, Issue 6 (June 2014), PP -57-62 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Congestions and Control Mechanisms

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented

More information

CSE 461. TCP and network congestion

CSE 461. TCP and network congestion CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Mid Term Exam Results

Mid Term Exam Results Mid Term Exam Results v Grade Count Percentage v 20-29 1 2.38% v 40-49 2 4.76% v 50-59 5 11.90% v 60-69 18 42.86% v 70-80 16 38.10% Please hand the paper back to me after this class since we have to update

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

Chapter 3- parte B outline

Chapter 3- parte B outline Chapter 3- parte B outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4 principles of reliable data transfer 3.5 connection-oriented transport:

More information

Congestion Collapse in the 1980s

Congestion Collapse in the 1980s Congestion Collapse Congestion Collapse in the 1980s Early TCP used fixed size window (e.g., 8 packets) Initially fine for reliability But something happened as the ARPANET grew Links stayed busy but transfer

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Congestion control in TCP Contents Principles TCP congestion control states Congestion Fast Recovery TCP friendly applications Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr

More information

Modeling the Goodput of TCP NewReno in Cellular Environments

Modeling the Goodput of TCP NewReno in Cellular Environments Modeling the Goodput of TCP NewReno in Cellular Environments Sushant Sharma, Donald. Gillies, u-chun Feng Corporate R&D, Qualcomm San Diego, CA Synergy Lab, Virginia Tech Blacksburg, VA Abstract In this

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information