TCP: Error Handling with Explicit Notification Schemes

Size: px
Start display at page:

Download "TCP: Error Handling with Explicit Notification Schemes"

Transcription

1 TCP: Error Handling with Explicit Notification Schemes Andrei Khurri Department of Computer Science University of Helsinki October 14, 2004 Abstract Wireless networks widely used in Internet nowadays have high error rates. Transmission Control Protocol (TCP) originally designed for wired links needs for improving its performance over wireless links. In other words congestion avoidance approach is not sufficient when packet losses in the wireless networks occur due to corruption. In this paper I describe the schemes namely Explicit Loss Notification Schemes (ELN schemes) or Explicit Transport Error Notification Schemes (ETEN schemes) that allow the transport protocol to distinguish between a loss due to congestion and a loss due to corruption in the wireless networks, yielding performance benefits. Keywords: explicit transport error notification, explicit loss notification, TCP performance, unmodified TCP, wireless networks, corruption, bit error rate.

2 Table of Contents 1. Introduction 3 2. Primary questions and issues 4 3. Explicit Transport Error Notification (ETEN) 5 Types of ETEN 5 Simulation results 8 4. An ELN scheme example using TCP options An ELN scheme example using ICMP protocol Conclusion References 16 2

3 1. Introduction In the recent few years we are witnesses of tremendous evolution in communication technologies including hardware and software as well. This rapid progress has made possible the birth of mobile computing. The popularity of laptop computers, cellular phones and other mobile devices grows day by day. And it is possible to ensure that wireless links will be an integral part of future networks. The increasing role of mobile computing in our life has produced a vast deal of research in this area. It is very important to note that wireless networks, widely used nowadays, have fundamentally different characteristics than wired networks. The low bandwidth, high error rates, burst and time-varying, caused by the noisy environment, are basic features of wireless links. A considerable proportion of papers in this field has devoted to updating Internet s network layer protocol (IP) to achieve the most success in mobile networks and incorporate mobility on network layer. However, not so much researches have introduced the impact of mobility on transport layer protocols, such as Transmission Control Protocol (TCP). And this problem arguably remains less accomplished task than in case with IP. TCP is the widely used transport layer protocol in Internet today. Originally designed for wired networks TCP needs for improving its performance over wireless links. In particular, TCP assumes congestion in the network to be the basic reason for packet losses and unusual delays, and adapts to it. Since the TCP sink sends cumulative acknowledgments (ACKs) for successfully received segments TCP sender identifies the loss of a packet either by the arrival of duplicate cumulative ACKs or by the absence of an ACK for a timeout period. Thus TCP invokes congestion control by reducing its transmission window size and backing off its retransmission timer. This approach reduces the level of congestion on the links and is efficient if corruption losses are infrequent. However, as was mentioned above wireless networks have high bit error rate. So when packets are lost for reason other than congestion, the measures, such as congestion (transmission) window reduction and reset timers, will cause TCP to needlessly reduce its sending rate. That is, non-negligible degradation in TCP performance. Thus in my understanding and according to recent researches in this field the main goal is to improve TCP so that it can differentiate between congestion and corruption losses. In this paper I present the schemes namely Explicit Loss Notification Schemes (ELN schemes) or Explicit Transport Error Notification Schemes (ETEN schemes) that allow the transport protocol to distinguish between a loss due to congestion and a loss due to corruption in the wireless networks, yielding performance benefits. The performance benefits can be realized if TCP can retransmit a packet lost due to corruption without needlessly reducing the transmission rate, while continuing to protect network stability by decreasing the sending rate when loss is caused by network congestion. The rest of the document is structured as follows. Section 2 presents basic questions to be answered in the context of Explicit Notification Schemes. It describes some issues that should be taken into account while using ELN-based methods. In section 3 I will give the classification of ELN schemes according to [2]. The following sections (4 and 5) represent description of existent explicit notification schemes in more details including the simulation results. Such schemes are based on different possibilities to deliver the notification information to the sender so it is interesting to evaluate how they work in these cases. I conclude my presentation in section 6. References are included at the end. 3

4 2. Primary questions and issues The main idea of Explicit Notification Schemes is that we need somehow propagate notification information to TCP sender so that one can use it to make the appropriate decisions in congestion and corruption control. In my understanding the basic questions are: 1. When an Explicit Notification Scheme should start its work? 2. How is it possible? What mechanisms can we use to notify the sender about losses in wireless link? 3. What is response of the TCP sender? What actions does it take on receiving ELN information? 4. What are requirements to the topology of network and its nodes? Is it easy to implement an ELN scheme? It should be noted that a vast deal of research has been proposed in this field. Basically an intermediate node (i.e., base station or router) or end point generates an ELN message or sets an ELN bit to the TCP header when it identifies losses due to corruption in wireless link. To identify corruption errors several possibilities, such as consulting holes list or checking the sequence number of packets or some others, might be used. The second step is to deliver this notification message to the TCP sender. There are various solutions as well. The first one is a new protocol s creation to exchange notification messages, but it might be better to use existing protocols with some extensions for this purpose. For example, we can report information about specific corrupted packets using the Internet Control Message Protocol (ICMP) as has been done in [4]. Cumulative error rates can also be reported using ICMP. The reserved bits in TCP header is the second solution. We can add ETEN information within an IP or TCP option. These methods can be used to mark subsequent packets in a flow to indicate previous losses due to packet corruption in the same flow. An example of using this possibility has been presented in [1]. Another solution is to mark individual packets and pass them along rather than discard them when corruption is detected. When ELN message is delivered to the TCP sender, one has to identify this information. In other words TCP source should either start retransmission of packets lost due to corruption or reduce the sending rate in case of congestion. It is too important to sender be able to react to ELN information in time to achieve performance benefits. Well, since the algorithm is more or less clear let us think about implementation of an ETEN scheme, that is, special issue. Some of these methods require cooperation between layers in network model, instruments to determine the correct source and destination (since the header may be corrupted), and changes in requirements to routers, base stations and hosts. Some schemes also imply many assumptions about network topology. It is not always simply to turn from theoretical assumptions to real life networks. Finally, we should consider results. How large are performance benefits? Did implementation reach peaks that expected? The overhead of network in different terms, such as bandwidth, number of packets, time taken to completion and others, should be taken into account. We also should evaluate, does an ETEN method preserve the semantic of TCP. For example, in the approach of split connection that has been presented by Barke et al. in [7] and Yavatkar et al. in [8], one end-to-end TCP connection is divided into two separate TCP connections. One is over the wired network and the other over the wireless link, with the common base station. The semantic of TCP is violated in this case. Another important issue that related to ETEN mechanisms is network security. Techniques used in ETEN schemes are vulnerable to distributed denial of service (DDOC) attacks because the ETEN messages usually enter or leave their networks. An adversary in this case can launch a DOC attack by bombarding a host (or a network) with ETEN messages that may result in overwhelming 4

5 the capacity of network. DDOC attacks are not specific to ETEN but, for example, ICMP protocol used for delivering notification information is vulnerable to DDOC. However, effects of such attacks are strict and may become congestion collapse of the network since the response to ETEN is a retransmission. In contrast with ECN (Explicit Congestion Notification), when the response is a reduction in the sending rate, faked message can at worst throttle the connection. Other vulnerability is that an adversary can send spurious notifications corresponding to the packets that are not corrupted or were dropped due to congestion. Hence, the sender will either retransmit packets needlessly or bypass congestion avoidance and continue sending at higher rate. To launch this form of attacks attacker must know information about IP address, TCP port and TCP sequence number. It can be obtained by snooping on the network, by initiating session from compromised end-systems, by compromising routers or by hijacking TCP sessions. Another problem arises in interoperability ETEN schemes with existing security mechanisms. A good example is encryption and IPsec. The last one hides TCP port information as well as original source address. Therefore, it can be very difficult for intermediate routers to identify the correct TCP endpoint to which notification information should be delivered. The ETEN security issues mentioned above are touched upon by Krishnan et al. in [2]. In the following sections I will present the possible classification of ETEN mechanisms and some ELN-based schemes in more details. All the questions and issues that were considered above in this section should be taken into account as carefully as possible while analysing and evaluating such ELN-based methods. 3. Explicit transport error notifications 3.1. Types of explicit transport error notifications In my opinion it is important to consider in this section possible categorization in Explicit Notification Schemes field because different mechanisms have dissimilar algorithms and also diverse implementations. There are two types of Explicit Transport Error Notification (ETEN) mechanisms according to [2] that help TCP in distinguishing packets loss due to congestion from ones due to corruption. Per-packet mechanism notifies end points of each detected corruption and cumulative mechanism notifies endpoints of total corruption statistics. Per-packet mechanism in turn can be categorized into three different kinds when ideal knowledge of the IP addresses, TCP ports, and the TCP sequence number corresponding to the corrupted packet are available. The first of these, called Oracle ETEN, is an idealized case that allows instantaneous and perfect notification of errors. The other two schemes, Backward ETEN and Forward ETEN, use ICMPlike signalling to notify hosts of a corruption. Oracle ETEN. Oracle ETEN is a theoretical construct that assumes sufficient knowledge about the corrupted packet (sender and destination IP addresses, sender and destination TCP port numbers, and the TCP sequence number) is available to the intermediate router or the end-system that detects corruption. Furthermore, this mechanism assumes that the source of the flow can be instantaneously notified of the packet corruption. Oracle ETEN provides an upper bound on the performance improvement achievable by ETEN mechanisms that notify the source. While the Oracle ETEN mechanism is impossibility in the real-world, it can be used to distinguish between cases in which some ETEN mechanism would be useful and cases when no ETEN scheme would aid performance [2]. Backward ETEN. The backward ETEN (BETEN) mechanism, illustrated in Figure 1, assumes that the intermediate router can extract or reconstruct sufficient knowledge about the corrupted packet that is required to notify the sender. A BETEN mechanism has been implemented in network simulator where an intermediate node transmits an explicit (ICMP-like) message to the sender upon detecting a corrupted packet. The BETEN mechanism requires less time than Forward ETEN algorithm to notify the sender that a corrupted packet has been detected [2]. 5

6 Figure 1: Backward ETEN Forward ETEN. The forward ETEN mechanism illustrated in Figure 2 also assumes that the intermediate router can extract complete and correct knowledge of the IP addresses, TCP ports, and TCP sequence number corresponding to the corrupted packet. Upon detection of a corrupted packet, the intermediate router transmits a FETEN message to the destination host, which then conveys the information to the sender on a subsequent acknowledgment. If separate messages are generated per corruption loss, it is easy to see that BETEN will lead to faster recovery than FETEN. The benefit of using BETEN is higher if the corruption occurs closer to the sender and it increases with the round-trip delay of the path. Two alternatives that do not require generation of new packets for FETEN exist. With the first alternative, the intermediate node that detects the corrupted packet will wait for a subsequent (uncorrupted) packet from the corresponding flow and piggyback the corruption information on that packet. The other approach is to mark the corrupted packet and pass it along to the destination (subsequent nodes must also forward this packet). The destination in turn will notify the sender of the packet lost due to corruption [2]. Figure 2: Forward ETEN 6

7 Cumulative ETEN. It might be not always possible to accurately retrieve the source and destination IP address, source and destination TCP port numbers, and TCP sequence number from a corrupted packet or link-layer frame. Hence, there is another ETEN mechanism based on cumulative error rates (i.e., average error rates over an interval of time and across various flows). The cumulative ETEN (CETEN) information conveyed to the end-hosts can be in one of several different forms [2]: An absolute bit error rate, byte error rate, or packet error rate observed within a moving window in time. The error rate may be quantized into a small number of steps (for example, high, medium, and low). A relative error rate that simply indicates that the quantized error rate has increased or decreased from the previous value. An estimate of the probability that a packet survives corruption. CETEN information can be delivered to a sender via forward or backward signalling, analogous to a FETEN-based or a BETEN-based strategy. Also, as noted before, CETEN can be piggybacked on data and acknowledgment packets, rather than using additional distinct messages. CETEN information can be collected on a per-hop basis or aggregated over the end-to-end path within the lifetime of a particular flow. It is difficult to collect statistic using CETEN mechanisms for short flows that may have terminated before we obtain a good estimate of the packet corruption probability. The CETEN-based mechanism adds two survival-probability fields (for two directions) which indicate the probability that a packet avoids corruption. The forward path survival probability field is initialized to 1 by the source of the packet. This probability is updated by routers along the path. Therefore, when a packet arrives at the receiver the survival probability in the packet is the survival probability of the path. The transport endpoint at the destination keeps a record of the survival probability of the forward path. When the endpoint generates a packet or an ACK it copies this saved value into the reverse path survival probability, and initializes the forward path survival probability to 1. Using such a mechanism each router would probabilistically transmit a message to the sender of an incoming packet informing the sender of the error rate on the incoming link. After a while the sender will have received information from each router along the path and can calculate the current path error rate. The disadvantage of this mechanism is that it adds traffic to the network and requires the sender to transmit a fairly large amount of traffic to ensure enough path information is collected [2]. Computing the per-link packet corruption survival probability at each router per-link. Each router multiplies the forward path survival probability field in each packet by the router s own estimate of the survival probability for the link on which the packet arrived. The estimate of the survival probability for the link is computed on receiving each packet on the link as follows: pi = α xi + ( 1 α ) pi 1, where x i = 1 if the i th packet is received correctly, and x i = 0 if the i th packet is corrupted. The parameter α is chosen from [0, 1]. The equation outlined above gives us corruption survival probability. An additional pair of packet header fields has been added to carry the congestion survival probability, computed in the same way. Every intermediate node estimates the packet survival probability from congestion (in addition to the probability of surviving corruption). This information gets recorded in subsequent packets traversing the router. At the pcong transport endpoint the loss event is taken as a congestion event with probability. p + p Otherwise, corruption event has probability TCP sender make appropriate decision. p corr pcorr + p cong cong corr. Depending on this final probability the 7

8 3.2. Simulation results To observe how ETEN mechanisms behave in practice let us take a look at some simulations that have been done using ns-2 simulator [6]. The experiment parameter ranges are given in Table 1: Parameter Link capacity Forward link bit error rate Backward link bit error rate Link propagation delay TCP variants ETEN mechanisms MSS Receiver window Router buffers Value 1.5 Mb/s, 10 Mb/s, 100 Mb/s 1.56E E-5 0 or same as forward bit error rate 10 ms, 100 ms, 320 ms Reno, SACK, Westwood None, Oracle ETEN, BETEN 536 bytes 20 segments 50 packets shared FIFO queue Table 1: Experiment Parameter Ranges Consider a single TCP flow with no cross-traffic over a single uncongested link with channel errors that result in packet corruption. Each simulation consists of a bulk TCP flow (FTP application) of 120 seconds duration with unlimited data to send. Figure 3 shows that Oracle ETEN as well as BETEN provide a significant improvement in goodput, particularly at high bit error rates. The performance of BETEN with SACK at low bit error rates is close to Oracle ETEN. However as the BER increases, the chance to loss notifications also increases and the benefits from BETEN start to reduce. Figure 3: TCP with ETEN over an uncongested long fat network (LFN) 8

9 Figure 4: TCP Westwood versus SACK TCP with ETEN As was mentioned above the Oracle ETEN is idealized and impossible in practice case. But it allows making better the comparison between others cases. In the second example of simulations we compare the performance of TCP Westwood when both congestion and corruption losses are present. Figure 4 shows the performance of TCP Westwood and BETEN over a 3-hop linear topology with 1.5 Mb/s links each with a one-way delay of 10 ms. The plot shows that BETEN with SACK outperforms TCP Westwood at a BER of 10E-5 regardless of congestion level. In addition, the plot shows that when no competing flows are present TCP SACK performs similar to or better than TCP Westwood. When using 4 competing flows TCP Westwood outperforms stock SACK TCP (except at a BER of 10E-5). Figure 5 illustrates the TCP Reno performance with and without CETEN over a 3-hop topology of 100 Mb/s links each with a one-way delay 100 ms in the presence of UDP cross traffic. The bit error rate of each link in the topology is varied according to Table 1. The traffic generators use an exponential on-off model with mean burst and mean idle time, set to 500 ms. The plot shows that under some heavy BERs (e.g., 10E-6) ETEN with TCP Reno performs better than standard TCP Reno. However, at the highest BER tested (1.56E-5) CETEN offers roughly the same performance as stock TCP Reno under all congestion levels. Further, under low BERs CETEN performance is roughly the same as stock TCP Reno, except under heavy congestion (4 UDP flows), in which case CETEN with TCP Reno performs slightly worse than TCP Reno alone. Making conclusions from these figures we can say that TCP with an ETEN significantly outperforms unmodified TCP only at high bit error rates, such as BER of 10E-5. This case raises no doubt. But in practice we often have bit error rates that are lowered by using for example link-level FEC (Forward Error Correction). In this situation we should think about expediency of using ETEN. The Figure 3 also shows that TCP SACK outperforms TCP Reno. It could be most probably because of the best ability of SACK to correct multiple losses. Figure 5 shows that in some situations CETEN offers worse performance than TCP Reno so additional investigations are required in this area. 9

10 Figure 5: CETEN Performance with TCP Reno and UDP cross traffic 4. An ELN scheme example using TCP options In this section I will consider how explicit loss notifications can be used for improving TCP performance in wireless link when a mobile host is the TCP sender and Snoop agent is using at the base station that divide a wireless link and a wired network. A situation seems to be very typical. This scheme is provided by [1]. A representative topology is shown on the Figure 6. Figure 6: Topology for data transfer from a mobile host 10

11 Suppose we need to transmit data packets from mobile host to the fixed receiver through a cellular wireless link. In this case if the receiver or a base station knows for sure that the loss of a segment was not due to congestion, it sets the ELN (Explicit Loss Notification) bit in the TCP header and propagate it to the source. It should be noted that in this case an ELN message is sent as part of the same connection (and not in a separate way, using ICMP for instance). The snoop agent running at the base station monitors all TCP segments that arrive over the wireless link. It does not cache any TCP segments but keeps track of holes in the sequence space as it receives data segments, where a hole is a missing interval in the sequence space. These holes correspond to segments that have been lost over the wireless link. However, the packet can be lost due to congestion at the base station. To avoid against wrongly marking a congestion hole as having been due to a wireless loss, the agent only adds a hole to the list of holes when the number of packets queued on the base station's input interface is not close to the maximum queue length. When ACKs, especially duplicate ACKs, arrive from the receiver, the agent at the base station checks its list of holes. It sets the ELN bit on the ACK if it corresponds to a segment in the list before forwarding it to the data sender. It also cleans up all holes with sequence numbers smaller than the current ACK, since they correspond to segments that have been successfully received by the receiver. When the sender receives an ACK with ELN information in it, it retransmits the next segment, but does not take any congestion control actions and reduces transmission rate. The sender also makes sure that each segment is retransmitted at most once during the course of a single round-trip, as the snoop agent would flag an ELN for each duplicate ACK following a loss [1]. Several experiments have been performed to measure the performance of data transfer from the MH to the FH using TCP Reno with and without ELN across a range of exponentiallydistributed bit-error rates. In Figure 7 we can see significant performance benefits of using the snoop protocol coupled with the ELN mechanism in this situation. These measurements were made for wide-area transfers between UC Berkeley and IBM Watson, across one wireless WaveLAN hop and 16 Internet hops. The performance improvement due to ELN at high error rates is roughly a factor of 2. The main advantage of ELN is that it helps maintain a large TCP congestion window even when wireless error rates are high, reacting only to congestion [1]. Figure 7: Throughput of TCP Reno and Reno enhanced with ELN across a range of exponentially distributed bit-error rates for transfer from a mobile host [1] 11

12 To make certain of independence of location a wireless link in the network path to reach performance gains using ELN-based scheme let s briefly consider the case of cellular wireless transit links that shown in the Figure 8. The TCP ACKs traverse the same base stations as the data packets on the forward path. Suppose a loss happened due to corruption over the wireless link. In this case, the agent at base station A would have seen the packet, while B would not, so the packet gets added to B's list of holes using the same algorithms. When duplicate ACKs arrive for the missing packet at B, its agent sets the ELN information bit and propagates it towards A. Since A originally saw the packet (it is not in its list of holes), it infers that the packet was obviously lost over the wireless link and simply lets the ACK go through to the data sender with the ELN information set on it. Of course, it is possible to deploy a snoop agent that caches and locally retransmits packets at A in this topology. In this case, the agent also suppresses duplicate ACKs for corrupted packets, as described earlier. It is important to note that local retransmissions from the snoop agent at A now happen only upon duplicate ACKs with ELN set. Now suppose that the packet was lost due to congestion elsewhere on the path. If it was lost before A, then the agent at A, upon seeing an ELN ACK via B, resets this bit because this packet did not reach A to start with. The sender now reacts to this loss in the conventional way and performs congestion control. Similarly, if the packet was lost due to congestion after B, no agent in the network sets the ELN information on any duplicate ACK, leading to correct congestion control. It is easy to see how this approach generalizes to the case when there is more than one single-hop wireless link on the path [1]. Figure 8: Topology for data transfer over a cellular wireless transit link 12

13 5. An ELN scheme example using ICMP protocol In section above I described an ELN scheme that used unreserved bits in TCP header to propagate notification information to the TCP sender. Another possibility is to use existent protocol for carrying control information in the networks, namely Internet Control Message Protocol (ICMP). Goel and Sanghi in [4] proposed two types of ICMP messages called ICMP-DEFER and ICMP- RETRANSMIT. The network topology implies transmitting data from a fixed host to mobile TCP sink through a base station, that is, the last hop wireless link. Two schemes have been proposed by authors, simple and refined. The first one uses only ICMP-DEFER message and has disadvantage basically due to high loss detection latency. That may become more intelligible while describing the refined scheme [4]: 1. If transmission the packet on the wireless side is not successful the base station generates an ICMP-DEFER message. So within one round trip time TCP source will receive either an acknowledgement for the packet or an ICMP message. In that case end-to-end retransmissions do not start. However, link-layer retransmissions may be going on. The control information that consists of TCP and IP headers is enough for TCP sender to decide which particular packet was lost on wireless link. The overhead on the network seems to be minimal since ICMP-messages are not retransmitted. 2. On receiving an ICMP-DEFER message, TCP postpones the retransmission timer if it is active for the lost segment indicated in this control message. It helps to avoid possible conflicts between the local retransmissions at the base station and end-to-end retransmissions. Since the local retransmissions might fail acknowledgement for this packet may be delayed. In assumption done in [4] one RTO time (minimum value 1 second) is seemed to be sufficient to exhaust all local retransmission attempts for a packet. But here can be also seen a problem with Simple scheme. Actually TCP source that receives ICMP-DEFER messages knows only about possible losses due to noise, but it has no way to find out if multiple segments were discarded by the base station. Without this information, TCP has to set retransmit timer for multiple losses detection many times. So the loss detection latency might be very high. To avoid this kind of problem we have Refined Scheme that operates also with ICMP-RETRANSMIT messages. 3. When all the local retransmission attempts for a packet have been exhausted the base station generates an ICMP-RETRANSMIT message and sends it to the TCP source. The one in its turn on receiving this type of message retransmits the segment indicated. It also stores the information that the ICMP-RETRANSMIT message was received for this segment. 4. An ICMP-RETRANSMIT message indicates that one segment was lost from the chain of segments sent by the source TCP. When the destination receives subsequent packets, it generates duplicate acknowledgments. When the source TCP receives the first of such duplicate acknowledgments, it switches to fast recovery algorithm. It discards the information that it received an ICMP-RETRANSMIT message for this segment. When it finally receives a new acknowledgement, it comes out of the fast recovery algorithm and resets cwnd to the value prior to its entering the fast recovery phase. When source TCP suffers a retransmit timeout, it follows normal TCP algorithms. When source TCP receives duplicate acknowledgments for a segment for which it has not received ICMP-RETRANSMIT message earlier, it follows normal TCP algorithms. This scheme works on networks with a wireless link anywhere in the network path (and not necessarily the last hop) [4]. To evaluate the performance benefits of this notification scheme over unmodified TCP some simulation results [4] will be presented below. The parameters that were used are given in Table 2. 13

14 Parameters Wired link Bandwidth Propagation delay Loss Probability Error characteristics of wireless link: *GOOD state - mean value of exponential distribution - loss probability *BAD state - mean value of exponential distribution - loss probability Receiver s advertised window size Value 8 Mbps 50 ms 0 (reliable) 5 seconds 0 (reliable) 0.1 to 0.5 second 1 4 to 64 KB Table 2: Parameter values used in simulations As you can see from Figures 9-10, the Refined Scheme performs better than Simple Scheme for all values of window size. The performance of Simple scheme is worse than Unmodified TCP, especially at higher values of mean_bad_state. The reason of this is that when the duration of BAD state increases, the possibility of multiple losses increases as well. As was discussed earlier, this is the important weakness of Simple Scheme. Figure 9: Propagation delay of wired link: 50 ms and mean_bad_state: 0.3 sec. Finally, it would be very important to summarize the advantages of ICMP-based Refined Scheme [4]: There are significant performance gains while using modified TCP with ICMP based scheme over wireless links. Very low overhead of the scheme. It peaked during simulation at 5 % in terms of number of packets, but mostly remained less than 1 %. Since ICMP packets are very small, the overhead in terms of bandwidth was much lower. The host which does not implement the new message types purely discards it. Refined Scheme saves semantics of TCP. The scheme is symmetric. The generation of ICMP messages is triggered by the link layer for the wireless link. When a mobile host is the TCP source, ICMP messages will be triggered by the link layer of the mobile host, that is, no special case. No assumptions about the location of the wireless link in the network path. 14

15 Figure 10: Propagation delay of wired link: 50 ms and mean_bad_state: 0.5 sec. 6. Conclusion Originally designed for wired networks TCP needs to improve its performance over wireless links. Since mobile networks have high bit error rates the congestion avoidance approach is not efficient in that case. To make correct decision TCP sender has to be able to differentiate between congestion and corruption losses. Otherwise, when packets are lost for reason other than congestion, the measures, such as sending rate reduction and reset timers, will be the reason of TCP performance degradation. In this paper I presented Explicit Loss Notification Schemes (ELN schemes) or called by some authors Explicit Transport Error Notification Schemes (ETEN schemes) that allow the transport protocol to distinguish between a loss due to congestion and a loss due to corruption in the wireless networks, yielding performance benefit. The performance benefit can be realized if TCP can retransmit a packet lost due to corruption without needlessly reducing the transmission rate, while continuing to protect network stability by decreasing the sending rate when loss is caused by network congestion. In most of cases the simulation results show that use of TCP with ELN-based schemes causes significant performance gains over unmodified TCP. However, there is still a deal of unsettled questions related to implementations of ELN schemes in real networks. As simulation results showed, additional investigations are needed in CETEN-based schemes. Some methods require changes in work of network nodes and adding functionality to it. Sometime this measures violate algorithm s symmetry and semantic of TCP and increase overhead of network as well. I think it is needed a few years to start wide using of ELN schemes in real-life world because many of these algorithms are implemented to date only in simulators. There is also another research issue that requires careful consideration, such as security. All these questions represent very important and tremendous fields for future work. 15

16 7. References 1. H. Bal Krishnan and R. H. Katz, "Explicit Loss Notification and Wireless Web Performance," Proc. of IEEE GLOBECOM, November R. Krishnan, J.P.G. Sterbenz, W.M. Eddy, C. Partridge and M. Allman "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks," BBN Technical Report No. 8333, BBN Technologies, February, Revised version published in Computer Networks, Vol 46, Issue 3, October J. A. Cobb and P. Agrawal, "Congestion or corruption? a strategy for efficient wireless TCP sessions," in IEEE Symposium on Computers and Communications, Alexandria, Egypt, pp , S. Goel and D. Sanghi "Improving TCP Performance over Wireless Links," In Proceedings of TENCON'98, pages IEEE, December K. Chandran, S.Raghunathan, S.Venkatesan, and R.Prakash, "A feedback based scheme for improvingd TCP performance in ad-hoc wireless networks," Tech. Rep., Computer Science, University of Texas-Dallas, October Also published in ICDCS' ns-2 simulator, 7. A. Bakre and B.R. Badrinath. I-TCP: Indirect TCP for mobile hosts. In Proc. 15 th International Conference on Distributed Computing Systems (ICDCS), May R. Yavatkar and N. Bhagwat. Improving end-to-end performance of TCP over mobile internetworks. In Mobile 94 Workshop on Mobile Computing Systems and Applications, December

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Wenqing Ding and Abbas Jamalipour School of Electrical and Information Engineering The University of Sydney Sydney

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical

More information

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo

More information

Wireless Heterogeneity. EEC173B/ECS152C, Spring 09. Data Transport Over Wireless. Wireless Performance. Reliable Data Transport over Wireless Networks

Wireless Heterogeneity. EEC173B/ECS152C, Spring 09. Data Transport Over Wireless. Wireless Performance. Reliable Data Transport over Wireless Networks EEC73B/ECSC, Spring 9 Reliable Data over Wireless s Problems with TCP Snoop Protocol Metricom Ricochet Wireless Heterogeneity Lucent WaveLAN Regional-Area Metro-Area Cellular Digital IBM Infrared Packet

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks University of Massachusetts Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2002 Explicit Transport Error Notification (ETEN) for Error-Prone

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS NETWORKS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2015 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data layer Physical layer service

More information

A Comparison of Mechanisms for Improving TCP Performance over Wireless Links

A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Appeared in IEEE/ACM Transactions on Networking, Dec.1997. This is a much-extended and revised version of a paper that appeared at ACM SIGCOMM, 1996. A Comparison of Mechanisms for Improving TCP Performance

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

TCP OVER AD HOC NETWORK

TCP OVER AD HOC NETWORK TCP OVER AD HOC NETWORK Special course on data communications and networks Zahed Iqbal (ziqbal@cc.hut.fi) Agenda Introduction Versions of TCP TCP in wireless network TCP in Ad Hoc network Conclusion References

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002

CS 268: Wireless Transport Protocols. Kevin Lai Feb 13, 2002 CS 268: Wireless Transport Protocols Kevin Lai Feb 13, 2002 Motivation! Wireless connectivity proliferating - Satellite, line-of-sight microwave, line-of-sight laser, cellular data (CDMA, GPRS, 3G), wireless

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

TCP over wireless links

TCP over wireless links CSc 450/550 Computer Communications & Networks TCP over wireless links Jianping Pan (stand-in for Dr. Wu) 1/31/06 CSc 450/550 1 TCP over wireless links TCP a quick review on how TCP works Wireless links

More information

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska

More information

Channel Quality Based Adaptation of TCP with Loss Discrimination

Channel Quality Based Adaptation of TCP with Loss Discrimination Channel Quality Based Adaptation of TCP with Loss Discrimination Yaling Yang, Honghai Zhang, Robin Kravets University of Illinois-Urbana Champaign Abstract TCP responds to all losses by invoking congestion

More information

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area

Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Does current Internet Transport work over Wireless? Reviewing the status of IETF work in this area Sally Floyd March 2, 2000 IAB Workshop on Wireless Internetworking 1 Observations: Transport protocols

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Fast Retransmit Problem: coarsegrain TCP timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Sender Receiver

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Advanced Computer Networks. Wireless TCP

Advanced Computer Networks. Wireless TCP Advanced Computer Networks 263 3501 00 Wireless TCP Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Outline Last week: Today: Cellular Networks Mobile IP Wireless

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence

Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence Chunlei Liu Lucent Technologies E Broad St, Columbus, OH 33 liu.3@osu.edu Raj Jain Department of Computer and Information

More information

TCP Enhancement Using Active Network Based Proxy Transport Service

TCP Enhancement Using Active Network Based Proxy Transport Service TCP Enhancement Using Active Network Based Proxy Transport Service Siddharth Patil and Mohan Kumar Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington TX 76019,

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2000 NETWORKS

PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2000 NETWORKS PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2 NETWORKS Sang-Hee Lee +, Hong-gu Ahn +, Jae-Sung Lim +, Seung-Hwan Kwak ++, Sung Kim ++ The Graduate School of Information and Communication,

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts

F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts F-RTO: An Enhanced Recovery Algorithm for TCP Retransmission Timeouts Pasi Sarolahti Nokia Research Center pasi.sarolahti@nokia.com Markku Kojo, Kimmo Raatikainen University of Helsinki Department of Computer

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS. A Thesis NAUZAD ERACH SADRY

DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS. A Thesis NAUZAD ERACH SADRY DELAYED RESPONSE PROTOCOLS FOR HIGH-DELAY WIRELESS NETWORKS A Thesis by NAUZAD ERACH SADRY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements

More information

THE increasing popularity of wireless networks indicates

THE increasing popularity of wireless networks indicates 756 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Hari Balakrishnan, Student Member, IEEE, Venkata N. Padmanabhan,

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM Nayeema Islam and Mohammed Nasir Uddin Department of Computer Science and Engineering, Jagannath University, Dhaka, Bangladesh

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

under grant CNS This work was supported in part by the National Science Foundation (NSF)

under grant CNS This work was supported in part by the National Science Foundation (NSF) Coordinated Multi-Layer Loss Recovery in TCP over Optical Burst-Switched (OBS) Networks Rajesh RC Bikram, Neal Charbonneau, and Vinod M. Vokkarane Department of Computer and Information Science, University

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1 In ACM Wireless Networks Journal (WINET), 1(4), December 1995. Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks 1 Hari Balakrishnan, Srinivasan Seshan, and Randy H. Katz

More information

The TCP SACK-Aware Snoop Protocol for TCP over Wireless Networks

The TCP SACK-Aware Snoop Protocol for TCP over Wireless Networks The TCP SACK-Aware Snoop Protocol for TCP over Wireless Networks Sarma Vangala and Miguel A. Labrador Department of Computer Science and Engineering University of South Florida Tampa, Florida 3362 Email:

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

On Inter-layer Assumptions

On Inter-layer Assumptions On Inter-layer Assumptions (A View from the Transport Area) Mark Handley ACIRI/ICSI mjh@aciri.org Ping The Internet Hourglass FTP HTTP NNTP SMTP NFS DNS Applications TCP UDP ICMP IP 802.x PPP SLIP RS232

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?

More information

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.

Direct Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc. Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested

More information

The Transport Layer Congestion control in TCP

The Transport Layer Congestion control in TCP CPSC 360 Network Programming The Transport Layer Congestion control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Wireless and Mobile Internet

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Wireless and Mobile Internet Mobile Wireless Networking The University of Kansas EECS 882 Wireless and Mobile Internet James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance

EECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD Overview 15-441 Computer Networking Lecture 9 More TCP & Congestion Control TCP congestion control TCP modern loss recovery TCP modeling Lecture 9: 09-25-2002 2 TCP Congestion Control Changes to TCP motivated

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

CSCI Topics: Internet Programming Fall 2008

CSCI Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Transport Layer Derek Leonard Hendrix College October 20, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 3: Roadmap 3.1 Transport-layer

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

Understanding TCP Parallelization. Qiang Fu. TCP Performance Issues TCP Enhancements TCP Parallelization (research areas of interest)

Understanding TCP Parallelization. Qiang Fu. TCP Performance Issues TCP Enhancements TCP Parallelization (research areas of interest) Understanding TCP Parallelization Qiang Fu qfu@swin.edu.au Outline TCP Performance Issues TCP Enhancements TCP Parallelization (research areas of interest) Related Approaches TCP Parallelization vs. Single

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

ATL : An Adaptive Transport Layer Protocol Suite for Next Generation Wireless Internet

ATL : An Adaptive Transport Layer Protocol Suite for Next Generation Wireless Internet ATL : An Adaptive Transport Layer Protocol Suite for Next Generation Wireless Internet O. B. Akan and F. Akyildiz IEEE Trans. On Selected Areas in Communications, vol. 22, no. 5, 2004 First paper deals

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Lecture 16: Wireless Networks

Lecture 16: Wireless Networks &6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,

More information