ENHANCEMENT OF TCP FAIRNESS IN IEEE NETWORKS

Similar documents
Adaptive Buffer size routing for Wireless Sensor Networks

Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for Based Wireless Networks

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

Faculty Of Computer Sc. & Information Technology (FSKTM)

TCP Fairness in e WLANs

Buffer Sizing for Based Networks

EBDP BUFFER SIZING STRATEGY BASED WLANS

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Analyzing the Receiver Window Modification Scheme of TCP Queues

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

TCP ACK Congestion Control and Filtering for Fairness Provision in the Uplink of IEEE Infrastructure Basic Service Set

Master s Thesis. Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment

Unit 2 Packet Switching Networks - II

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Study of the TCP Upstream/Downstream Unfairness Issue with Per-flow Queueing over Infrastructure-mode WLANs

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Lecture 14: Congestion Control"

Congestion Control 3/16/09

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

II. Principles of Computer Communications Network and Transport Layer

Fairness in the IEEE network. Shun Y. Cheung

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Experimental Evaluation of TCP Performance and Fairness in an e Test-bed

Introduction and Scope of Research

CSE 461: Multiple Access Networks. This Lecture

Research Article Size-Based and Direction-Based TCP Fairness Issues in IEEE WLANs

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

Congestion Control and Resource Allocation

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

ETSN01 Exam Solutions

Impact of IEEE n Operation on IEEE Operation

ICE 1332/0715 Mobile Computing (Summer, 2008)

CS 268: Computer Networking

Chapter 24 Congestion Control and Quality of Service 24.1

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions.

CS Transport. Outline. Window Flow Control. Window Flow Control

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet

TCP and UDP Fairness in Vehicular Ad hoc Networks

UNIT 2 TRANSPORT LAYER

Class-based Packet Scheduling Policies for Bluetooth

CS268: Beyond TCP Congestion Control

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS551 Router Queue Management

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang

Lecture 14: Congestion Control"

Wireless Networked Systems

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren

A Frame Aggregation Scheduler for IEEE n

CS321: Computer Networks Congestion Control in TCP

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

Network Layer Enhancements

Routing, Routers, Switching Fabrics

ADVANCED COMPUTER NETWORKS

Wireless LANs. ITS 413 Internet Technologies and Applications

CSCI Spring Final Exam Solution

Setting the Parameters Right for Two-hop IEEE e Ad Hoc Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Congestion control in TCP

An Efficient Scheduling Scheme for High Speed IEEE WLANs

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

Fairness Provision in the IEEE e. Infrastructure Basic Service Set

Computer Networking. Queue Management and Quality of Service (QOS)

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS

TCP Congestion Control

Performance Analysis of WLANs Under Sporadic Traffic

Performance anomaly of b

SIMULATION FRAMEWORK MODELING

Class-Based Weighted Window for TCP Fairness in WLANs

Data Communications. Automatic Repeat Request Medium Access Control

Fair and Efficient TCP Access in the IEEE Infrastructure Basic Service Set

Router s Queue Management

Department of Electrical and Computer Systems Engineering

Collision Probability in Saturated IEEE Networks

There are 10 questions in total. Please write your SID on each page.

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 802.3x Flow Control

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

Wireless TCP Performance Issues

Rahman 1. Application

Congestion Control. Resource allocation and congestion control problem

Flow Control. Flow control problem. Other considerations. Where?

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Transport layer issues

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

A Finite State Model for IEEE Wireless LAN MAC DCF

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Transcription:

ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS Bhuvana LN 1, Divya PD 2 and Divya A 3 Department of Information Technology, Easwari Engineering College, Affiliated to Anna University, Chennai 1 bhuvana.n21@gmail.com 2 div.pd91@gmail.com 3 divi_cool8@yahoo.com ABSTRACT The usage of fixed buffers in 802.11 networks has a number of disadvantages associated with it. This includes high delay, reduced throughput and inefficient channel utilisation. To overcome this, a dynamic buffer sizing algorithm, the A* algorithm has been implemented at the access point. In this algorithm buffer size is dynamically adjusted depending upon the current channel conditions and hence delay is reduced and the throughput is maintained. But in 802.11 networks with DCF collision avoidance mechanism, it creates significant amount of unfairness between the upstream and downstream TCP flows, with clusters of upstream ACKs blocking downstream data at the access point. Thus a variation of the Explicit Window Adaptation (EWA) scheme has been used to regulate the queuing time of the upload clients by calculating the feedback value at the access point. This creates fairness and increases the number of transmission opportunities for the downstream traffic. KEYWORDS Wireless LANs(WLANs), Medium access control (MAC), Transmission control protocol (TCP), Dynamic Buffer sizing, Explicit Window Adaptation(EWA). 1. INTRODUCTION In computer networks, buffers are generally used to store short term packet bursts thereby reducing packet drops and maintaining high link efficiency. Packets are also queued in buffers when the network device lacks the ability to process all the packets immediately. There are two queuing disciplines namely First In First Out/First Come First Serve (FIFO/FCFS) that can be used by the buffer to queue the packets. In FIFO, the first packet that arrives at the buffer of a network device say for example access point, will be the first packet to be transmitted. When the number of packets exceeds the buffer size the packet at the tail is dropped. This dropping policy is called the tail drop policy. The main disadvantage of FIFO is that it does not discriminate between different traffic sources. It thus led to the introduction of Fair Queuing technique. In this a separate queue is maintained for each flow currently handled by the network device. The network device services these queues in a round robin fashion. Overflowing packets belonging to each queue are discarded. An enhancement of Fair Queuing technique is the Weighted Fair Queue, which assigns a weight to each queue serviced by the network device. The weight defines the number of bits to transmit each time the device services the queue which in turn affects the percentage of links bandwidth the queue will get. The general rule for sizing Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 357 365, 2012. CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2335

358 Computer Science & Information Technology ( CS & IT ) buffers is to set the buffer size to be the product of bandwidth and delay of the flows utilizing the link. This rule is known as the Bandwidth-Delay Product (BDP) rule. When fixed buffers are used in 802.11 networks it leads to undesirable channel utilization and high delay. The use of dynamic buffer increases the throughput and reduces the delay. In contrast to wired networks the transmission in wireless networks are broadcast in nature. Thus the buffering requirement at each station depends upon the number of active station in wireless LAN. In dynamic buffer sizing techniques the size of buffers is changed to adapt to the changing conditions of the network. The A* algorithm which is a combination of ebdp and Adaptive Limit Tuning Feedback algorithms (covered in the later sections) is used to change the size of buffers dynamically. While the A* algorithm decreases delay and maintains the throughput as achieved by the use of fixed buffers there is a disadvantage associated with this algorithm. The A* algorithm creates significant amount of unfairness between the upstream and downstream TCP flows. The upstream flow gets a greater share of the links available bandwidth when compared to the downstream flow which gets a very small percentage of the total available bandwidth. In our project a variation of the Explicit Window Adaptation (EWA) scheme which modifies the Advertised Receiver Window field value of ACK packets at the Access Point is used to create fairness among the different flows. 2. IEEE 802.11 MAC ALGORITHM The Medium Access Control (MAC) Algorithm used by the 802.11 networks is the Distributed Coordination Function (DCF) which is a CSMA/CA based algorithm. According to DCF, when the wireless medium is idle for DIFS (Distributed Inter Frame Spacing) time period, each station initializes a back off counter to a random number selected uniformly between 0 and CW-1 where CW is the Contention Window size. The time period is slotted and the back off counter is decremented each slot the medium is idle. If the medium is detected as busy the countdown halts and the countdown resumes only when the medium is idle again for DIFS time period. When the counter reaches zero a station transmits packet. If collision occurs the size of Contention Window is doubled and the process gets repeated. When the transmission is successful CW is reduced to CW min and a new countdown is started. 3. EMULATING BDP ALGORITHM In wireless network a fixed value of BDP does not exist because the mean service time is time varying in nature. The service time of each station is measured by observing the time between the arrival of the packet at the network interface queue t s and the successful transmission of packet t e. On averaging the packet service time of all stations the mean packet service time T serv is obtained. The ebdp algorithm works as follows. The maximum queuing delay T max is defined. 1/T serv indicates the mean service rate. The buffer size is given as Q ebdp = min (T max /T serv, Q ebdp max) where Q ebdp max is the maximum buffer size. For every packet that arrives into the queue the value of Q ebdp is calculated. If the queue occupancy is less than Q ebdp the packet is put into queue else it is dropped. For every outgoing packet the end service time t e is recorded as the time at which the MAC ACK arrives for the packet and the service time for each packet is calculated as T serv = (1- W)T serv + W(t e -t s ) where W is the averaging parameter. 4. ADAPTIVE LIMIT TUNING FEEDBACK ALGORITHM To maintain high link efficiency a station must have a packet to transmit whenever it wins a transmission opportunity. Thus the time for which the station buffer is empty should be minimised which can be achieved by maintaining the buffer size sufficiently large. But the use of large buffers can lead to high queuing delays. Thus to ensure low delay the buffer size should be

Computer Science & Information Technology ( CS & IT ) 359 as small as possible. Thus the smallest buffer size that ensure high link utilisation should be selected for operation. The following approach is used to ensure effective link utilisation. If the buffer rarely empties the buffer size is decreased. On the contrary if the buffer remains empty for a long period the buffer size is increased. DATA TRANSFER FROM SERVER TO DOWNLOAD CLIENTS THROUGH ACCESSPOINT FIFO QUEUEING OF PACKETS IN ACCESS POINT Input ts,te MEASURE SERVICE TIME AND IDLE BUSY TIME Input QeBDP,qALT ANALYSE PERFORMANCE IN PRESENCE OF UPLOADS Input Ru/Rd DCF INCLUDED IN ABOVE SCENARIO SET OPTIMAL BUFFER (QUEUE) SIZE INSTABILITY WITH MORE THAN 2 UPLOADS NOTED Input feedback value FAIRNESS ENHANCED BY USING EWA(EXPLICIT WINDOW ADAPTATION) VARIATION Figure 1: The above figure shows the overall functioning of the wireless network system. In this algorithm a queue occupancy threshold q thr is defined. The amount of time the queue spends below this threshold and amount of time the queue spends above this threshold are observed as t i (k) and t b (k) respectively where t i (k) indicates the idle period and t b (k) the busy period. The time period t= t i (k)+t b (k). The minimum link utilisation is given by t b /(t b +t i ) and q(k) denotes the buffer size at the k th observation interval. The buffer size is updated as q(k+1)=q(k)+a 1 t i (k)-b 1 t b (k) where a 1 and b 1 are the design parameters. If a 1 t i (k)=b 1 t b (k) the buffer size remains unchanged, if the idle time is larger i.e. a 1 t i (k)>b 1 t b (k) the buffer size is increased and if the busy time is larger i.e. a 1 t i (k)<b 1 t i (k) the buffer size is decreased. The maximum buffer size is denoted as q max and the minimum buffer size is given as q min. For every time period t, the idle period is calculated and q ALT is measured as q ALT +a 1 t i -b 1 (t-t i ) and this value is updated as q ALT = min(max(q ALT,q min ),q max ). 5. THE A* ALGORITHM The A* algorithm is a hybrid algorithm that uses the mean service time to calculate Q ebdp in the ebdp algorithm and uses the idle/busy time to calculate the value of q ALT in ALT algorithm and sets the buffer size at access point as min(q ebdp,q ALT ). When the channel condition changes the service time measured from ebdp algorithm is used to adjust the buffer size accordingly. It then uses the ALT algorithm to set the buffer size more accurately.

360 Computer Science & Information Technology ( CS & IT ) Fixed Buffer A* Algorithm Figure2: Illustrates simulation graph obtained for Buffer Occupancy (pkts) vs Buffer Size (pkts) for 5 downloads in case of fixed buffers and A* algorithm. Fixed Buffer A* Algorithm Figure3: Illustrates simulation graph obtained for Delay(RTT) (ms) vs Buffer Size (pkts) for 5 downloads in case of fixed buffers and A* algorithm. Figure 4: Represents RTT (ms) vs Number of Uploads with A* algorithm. 6. UNFAIRNESS BETWEEN N UPSTREAM AND DOWNSTREAM TCP F FLOWS Consider a WLAN networks made up of n client stations. The client stations carry one upload flow each. The access point of the WLAN is responsible for transmitting the ACK packets back to the client. But these ACK may be dropped because of the equal access nature of WLAN, since the data packets get n/(n+1) share of transmission opportunities whereas the ACK packets that

Computer Science & Information Technology ( CS & IT ) 361 represent the downstream traffic gets only 1/(n+1) share. This creates significant amount of unfairness between the upstream and downstream TCP flows. 7. UNDERSTANDING TCP FAIRNESS IN 802.11 NETWORK In WLANs the mobile host (sender/receiver) access the network through the access point (AP). IEEE 802.11 ensures equal access to the media for all host. If there is one sender and remaining are receivers, the access point and sender gets equal access to the medium and i.e. the sender gets half of the total available bandwidth and the remaining half of the bandwidth is used by the access point. The bandwidth available for the access point is shared equally by all receivers. The equal access nature of medium access protocol results in unfairness. The throughput ratio is given as the ratio between average TCP uplink throughput (R u ) and the average TCP downlink throughput (R d ). Even when there is a single mobile sender(upstream flow) and a single mobile receiver(downstream flow) the throughput ratio is 1.44 which indicates that the sender receives 1.44 times the receiver s bandwidth. SENDER ½ of total ½ of total AP bandwidth bandwidth RECEIVER1 ¼ of total bandwidth RECEIVER2 Figure 5: Represents a network made up of one sender and two receivers. The sender and the access point gets equal share of the channels available bandwidth. Four regions of TCP unfairness based upon the buffer size at the Access Point are identified. In the first region the buffer size at AP is greater than 84 packets and the throughput ratio is one. This indicates both the upstream and downstream flow gets equal share of the available bandwidth. This is because the buffer is large enough to accommodate the maximum receiver window of both flows. In the second region the buffer size is between 42 and 84 and the throughput ratio lies between 10 and 1. The third region corresponds to that region where the access point buffer size lies between 6 and 42 and the throughput ratio varies between 9 and 12. In the fourth region the buffer size is less than 6. Case 1 : One upstream and several downstream flows RECEIVER 1 SENDER AP RECEIVER 2 RECEIVER n Figure 6: Shows One upstream and n downstream flows In this case the throughput ratio is linear i.e. all the downstream flow share the same resources while the throughput remains stable. Case 2 : Equal number of upstream and downstream flows

362 Computer Science & Information Technology ( CS & IT ) SENDER 1 AP RECEIVER 1 SENDER 2 RECEIVER 2 Figure 7: Shows two upstream and two downstream flows In this case the throughput ratio increases because ACK of upstream flow is cluttered at the buffer of ACK thus the packets of downstream flow experience significant timeout due to packet drop at the access point buffer thus increasing unfairness. Case 3 : One upstream and one downstream flow SENDER AP RECEIVER Figure 8: Shows one upstream and downstream flow In this case the behaviour depends upon the buffer size B at Access Point and the TCP receiver window size(w). When this window size is large enough the loss of ACK packet has no influence on the window size of the sender. This is due to the cumulative acknowledgement nature of TCP in which the next ACK packet will have the appropriate sequence number thereby compensating the loss of previous ACK. The upstream window size increases until it reaches w and remains the same throughout the period of connection. The downstream TCP window size depends upon B and w. Generally TCP reacts to loss of data packet by halving its window size. Thus if the buffer size at AP is larger than twice the receiver window size al packets will have space in the buffer and packets will not be dropped. Fair allocation of bandwidth to the 3 stations i.e. sender, receiver and access Point by the wireless MAC results in fair allocation of bandwidth to both the TCP flows. 8. PERFORMANCE OF A* ALGORITHM WITH DCF The network scenario we deal with is the one having equal number of senders(upload clients) and receivers(download clients) connected to data source or server through the access point. In this network, when evaluating the performance of the above stated A* algorithm at access point in the presence of DCF, the system becomes unstable with more than two uploads. Figure 9: Shows RTT (in ms) vs number of uploads with A* algorithm when DCF mechanism is applied. This is due to the combined delay caused by DCF back off interval and packet loss due to ebdp.

Computer Science & Information Technology ( CS & IT ) 363 Upload Traffic Download Traffic Figure 10: Shows the simulated values of Throughput(Mb/s) vs Time(ms) for Uploads and Downloads in above stated network scenario. 9. EXPLICIT WINDOW ADAPTATION In this scheme, the advertised receiver window field present in the ACK packets from the data source are used. This field is used to indicate the amount of space available at the receiver. Lowering the value of this field in the access point can help in notifying the upload client that it should reduce the amount of dataa it sends to the receiver. 9.1 Functioning of EWA The EWA works as follows. An explicit feedback value is sent to the upload client. This feedback is present in the advertised receiver window field of the ACK packets. This feedback is given as a function of the amount of free space in the access point buffer. At the access point, if the value in the current advertised receiver window field value W(t) is greater than the calculated feedback value f(b e (t)), the value in the advertised field is reduced to the feedback value. The amount of free space in buffer B e (t) is calculated as B e (t)= =B-Q(t) where B indicates the total buffer size and Q(t) the buffer occupancy at time t. Thus the final feedback value W r (t) is calculated as a function of the amount of free buffer space at the access point i.e. f(b e (t)) is W r (t)=min(w r (t), max(f (B e (t)), MSS)), where MSS is Maximum Segment Size. 10. VARIATION OF EWA A TO CREATE FAIRNESS Once the modified advertised window field is detected by the upload client, it increases its queuing time to increase the number of opportunities for the downstream traffic. When the queuing time is increased, the downstream ACKs get opportunities to return to upload clients and hence their clutter at the access point is reduced. This increases the transmission opportunities for download data thus enhancing fairness.

364 Computer Science & Information Technology ( CS & IT ) Figure 11: shows the simulated values of Throughput(Mb/s) vs Time(ms) for Uploads and Downloads after EWA variation is implemented in the above network scenario. 11. CONCLUSION Upload Traffic Download Traffic Thus by increasing the queuing time in explicit feedback scheme, fairness among the upstream and downstream flows is achieved when using dynamic buffers. This technique also leads to perfect utilization of the channels bandwidth. A major disadvantage in this techniquee is that it can be applied only to those routers that can manipulate the transport layer. REFERENCES [1] Tianji Li, Douglas Leith and David Malone in Buffer Sizing for 802.11 Based Networks, February 2011. [2] Lampros Kalampoukas, Anujann Varm and K. K. Ramakrishnan in Explicit Window Adaptation: A Method to Enhance TCP Performance, June 2002. [3] Saar Pilosof, Ramachandran Ramjee, Danny Raz, Yuval Shavitt and Prasun Sinha in Understanding TCP Fainess Over Wireless Lan. [4] D. J. Leith, P. Clifford, D. Malone, and A. Ng in TCP Fairness in 802.11e WLANs, November 2005. [5] Tianji Li and Douglas J. Leith in Buffer Sizing for TCP Flows in 802.11e WLANs, IEEE communications letters, vol. 12, no. 3, March 2008.

AUTHORS Computer Science & Information Technology ( CS & IT ) 365 Bhuvana Lalitha N is a graduate in B.Tech Information Technology from Easwari Engineering College, Chennai, India and is joining Tata Consultancy Services in August 2012. Her research interests are in the field of Wireless Networks and Robotics. Email: bhuvana.n21@gmail.com Divya A, a graduate in B.Tech Information Technology from Easwari Engineering College, Chennai, India, campus-selected in Tata Consultancy Services in 2012. Her research interests are in the field of Telecommunication and Networks. Email: divi_cool8@yahoo.com Divya P D, is a graduate in B.Tech Information Technology from Easwari Engineering College, Chennai, India. She will be joining Tata Consultancy Services shortly. Her research interests are in the field of Networks and Router security. Email: div.pd91@gmail.com