Simulation Analysis of TCP Perforriiance on IEEE Wireless LAN
|
|
- Donald Matthews
- 5 years ago
- Views:
Transcription
1 Simulation Analysis of TCP Perforriiance on IEEE Wireless LAN Yong Peng Haitao Wu Keping Long Shiduan Cheng National Laboratory of Switching Technology & Telecommunication Networks Beijing University of Posts and Telecommunications (BUPT), Beijing, China (100876) Phone: Abstract The TCP protocol is the most frequently used transport layer protocol in the Internet, and it is originally designed, improved and tuned to work efficiently on wired network where the packet loss is vely small. When packet loss is detected, TCP will trigger the congestion recovery algorithms. While in the wireless environment, the bit error rate of a wireless link is much higher arid a wireless connection might be temporally broken not only for the reason of congestion but also due to teniporal link impairment such as shadowing effect or buffer overjlow. So, it is valuable to research the current versions of TCP pe$ormance over a wireless environment. Wireless local area networks (WDW) provide users with high-speed wireless data access to the network and voice capabilities for telephone conversations. In this paper; we focus on the simulation analysis of the TCP performance over the DCF access mode of IEEE W M. 1. Introduction and Motivation With explosive growths in wireless services. and their subscribers, it is natural that supporting user mobility in the Internet is a research focus. The TCP protocol is the most frequently used transport layer protocol in the Internet, so it s valuable to research the current versions of TCP performance over a Wireless environment. But the traditional TCP is designed, improved and tuned to work efficiently on wired network where the packet loss is very small. In the wired network, when TCP detected the packet loss, it will consider that congestion has occurred and trigger the congestion recovery mechanism. While in the wireless environment, it is very possible that packet loss is caused by the high packet loss rate of the down layer. So how the high loss rate of wireless link will affect the TCP performance and how to improve the wireless MAC protocol to enhance the TCP performance remain to be researched. Wireless local area networks (WLAN) provide high bandwidth to users in a limited geographical area. The IEEE is in the process of developing an international WLAN standard identified as IEEE [1]. The IEEE is a standard for a WLAN covering both physical and MAC layers. It describes mandatory support for a I Mbps WLAN with optional support for a 2 Mbps data transmission rate. In this paper, we use the 2 Mbps transmission rate as default. At present, little work has been done to model the queue management mechanisms on TCP performance of IEEE WLAN, and the performance of bi-directional traffic flow (e.g. TCP flow) on the two DCF access modes (RTS/CTS enabled mode and RTS/CTS disabled mode) are also rarely researched, which is our research focus in this paper. To achieve the above research goals, it is necessary to investigate the impact of the critical MAC layer characters on the upper layer. So, we do two scenarios of simulations in this paper. We first use the simple model of two nodes to investigate some key characters of TCP performance over a Wireless LAN. We just use two nodes because we want to get the wireless unreliable aspect of the WLAN s impact on the upper layer, not the access aspect. The purpose of the simulations is to investigate the behavior of the different version TCP on the unreliable WLAN. We also use the buffer management algorithms on the queue (e.g. RED). After that, we do a more complex simulation of 2*N nodes, that is, N communication pairs to test the MAC layer access performance of IEEE DCF mode. Here we assume an error free radio channel because our focus here is the access aspect of WAN S impact on the upper layer protocol. The paper is organized as follows. Section 2 describes some background knowledge of the simulation analysis. Section 3 describes the simulation environment and results of the two scenarios. Section 4 concludes the paper. This work is sponsored by NOHA CHINA R&D CENTER. 5-7 x03= I /S I 0, EEE, 520
2 2. Background 2.1 WEE MAC Protocol The IEEE is a standard for a WLAN covering both physical and MAC layers. It appears to the layers above the MAC layer like any other IEEE 802.X LAN (e.g. Ethernet or Token Ring). Mobility aspects are handled at the MAC level or below. An IEEE WLAN generally consist of Basic Service Sets (BSSs) which are interconnected by a Distribution System (DS) to form an Extended Service Set (ESS) as shown below in figure 1. polls stations giving them the opportunity to transmit. PCF is optional, and its implementation is based on the implementation of DCF. In our simulation, we use the simulation model of ad hoc network. An ad hoc network is a deliberate grouping of stations into a single BSS for the purpose of internetworked communications without the aid of an infrastructure network. The former name of an ad hoc network in the IEEE standard is independent BSS (IBSS). In an ad hoc network, any station can establish a direct communications session with any other station in the BSS, without the requirement of channeling all traffic through a centralized access point (AP). Ad hoc network use the DCF (Distributed Coordination Function) access method support asynchronous data transfer on a best effort basis. 2.2 The Recovery Mechanisms of Different Versions of TCP Figure 1. IEEE Architecture The IEEE MAC protocol offers two types of service to its users: asynchronous and synchronous (or, rather, contention free). These types of services can be provided on top of a variety of physical layers and for different data rates. The asynchronous type of service is always available whereas the contention free is optional. The asynclironous type of service is provided by the Distributed Coordination Function (DO which implements the basis access method of the IEEE MAC protocol. We also call DCF a Carrier Sense Multiple Access with Collision Avoidance (CSMNCA) protocol. When packet is long, it is recommended that the DCF use an RTSKTS handshake before data transmission. RTS and CTS control frames can be used by a station to reserve channel bandwidth prior to the transmission of an MPDU so that bandwidth wasted due to collisions is minimized. RTS and CTS control frames are relatively small (RTS is 20 octets and CTS is 14 octets) when compared to the maximum size data frame (2346 octets). The synchronous type of service is Point Coordination Function (PCF) which mainly implements a polling access method. The PCF uses a Point Coordinator, usually the Access Point, which cyclically TCP is the most frequently used transport layer protocol. To gain better performance in all kinds of environments, people make enhancement on TCP and form many version of TCP. Reno, Newreno arid SACK are different versions of TCP. The main difference between the 3 versions of TCP is the behavior when multiple packets are dropped, which is always occurred in the wireless environment. In TCP Reno, people modified the fast retransmit operation to include Fast Recovery. The new algorithm prevents the communication path from going empty after Fast Retransmit, thereby avoiding the need to Slow-Start to re-fill it after a single packet loss. Reno significantly improves upon the behavior of Tahoe TCP when a single packet is dropped from a window of data, but can suffer from performance problems when multiple packets are dropped from a window of data. The Newreno TCP includes a small change to Reno algorithm at the sender that eliminates Keno s wait for a retransmit timer when multiple packets are lost from a window. In Newreno, partial ACKS received using Fast Recovery are treated as an indication that the packet immediately following the acknowledged packet in the sequence space has been lost, and should be retransmitted. Thus when multiple packets are lost from a single window of data, Newreno can recover without a retransmission timeout. The SACK TCP uses the TCP Extensions for high performance. The congestion control algorithms 521
3 l<eno. implemented in the SACK TCP are a conservative extension of Reno's congestion control. SACK differs from Reno when multiple packets dropped from a window of data. During fast recovery, SACK maintains a variable called pipe that represents the estimated number of packets outstanding in the path. The sender only sends new or retransmitted data when the estimated number of packets in the path is less than congestion window. [3]. 3. Siniulation Results of two nodes topology 3.1 Simulation Goals This report presents an in-depth simulation analysis of the TCP perfonnance on DCF access mode of BEE I MAC protocol. The first simulation scenario is composed of 2 nodes, that is, a single communication pair. We use this scenario to research how the TCP behaviors with the increase of packet discard rate and buffer size. For the wireless link, unlike the wired link, has unstable link character, so the buffer management algorithm will perform differently from the wired environment. The second simulation scenario is composed of 2*N nodes, that is, N communication pairs. We use this scenario to show the effect of RTS/CTS when packet collision is frequent. Although data integrity is a key requirement for data transmission, we assume an error free radio channel in this simulation scenario despite the fact that we are dealing with a very unreliable environment. This is because we are focusing on the multiple access aspects of the IEEE MAC protocol in this simulation part. the two nodes is 200 meters. Packet length is set to 1500 bytes. node 0 node 1 Figure 2. Scenario 1: Two Nodes Scenario Now first, let's have a look on the relationship between the packet discard rate and the throughput in case of no RTSKTS. We can see that even packet discard rate reached 20%, the difference between the 3 TCP versions remain the same. In figure 5, we can see that the congestion window don't drop, even when packet loss rate equals to 20%. So we can conclude that the MAC layer protocol has hidden the high packet loss rate of the wireless layer and the TCP protocol doesn't feel the down layer packet loss. We can also see from figure 3 that the increase of packet discard rate lead to the decrease of throughput, which is caused by the more frequent retransmission of the MAC layer data packets when packet loss rate increases. 3.2 Sirnulation Results of two nodes topology TCP Performance of Two Nodes Model In order to study the TCP performance over a WLAN, we first use the simple model of two nodes. FTP START TLME I 10.0s I FTP STOP TIME 1 so os I TCPWINDOWMAX I 40 1 i TESTED TCP VEKSIONS ~ Newreno. SACK ~ I DISTANCE I 200 m I I PACKETLENGTH bytes I I BUFFER SIZE I 50 (oacket) I I MACACCESSMODE I NORTSKTSDCF I Table 1: Two Nodes Topology Simulation Parameters In order to be more similar to the real communication environment, we use the shadowing model in the following simulation. The distance between Figure 3. Relationship Between The Pncket Discard Rate and Tluoughput Another result of the packet loss is the change of queue length. When packet loss is relatively low, packets usually can be transmitted without retransmission, so queue length is relative low. When packet loss is relatively high, the MAC packet retransmission will prolong the delay of packet. The long RTT (Round Trip Time) will cause the congestion window to increase slowly. So the average queue length will also have the trend of becoming short. In figure 4, when packet discard rate equals to IO%, average queue length reaches ;I climax. In figure 5, we can see the increase of congestion window in different packet discard rate. The more the packet is dropped, the slower the congestion window increases. 522
4 n NewReno 4 sack Figure 4. The effect of packet discard rate on queue length 008- B f t 0.021,,,.,,,,,, IO Buffer Size(packe1) Figure 6 The Effect of Buffer Size on Queue Delay Implementing RED on The Queue As we have seen above, the buffer length parameter affects the performance of Reno TCP much. So we apply some queue management algorithms on the queue and do some simulations in order to see whether those algorithms can improve the performance of WLAN or not. Figure 5. The Reno TCP Congestion Window Shape of Different Packet Discard Rate Scenatio Next, we do some simulations on the effect of buffer size on delay and throughput. With the increase of buffer size, different TCP versions appear little difference when queue delay increase, while appear relatively large difference on throughput. From figure 7 we can see that when buffer size is below or equal to 30, the Newreno and SACK TCP versions are far better than Reno TCP. And the difference between Newreno and SACK TCP is very small. The main difference between the SACK, Reno and Newreno is the behavior when multiple packets are dropped from one window of data. The reason that Reno has bad performance when buffer is small is that multiply packets are dropped in one window data, which is caused by buffer overflow. That causes the congestion window of Reno drop rapidly. 10 Buffer Size(packe1) Figure 7 The Effect of Buffer Size on Throughput 1 MAXDROPPROBARLLITY I I TESTED TCP VERSlON 1 Reno 1 MAC ACCESS MODE WP START TIME ftp STOP TIME PACKET LENGTH NO RTSKTS DCF 1460 bvtes Table 2. Simulation Parameters of Implementing RED on The Queue 523
5 4,10,20,30,40,50,70 ~~~ ~~ 1 From figure 8 we can see that the queue management algorithms don't affect the throughput much. The discard of buffered packet will cause the retransmission of TCP layer. That will lead to the decrease of throughput. While in figure 9 we can see that parameters properly tuned RED will greatly improve the queue delay character.._ o riio 1 RED drop RED drop head below: I NODENUMBtIZ ~ & FTP START TIME loo\ FTTPSTOPTEME a TESTHI TCP VERSION Newieno PACKET LENGTH MAC ACCESS MODE 1 Table 3. Simulation Parameters of Multi-Node Scenario 0.0 Node 0 Node 1 Ouaile iypc Figure 8 Effect of Queue Management on Throughput l'igure 9 Effect of Queue Management on Queue Delay 3.3 Simulation Results of Multi-Node As we know, the node number is an important parameter of a WLAN. With the increase of node number, the collision becomes more frequently. In order to investigate the performance of TCP on wireless LAN in multi-node environment, we now do the following simulation of multi-node. In this scenario, the even number stations are at one spot, while the odd number stations are at another point. The (2*N)th node will setup a FTP connection to the (2*N+l)th node. Because we are focusing on the multiple access aspects of the IEEE MAC protocol in this simulation part, we assume an error free radio channel in this simulation scenario despite the fact that we are dealing with a very unreliable environment. Simulation parameters are listed in table 3 1 Node 2bl-2 Node 2N-L Figure 10 Scenario 2: 2*N Nodes Scenario Throughput and Delay First, let's have a look at the effect of station number on throughput and average delay at the two scenarios of DCF (RTS) and DCF (NO RTS). First of all. the two curves have the same trend of decrease when node number increases. This is caused by the harder contention of MAC layer when node number increases. Second, we can see that when node number exceeds 10, the collision becomes more frequently, and the affect of RTS/CTS begins to be obvious. So we can conclude from the following figure that when packet is far larger lhdn the control frame, RTS/CTS can efficiently minimize the bandwidth wasted due to collision. O j DCF (NO RTS) 0.7!,,,,,,,,,,, I Node Number Figure 11 Throughput Comparison of The 2 MAC 524
6 Algorithms (10 seeds) number is large noRTSMACOelay &RTSMACOelsy ,.,,,.,.,.,.,.,., Nods Nmbrr Figure 13. NO RTS & RTS DCF Fairness (10 seeds) Figure 12. DCF (RTS) & DCF (no RTS) Average Delay Comparison Figure 12 shows the average delay comparison of DCF when RTS/CTS is used and RTS/CTS is disabled. First, we can see that with the increase of mobile nodes, the MAC layer delay increased. That is caused by contention and retransmission. From figure 12, we can also see that the queue delay of RTSKTS enabled DCF is less than the delay of RTS/CTS disabled DCF on the whole. Another conclusion is that the MAC delay of RTS/CTS disabled DCF is slightly longer than that of KTS/CTS enabled DCF. We can conclude that the RTS/CTS mechanism also improved the delay character of Wireless LAN Fairness The RTS algorithm will probably affect the fairness of the different communication pair. So it is necessary that we do some simulation on the fairness of different communication pairs. We use the fairness equation as follows [8]: f denote fairness, f(i) denote the ith communication pair. The following figure shows the comparison of the DCF fairness in case of RTS and NO RTS. The line links the mean value of 10 different seeds simulation results. We can conclude from the figure that with the increase of node number, the fairness of all the communication pairs decreases. We also see that the fairness of RTSlCTS enabled DCF is slightly better than that of RTS/CTS disabled DCF on the whole, especially when node 4. Summary and Conclusions In this paper we first research the case of two nodes scenario. From the simulation result, we can conclude that the IEEE MAC protocol has hidden the packet discard of the lower layer, while the buffer overflow will affect the TCP performance much. In the simulation of RED, we can see that because of the MAC retransmission, the throughput improves very little, while the queue delay improves much. Then we analyzed the simulation results of multi-node. From the result, we can see that the throughput and the delay and throughput characters of RTS/CTS enabled DCF are better than the RTS/CTS disabled DCF. RTS/CTS take effect and minimize the bandwidth wasted by collision when collision of large data packet is frequent. 5. References [I] IEEE , Wireless LAN Medium Access Control (MAC) and Physical (PHY) hyer Specifications, August [2] G. Anastasi and L.Lenzini, QoS provided by the EEE wireless LAN to advanced data applications: a simulation annlysis. Wireless Networks [3] Kevin Fall and Sally Floyd, Simulation-based Comp;iiisons of Tahoe, Reno, and SACK TCP, Coinpurer Cuniimicatiufu Rwirw. vo1.26, no.3, pp.5-21, July 1996 [4] George Xylomenos and Gcorgc C. Polyzos, TCP and UDP Performance over a wireless LAN, feee INI OCOM 99 [5] R. P. Crow, I. Widjaja, I. G. Kim, and P. Sakai, Investigntion OF the IEEE Medium Access Control (MAC) Sublayer Functions, IEEE infocom Y7 [6] Benny Bing, Measured Performance of thc IEEE I Wil-clcss LAN, IEEE Coniputer Society IEEEp [7] Ali Zahedi and Kevin Pahlavan, Capacity of a Wireless I.AN with Voice and Data Services, IEEE Transuctions on Conmiunicnrioiis 48 7 Jul2000 [8] R. Jain. The Art of Coniputer System Perfom~unce Analysis, John Wilwy and Sons,
TCP Congestion Control in Wired and Wireless networks
TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3
Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics
More informationTCP CONGESTION CONTROL PROTOCOLS OVER UMTS WCDMA NETWORK
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 4, Issue 5, Oct 2014, 83-90 TJPRC Pvt. Ltd. TCP CONGESTION
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationFigure.2. Hidden & Exposed node problem
Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv
More informationTransmission Control Protocol. ITS 413 Internet Technologies and Applications
Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion
More informationRevealing the problems with medium access control protocol in multi hop wireless ad hoc networks
Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-9 Wireless Fall 1389 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained
More informationCS321: Computer Networks Congestion Control in TCP
CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationTCP Congestion Control in Wired and Wireless Networks
TCP Congestion Control in Wired and Wireless Networks ENCS 835 Course Project Spring 2008 April 7, 2008 Presented by: Mohamadreza Najiminaini Professor: Ljiljana Trajkovic 4/16/2008 1 Roadmap Introduction
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE
More informationImpact of transmission errors on TCP performance. Outline. Random Errors
Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationRemarks On Per-flow Differentiation In IEEE
Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationPERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE NETWORKS WITH OTHER NETWORKS
PERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE 802.11 NETWORKS WITH OTHER NETWORKS Marek Natkaniec Department of Telecommunications University of Mining and Metallurgy 30-059 Cracow, Poland E-mail: natkanie@kt.agh.edu.pl.
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationQoS issues in Wi-Fi-WMM based triple play home networks
QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr
More informationEffect of Fragmentation in WLAN Systems with Interference Problems
Effect of Fragmentation in WLAN Systems with Interference Problems Shakil Akhtar College of Information Technology UAE University s.akhtar@uaeu.ac.ae Abstract Results from simulation model of an 802.11
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More informationA Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs
A Scheme for Enhancing TCP Fairness and Throughput in IEEE 802.11 WLANs Eun-Jong Lee 1, Hyung-Taig Lim 1, Seung-Joon Seok 2, and Chul-Hee Kang 1 1 Department of Electronics Engineering, Korea University
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationImproving TCP End to End Performance in Wireless LANs with Snoop Protocol
Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationA SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University
A SURVEY OF QOS TECHNIQUES IN 802.11 Drabu, Yasir Department of Computer Science, Kent State University Contents 1. Abstract 2. Introduction 3. Background 3.1. 802.11 Mac Sub layer 3.2. Distributed Coordination
More informationPage 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service
EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationEfficient Power MAC Protocol in Ad-hoc Network s
Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationRLC protocol performance over TCP SACK
PUBLISHED IN: PROCEEDINGS OF THE WIOPT 28, PP. 4 RLC protocol performance over Michael Makidis and George Xylomenos mmakidis5@cs.aueb.gr and xgeorge@aueb.gr Mobile Multimedia Laboratory Athens University
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.
Wireless Intro 15-744: Computer Networking L-9 Wireless TCP on wireless links Wireless MAC Assigned reading [BPSK97] A Comparison of Mechanism for Improving TCP Performance over Wireless Links [BDS+94]
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More information100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms
The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationTransport Layer Protocols TCP
Transport Layer Protocols TCP Gail Hopkins Introduction Features of TCP Packet loss and retransmission Adaptive retransmission Flow control Three way handshake Congestion control 1 Common Networking Issues
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) TCP in Mobile Networks Prof. Chansu Yu http://academic.csuohio.edu/yuc/ c.yu91@csuohio.edu Contents Vinton Cerf and Robert Kahn s paper in 1973 introduces
More informationCross-layer TCP Performance Analysis in IEEE Vehicular Environments
24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationPerformance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2
Performance Analysis of TCP LBA and TCP TAHOE Approaches in 802.11g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2 1 (MTechCSE Student, Chandigarh Engineering College Landran,India) 2 (Associate Professor
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationOn the Performance Characteristics of WLANs: Revisited
On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationCSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012
CSE 473 Introduction to Computer Networks Jon Turner Final Exam Your name here: 12/17/2012 1. (8 points). The figure below shows a network path connecting a server to a client. 200 km 2000 km 2 km X Y
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationMultiple Layer Error Control over Wireless Links
Multiple Layer Error Control over Wireless Links George Xylomenos and Giannis Vasalas Kokkinakis xgeorge@aueb.gr and jvk21gr@gmail.com Mobile Multimedia Laboratory Department of Informatics Athens University
More informationPerformance Analysis for Channel Utilization in Wireless LAN
Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people
More informationFair and Efficient TCP Access in the IEEE Infrastructure Basic Service Set
Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set 1 arxiv:0806.1089v1 [cs.ni] 6 Jun 2008 Feyza Keceli, Inanc Inan, and Ender Ayanoglu Center for Pervasive Communications
More informationTransport Protocols and TCP: Review
Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationFast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission
Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationPerformance Analysis of TCP Variants
102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationIJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network
More informationIntroduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and
High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed
More informationCARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationMaster s Thesis. Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment
Master s Thesis Title Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment Supervisor Professor Hirotaka Nakano Author Masafumi Hashimoto February 15th, 21 Department
More informationTCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1
TCP over Wireless Protocols and Networks Hadassah College Spring 218 Wireless Dr. Martin Land 1 Classic TCP-Reno Ideal operation in-flight segments = cwnd (send cwnd without stopping) Cumulative ACK for
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationMEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS
MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS Harjinder Kaur CSE, GZSCCET, Dabwali Road, Bathinda, Punjab, India, sidhuharryab@gmail.com Gurpreet Singh Abstract CSE, GZSCCET, Dabwali
More informationCIS 632 / EEC 687 Mobile Computing
CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationIntroduction to Protocols
Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These
More informationInfrastructure CSMA/CA Network With Multiple Service Classes
Traffic and QoS Analysis of an Infrastructure CSMA/CA Network With Multiple Service Classes Ritabrata Roy December 13, 2002 Abstract This treatise aims at analysing a CSMS/CA network operating in an access
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationENSC 835: COMMUNICATION NETWORKS
ENSC 835: COMMUNICATION NETWORKS Evaluation of TCP congestion control mechanisms using OPNET simulator Spring 2008 FINAL PROJECT REPORT LAXMI SUBEDI http://www.sfu.ca/~lsa38/project.html lsa38@cs.sfu.ca
More informationTransport Protocols & TCP TCP
Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More information