UNIVERSITI PUTRA MALAYSIA LAYER OVER MULTI-HOP AD-HOC NETWORKS FK

Similar documents
MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

UNIVERSITI PUTRA MALAYSIA WEIGHTED WINDOW FOR TCP FAIR BANDWIDTH ALLOCATION IN WIRELESS LANS

PERFORMANCE OF TRANSMISSION CONTROL PROTOCOL (TCP) CONGESTION CONTROL OVER WIRELESS LINKS USING MODIFIED SNOOP PROTOCOL

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

On exploiting spatial reuse in wireless ad hoc networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA


ADAPTIVE LOOK-AHEAD ROUTING FOR LOW LATENCY NETWORK ON-CHIP NADERA NAJIB QAID AL AREQI UNIVERSITI TEKNOLOGI MALAYSIA

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

QOS-AWARE HANDOVER SCHEME FOR HIERARCHICAL MOBILE IPv6 USING CONTEXT TRANSFER WITH LINK LAYER TRIGGER

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

UNIVERSITI PUTRA MALAYSIA

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

LINK QUALITY AWARE ROUTING ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS RIBWAR BAKHTYAR IBRAHIM UNIVERSITI TEKNOLOGI MALAYSIA

Figure.2. Hidden & Exposed node problem

A SEED GENERATION TECHNIQUE BASED ON ELLIPTIC CURVE FOR PROVIDING SYNCHRONIZATION IN SECUERED IMMERSIVE TELECONFERENCING VAHIDREZA KHOUBIARI

DYNAMIC MOBILE SERVER FOR LIVE CASTING APPLICATIONS MUHAMMAD SAZALI BIN HISHAM UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF COMMERCIAL VEHICLE SPEED WARNING SYSTEM NGO CHON CHET

MICRO-MOBILITY ENHANCEMENT IN MULTICAST MOBILE IPv6 WIRELESS NETWORKS. By YONG CHU EU

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

A Smart TCP Acknowledgment Approach for Multihop Wireless Networks

CSE 461: Wireless Networks

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

15-441: Computer Networking. Wireless Networking

Local Area Networks NETW 901

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

Chapter - 1 INTRODUCTION

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks


CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

Mohamed Khedr.

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

ENHANCING SRAM PERFORMANCE OF COMMON GATE FINFET BY USING CONTROLLABLE INDEPENDENT DOUBLE GATES CHONG CHUNG KEONG UNIVERSITI TEKNOLOGI MALAYSIA

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

Wireless LAN -Architecture

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

UNIVERSITI PUTRA MALAYSIA A MATRIX USAGE FOR LOAD BALANCING IN SHORTEST PATH ROUTING NOR MUSLIZA MUSTAFA FSKTM

ANOMALY DETECTION IN WIRELESS SENSOR NETWORK (WSN) LAU WAI FAN

Transmission Control Protocol over Wireless LAN

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research

Strengthening Unlicensed Band Wireless Backhaul

Wireless Communication and Networking CMPT 371

Performance Analysis for Channel Utilization in Wireless LAN

MAC. Fall Data Communications II 1

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

BORANG PENGESAHAN STATUS TESIS

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet

CHAPTER 3 : OSI MODEL

TCP Congestion Control in Wired and Wireless networks

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

Wireless LANs. ITS 413 Internet Technologies and Applications

Transport layer issues

SMART AQUARJUM (A UTOMATIC FEEDING MACHINE) SY AFINAZ ZURJATI BINTI BAHARUDDIN

This item is protected by original copyright

Efficient Power MAC Protocol in Ad-hoc Network s

UNIVERSITI PUTRA MALAYSIA DEVELOPMENT OF A REAL-TIME EMBEDDED REMOTE TRIGGERING AND MONITORING SYSTEM CHUI YEW LEONG FK

Wireless Communication and Networking CMPT 371

UNIVERSITI PUTRA MALAYSIA PERFORMANCE EVALUATION OF OPTICAL CDMA RING NETWORK DUE TO SELF INTERFERENCE INDUCED BY POWER CIRCULATION

UNIT IV -- TRANSPORT LAYER

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

UNIVERSITI PUTRA MALAYSIA ENHANCED MOBILITY SOLUTION IN MOBILE IPV6 NETWORK

Data and Computer Communications. Chapter 13 Wireless LANs

MAGNETIC FLUX LEAKAGE SYSTEM FOR WIRE ROPE INSPECTION USING BLUETOOTH COMMUNICATION MUHAMMAD MAHFUZ BIN SALEHHON UNIVERSITI TEKNOLOGI MALAYSIA

DEVELOPMENT OF A MOBILE ROBOT SPATIAL DATA ACQUISITION SYSTEM OOI WEI HAN MASTER OF SCIENCE UNIVERSITI PUTRA MALAYSIA

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

STUDY OF ENHANCED DCF (EDCF) IN MULTIMEDIA APPLICATION ISMAHANI BINTI ISMAIL

TCP Congestion Control

Transcription:

UNIVERSITI PUTRA MALAYSIA TCP PERFORMANCE OPTIMIZATION IN INTERACTION WITH MAC LAYER OVER MULTI-HOP AD-HOC NETWORKS FARZANEH R. ARMAGHANI FK 2008 23

TCP PERFORMANCE OPTIMIZATION IN INTERACTION WITH MAC LAYER OVER MULTI-HOP AD-HOC NETWORKS By FARZANEH R. ARMAGHANI Thesis Submitted to the School of Graduate Studies, University Putra Malaysia, in Fulfillment of the Requirement for the Degree of Master of Science September, 2008

DEDICATION This thesis is dedicated to ALL I LOVE Specially MY BELOVED PARENTS ii

Abstract of thesis presented to the Senate of Universiti Putra Malaysia in fulfillment of the requirement for the degree of Master of Science TCP PERFORMANCE OPTIMIZATION IN INTERACTION WITH MAC LAYER OVER MULTI-HOP AD-HOC NETWORKS By FARZANEH R. ARMAGHANI September 2008 Chairman: Faculty: Professor Sudhanshu Shekhar Jamuar Engineering Transport Control Protocol (TCP) has been designed to provide reliable data delivery between end hosts in traditional wired networks and is the most widely used reliable transport protocol over the internet. TCP keeps looking at the traffic inside the network by employing the congestion control mechanisms. The basic assumption underlying TCP congestion control is that packet losses are an indication of congestion in the wired network. The effect of such an assumption on TCP's performance in wireless environments has been a long-standing research study. The reason is specific wireless properties such as high medium access contention; route breakage and high bit error rate in radio channels pose different challenges in TCP performance when it runs over wireless networks. In this thesis, the focus is given on the interaction between TCP and Medium Access Control (MAC) layer in multi-hop ad-hoc networks to deal with the effect of high medium access contention on TCP throughput. The main problem of TCP over IEEE 802.11 MAC protocol is the extensive number of medium access carried out by TCP. In fact, TCP sender will be informed of iii

successful transmissions by receiving the acknowledgment (ACK) from the other end host to achieve the reliability. In this way, the MAC overhead may be caused by generating redundant ACK packets that compete in the same route with data packets for the media. As the load increases, the well-known hidden terminal effects caused by interference between ACK and data packets can degrade TCP performance dramatically if TCP acknowledges every incoming data packets. To address above problem, in this thesis a dynamic TCP-MAC interaction strategy is proposed which tries to reduce the number of induced ACKs by monitoring the channel condition. To this end, the total collision probability collected along the path from sender to receiver in MAC layer is used to properly set the number of the delayed ACKs (DA) in TCP. Based on the measured collision probability, TCP sender dynamically adjusts itself to the channel condition by delaying less ACKs in high traffics and more in low traffic conditions. Upon this strategy, an enhanced TCP throughput has been achieved in trade-off between moderate and high traffics. Finally, the relationship between the TCP throughput and optimized number of delayed ACKs has been investigated in different hop counts scenarios which employ a dynamic traffic. The findings show that for a given hop count, there exists an optimized delay window size which maximizes the TCP throughput. Overall, the achieved throughput increments are up to about 30% over the regular TCP with DA extension and cwnd limit and about 10% over the existing method called Dynamic Adaptive Acknowledgment (TCP-DAA and TCP-DAAp). iv

Abstrak tesis yang dikemukakan kepada Senat Universiti Putra Malaysia sebagai memenuhi keperluan untuk ijazah Master of Sains KEBERKESAN PRESTASI TCP DIDALAM PENGARUHNYA TERHADAP LAPISAN MAC KE ATAS RANGKAIAN MULTI-HOP AD-HOC Oleh FARZANEH R. ARMAGHANI September 2008 Chairman: Faculty: Professor Sudhanshu Shekhar Jamuar Kejuruteraan TCP di rekabentuk bagi menyediakan kebolehpercayaan penghantaran data antara hos di dalam rangkaian berwayar dan ia adalah antara protocol yang digunakan dalam penggunaan internet. TCP memantau trafik di rangkaian dengan menggunakan mekanisma kawalan kesesakan. Secara asasnya kesesakan pada rangkaian akan terjadi apabila adanya kehilangan paked di dalam rangkaian berwayar. Di dalam rangkaian tanpa wayar, penyelidikan berdasarkan andaian tersebut juga telah dilakukan. Antara penyelidikan yang di jalankan ialah terhadap capaian medium (medium access); rangkaian yang putus-putus(route breakage) dan kadar Bit Error Rate (BER) yang tinggi. Ia menjadi salah satu cabaran di dalam keberkesanan TCP terhadap rangkaian tanpa wayar. Thesis ini memfokuskan kepada interaksi antara TCP dan lapisan MAC (Medium Access Control) pada rangkaian multi-hop ad-hoc dan kesannya kepada daya pemprosesan TCP. Masalah utama yang dihadapi oleh TCP di dalam IEEE 802.11 ini ialah bilangan data yang besar yang di bawa oleh medium oleh TCP. Berdasarkan teori, ACK yang akan dihantar oleh penerima kepada penghantar sebagai bukti penerimaan. Kesan teori ini, v

MAC overhead akan terhasil akibat penghasilan berulang-ulang paket-paket ACK yang berada didalam jaringan yang sama.kesan pengkalan tersorok atau well known terminal effects akibat daripada gangguan antara ACK dan packet data juga akan menurunkan prestasi TCP pada masa yang sama. Bagi mengesan punca masalah di atas, strategi interaksi secara dinamik TCP-MAC telah di buat dengan mengurangkan bilangan ACK dengan berdasarkan keadaan channel tersebut. Hasilnya, kebarangkalian perlanggaran (collision probability) yang terhasil pada laluan penghantar dan penerima akan digunakan sebagai delayed ACKs (DA) kepada TCP. Cara ini akan mengurangkan proses penghantaran ACK pada keadaan traffic yang tinggi dan proses sebaliknya apabila keadaan trafik yang rendah. Akhirnya, hubungan antara perolehan TCP dan delayed ACK yang paling berkesan telah diselidik melalui bilangan perantara(hop) yang berbeza bagi menghasilkan trafik yang dinamik. Berdasarkan penyelidikan tersebut, didapati setiap bilangan hop itu mempunyai delay window size yang paling berkesan dan memaksimakan daya pemprosesan TCP. Kesimpulannya, melalui alternatif ini, daya pemprosesan akan meningkat sebanyak 30% daripada daya pemprosesan TCP yang mempunyain DA Extension and cwnd limit. Ia juga meningkat 10% berbanding cara yang ada dikenali sebagai (TCP-DAA) dan (TCP DAAp). vi

ACKNOWLEDGEMENTS I would like to thank my supervisor, Prof. Sudhanshu Shekhar Jamuar for his valuable comments and advice through the course of this research. His encouragement and professional review helped this thesis and other technical papers to be further improved. My further gratitude goes to Associate Prof. Sabira khatun and Dr. Fadlee for their great help and technical advices. Also, my eternal gratitude is owed to my family who have been supportive in everything I have done. In particular, I would like to thank my mother, Parichehr for her never ending love and support. I am highly indebted to my father, Behrooz for his understanding, encouragement and support during my study. Finally, I owe gratitude to my brother for his warm expressions when things seemed not to be in track. I also want to thank of all my second family members in Malaysia, including all my friends in the network lab for providing me with great friendship and experience in my academic and social life. This work has been supported in part by Research Management Center in University Putra Malaysia (UPM) under the Research University Grant Scheme (RUGS). I would like to thank my supervisors and all the staffs for giving me this opportunity. vii

APPROVAL I certify that an Examination Committee has met on.. to conduct the final examination of Farzaneh R. Armaghani on her Master of Science thesis TCP Performance Optimization in Interaction with MAC Layer over Multi-hop Ad-hoc Networks in accordance with Universiti Pertanian Malaysia (Higher Degree) Act 1980 and Universiti Pertanian Malaysia (Higher Degree) Regulations 1981. The Committee recommends that the candidate be awarded the relevant degree. Members of the Examination Committee are as follows: Chairman, PhD Professor Faculty of Graduate Studies Universiti Putra Malaysia (Chairman) Examiner 1, PhD Professor Faculty of Graduate Studies Universiti Putra Malaysia (Internal Examiner) Examiner 2, PhD Professor Faculty of Graduate Studies Universiti Putra Malaysia (Internal Examiner) External Examiner, PhD Professor Faculty of Graduate Studies Universiti Putra Malaysia (External Examiner) HASANAH MOHD GHAZALI, PhD Professor /Deputy Dean School Of Graduate Studies University Putra Malaysia Date: viii

This thesis was submitted to the Senate of Universiti Putra Malaysia and has been accepted as fulfilment of the requirement for the degree of Master of Science. The members of the Supervisory Committee were as follows: Sudhanshu Shekhar Jamuar, PhD Professor Faculty of Engineering Universiti Putra Malaysia (Chairman) Sabira Khatun, PhD Associate Professor Faculty of Engineering Universiti Putra Malaysia (Member) Mohd Fadlee b. A. Rasid, PhD Head Department Faculty of Engineering Universiti Putra Malaysia (Member) AINI IDERIS, PhD Professor and Deputy Dean School of Graduate Studies Universiti Putra Malaysia Date: 13 November 2008 ix

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously or concurrently submitted for any other degree at UPM or other institutions. FARZANEH R. ARMAGHANI Date: x

TABLE OF CONTENTS DEDICATION ABSTRACT ABSTRAK ACKNOWLEDGEMENTS APPROVAL DECLARATION LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS/ SYMBOLS Page II III V VII VIII X XIII XIV XV 1 INTRODUCTION 1 1.1 Background 1 1.2 Problem Statement and Motivation 2 1.3 Aim and Objectives 4 1.4 Scope of Research 5 1.5 Study Module 6 1.6 Thesis Organization 7 2 LITERATURE REVIEW 9 2.1 Introduction 9 2.2 Transmission Control Protocol (TCP) Fundamentals 10 2.2.1 TCP Segment 10 2.2.2 Sliding Windows 11 2.2.3 Connection Establishment 12 2.2.4 TCP Data Delivery Reliability 13 2.2.5 Flow Control 15 2.2.6 Congestion Control 15 2.3 TCP Variants 18 2.4 TCP Delayed Acknowledgment (DA) 19 2.5 IEEE 802.11 MAC Protocol in Ad-Hoc Networks 21 2.5.1 Distributed Coordination Function (DCF) 22 2.5.2 IEEE 802.11 Challenges 25 2.6 TCP-MAC Interaction in Multi-Hop Ad-Hoc Networks 28 2.6.1 Impact of Hidden Terminal and Exposed Terminal Problems 29 2.6.2 Impact of TCP Transmission Rate 30 2.6.3 TCP Redundant ACKs 31 2.7 TCP Modifications over MAC Layer in Ad-Hoc Networks 32 2.7.1 Limiting TCP s Packet Output 32 2.7.2 Managing a Shared Medium 34 2.7.3 ACK Thinning Techniques 35 2.8 Summary 40 3 METHODOLOGY 43 3.1 Introduction 43 3.2 General Steps of the Methodology 43 xi

3.3 Monitoring Delayed Acknowledgment (TCP-MDA) 44 3.3.1 MAC Collision Probability Measurement 45 3.3.2 Delaying Window Strategy 49 3.3.3 ACK Timeout Computation 53 3.4 Sender Side s Modifications 54 3.5 Optimized Numbers of Delayed ACKs 55 3.6 Summary 55 4 RESULTS AND DISCUSSION 57 4.1 Overview 57 4.2 Simulation Scenario 57 4.2.1 Simulation Area Setup 58 4.2.2 TCP Transfer Setup and Metric Used 59 4.2.3 Assumptions 60 4.3 TCP-MDA Performance Evaluation 61 4.3.1 Throughput in the Chain Topology 62 4.3.2 Impact of Congestion Window Limit 69 4.4 Summary 73 5 CONCLUSION 76 5.1 Conclusion 76 5.2 Thesis Contribution 77 5.3 Directions for Future Work 79 REFERENCES 81 APPENDICES 85 BIODATA OF STUDENT 89 LIST OF PUBLICATIONS 90 xii

Table LIST OF TABLES Page 2-1 Optimized Delay Window Size in Different Path Length 38 4-1 Optimized dwin Size in Different Path Length 72 xiii

LIST OF FIGURES Figure Page 1-1 Study module 7 2-1 TCP Segment Format 10 2-2 Pointers in TCP Sliding Window 12 2-3 TCP Three-Way Handshake 13 2-4 (a) Standard TCP. (b) Standard TCP with Delayed ACK Option 20 2-5 RTS-CTS-DATA-ACK Four-Way Handshaking 23 2-6 Contention and Spatial Reuse 27 2-7 Collision between DATA and TCP-ACK 31 3-1 General Steps of the Methodology 44 3-2 MAC Collision Probability Measurement 46 3-3 Packet Processing at a Single Node to Collect the Collision Probability 48 3-4 TCP-MDA Flowchart 50 3-5 Delay Window Enlargement and Packet Loss Handling Scenario 52 3-6 An Example of How TCP-MDA Works in the Moderate Traffic 53 4-1 Simulation Scenario 58 4-2 Four State Markov Chain Error Model 61 4-3 Optimal collision_thresh parameter for TCP-MDA 63 4-4 TCP Throughput vs. Number of Flows in a 4 hop Chain Topology 65 4-5 TCP Throughput vs. Number of Flows in a 9 hop Chain Topology 66 4-6 TCP Throughput vs. Number of Flows in a 16 hop Chain Topology 67 4-7 Network Overload Scenario 67 4-8 TCP Throughput vs. Delay Window Size in a Short Chain Topology 70 4-9 TCP Throughput vs. Delay Window Size in Chain Topology 71 4-10 Comparison of TCP-MDA with and without cwnd Limit 74 xiv

LIST OF ABBREVIATIONS/ SYMBOLS TCP MAC ACK DA WLAN WWAN AP Wi-Fi IP FTP SMTP HTTP OSI ISN RTO RTT AIMD SACK SWS CSMA/CA DCF PCF Transport Control Protocol Medium Access Control Acknowledgment Delayed ACK Wireless Local Area Networks Wireless Wide Area Networks Access Point Wireless Fidelity Internet Protocol File Transfer Protocol Simple Mail Transport Protocol Hyper Text Transfer Protocol Open System Interconnection Initial Sequence Number Retransmission Time Out Round Trip Time Additive Increase-Multiplicative Decrease Selective Acknowledgment Silly Window Syndrome Carrier Sensing Multiple Access with Collision Avoidance Distributed Coordination Function Point Coordination Function xv

NAV IFS SIFS DIFS EIFS CTS RTS LRL SRL CWL BDP RTHC TCP-LDA TCP-ADA TCP-DCA TCP-DAA Network Allocation Vector Inter-Frame Space Short IFS DCF IFS Extended IFS Clear to Send Request to Send Long Retry Limit Short Retry Limit Congestion Window Limit Bandwidth Delay Product Round-Trip Hop-Count Large Delayed Acknowledgment Adaptive Delayed Acknowledgment Delayed Cumulative Acknowledgment Dynamic Adaptive Acknowledgment TCP-DAAp TCP-DAA plus TCP-MDA AODV WL Monitoring Delayed Acknowledgment Ad-hoc On-Demand Distance Vector Routing Window Limit xvi

List of Symbols cwnd rwin ssthresh win dwin congestion window advertised window slow start threshold transmission window delay window _ _ non collision probability _ transmitted_pkts retransmitted_pkts total_collision_prob collision_ thresh ack_count maxdwin local collision probability total transmitted packets total retransmitted packets total collision probability collision threshold ACK counter maximum delayed window µ speeding factor k h enlargement factor inter-arrival time smoothed average inter-arrival time inter-arrival smoothing factor tolerance factor number of hops xvii

CHAPTER 1 1 INTRODUCTION 1.1 Background Recent demands on affordable, portable wireless communication and computation devices have resulted in the exponential growth of wireless networks ranging from Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWAN) to Ad-Hoc and Sensor networks. The major goal of wireless communication is to allow users to communicate together and have access to global network anytime anywhere. This has led to wide acceptance of infrastructure based cellular networks (WWANs) where mobile stations communicate with a centralized controller, often referred as Access Point (AP) that is connected to the wired networks. On the other hand, WLANs have appeared as dominant popular technologies in many venues including a local area such as an academic campus or an airport terminal. These wireless networks mostly rely on IEEE 802.11 Wi-Fi (Wireless Fidelity) technology and its various derived versions (i.e. 802.11a,b,g). IEEE 802.11 standard supports two operational modes: The infrastructure-based Wireless Local Area Networks (WLANs) and an infrastructure-less Ad-Hoc Networks. A WLAN [1] typically imposes the existence of an AP and normally is connected to the wired networks to provide internet access for mobile devices. Obviously, only one hop link is needed to communicate between mobile devices and AP. In contrast, there is no AP or infrastructure in ad-hoc networks. Any two stations can communicate directly when they are in the range of reception of each other. To this end, the stations may use multi-hop routing to deliver their packets to destinations.

The ad-hoc protocols [1, 2] are self-configured of address and routing in the face of mobility and the network topology may change in each configuration. The multi-hop wireless ad-hoc networks, simply called as multi-hop wireless networks enable wireless networking in the environments where the wired or cellular connections are impossible, inadequate, or cost effective (e.g. battle field, disaster recovery, etc.). The popularity of internet over the last decades has resulted in rapid advancement of demanding applications. The Transmission Control Protocol/Internet Protocol (TCP/IP) [3] protocol is a well-known de facto protocol in developing today s internet. Basically, TCP provides a connection-oriented and reliable end-to-end data delivery between two hosts in traditional wired networks. Since TCP is well tuned and due to its wide acceptance in internet, it is desirable to extend and adopt its functionality to wireless networks. On the other hand, unique characteristics and usage of multi-hop wireless networks require robust, reliable and adaptive designs. This may be achieved by considering the interaction of different layers to meet the increasing demands of these networks. As a conclusion, how TCP behaves over multi-hop adhoc networks and how the interaction of TCP and different layers affects the network performance has been a challenging issue in developing the usage of TCP for multihop ad-hoc networks. 1.2 Problem Statement and Motivation The TCP/IP suite has become the industry-standard of interconnecting hosts, networks, and the internet. As such, it is seen as the engine behind the internet and networks worldwide [4]. Besides, many applications such as File Transfer Protocol (FTP), Simple Mail Transport Protocol (SMTP), Hyper Text Transfer Protocol 2

(HTTP) and Telnet have been developed to this protocol. So, it is desirable to extend the usage of TCP/IP in the wireless and ad-hoc environments. On the other hand, TCP has been designed to provide reliable data delivery between end hosts in traditional wired networks. The reliability in TCP is achieved by retransmitting lost packets and acknowledgment (ACK) confirmation. If the sender does not receive any acknowledgment within a timeout interval or receives duplicate ACKs in the case of out-of-order packets, the packet will be retransmitted. Any packet loss is assumed as congestion in wired networks. When a packet loss is detected, TCP invokes its congestion control mechanism to slow down the sending rate to reduce the congestion. However, packet losses are not mainly due to congestion in wireless networks. It might be due to some wireless specific properties such as high medium access contention, route breakage and high bit error rate in radio channels [5, 6]. The key challenge of TCP protocol is its poor bandwidth utilization and performance when it runs over 802.11 multi-hop wireless networks. The reason can be explained due to the extensive number of medium access carried out by TCP. Basically, TCP sender will be informed of successful transmission by receiving the acknowledgment from the other end host. The MAC overhead can be caused by generating redundant ACK packets that compete in the same route with data packets for the media. Although the TCP-ACK packets are small, they may cause the same overhead as data packets in MAC layer resulting in wastage of wireless resources [7, 8]. In fact, as it is discussed in [9], the short RTS/CTS control frames to provide the data delivery implemented by 802.11 MAC protocol, cannot eliminate the interference in large 3

topologies. As the load increases, the well-known hidden terminal effects caused by interference between ACK and data packets can impact TCP performance dramatically in long paths if TCP acknowledges every incoming data packets as described later in chapter 2. One way to improve the TCP performance over 802.11 in multi-hop ad-hoc networks is to alleviate the medium access contention by reducing the number of generated ACKs, simply called as delayed ACKs. This can be done by merging several ACKs in one ACK which is possible due to cumulative ACK scheme used in TCP. Referring to the already proposed approaches to reduce the number of the induced ACKs, the TCP performance is still affected by a limitation of a method which dynamically selects the number of delayed ACKs based on the channel condition [7, 8]. This motivates us to study the performance of TCP-ACKs in interaction with 802.11 over the multi-hop ad-hoc networks and develop a dynamic delayed ACK strategy to adjust TCP to these kinds of networks. 1.3 Aim and Objectives TCP performance in interaction with 802.11 MAC protocol in ad-hoc networks has been investigated in this research. The main aim of this research is to increase the TCP throughput by decreasing the flow of TCP-ACKs and minimizing the spatial contention between ACK and data packets in MAC layer, so as to give more bandwidth to TCP data packets. To meet this aim, the main objectives of this study are following: To identify the TCP-MAC interaction in multi-hop ad-hoc networks. 4

To develop a dynamic TCP-MAC interaction strategy that controls the numbers of delayed ACKs by monitoring the channel collision probability. o To employ a model to measure the channel collision probability in 802.11 MAC protocol. o To develop a dynamic delayed ACK approach based on the measured collision probability. To investigate the optimized number of delayed ACKs in different hop counts scenarios when the cwnd is not limited. To analyze and compare the performance of the proposed approach with the existing related research works. 1.4 Scope of Research In standard TCP, sender will be informed of successful transmission by receiving the acknowledgment from the other end host. To this end, there will be one ACK for every data packet received. The concept of Delayed Acknowledgments (DA) strategy was first defined in RFC 1122 [10] and then refined in RFC 2581 [11].With standard delayed ACK option, TCP receiver generates one ACK on receiving two in-order data packets from the sender. Delaying more than two ACKs has been proposed in recent literature to adopt TCP ability in wireless environments. However, this field needs more investigation due to unique features of wireless multi-hop networks. 5

On the other hand, it is motivated by the fact that providing lower layer information to upper layer may help the upper layer to perform better [6]. This is called as crosslayering design which relies on interaction between two layers of Open System Interconnection (OSI) architecture. The importance of the designs based on the interaction between different layers has been also discussed in [5]. Since the purpose of ACK thinning in ad-hoc networks is to alleviate the MAC contention, it is desirable to approach a TCP-MAC interaction strategy to set the number of the ACKs based on the channel feedback. In this thesis a dynamic TCP-MAC interaction strategy is proposed which tries to reduce the number of induced ACKs by monitoring the channel condition. The TCP and 802.11 protocols are the reality respectively in today s internet and wireless environments. Thus, the proposed solutions in this thesis focus on better interaction between TCP and 802.11 to effectively enhance the end-to-end TCP throughput over multi-hop ad-hoc network in different traffics. Developing a new reliable transmission or MAC protocol that is specially tailored to cope with the characteristics of multi-hop ad-hoc networks is not in the scope of this research. Moreover, the proposed strategy is tailored to monitor the channel collision probability when losses are caused by reasons other than congestion to properly set the number of the delayed ACKs. Investigating the error detection methods to identify the type of a packet loss and to determine the internal network state is not considered. 1.5 Study Module Figure 1.1 illustrates the summary of the direction in this research where the bold lines represent the direction followed in this thesis to achieve our objectives and the dotted 6

lines represent the other directions that are already considered in previous researches in the area of ad-hoc networks. The category is driven based on the concepts in [2, 6]. QoS issues Energy conversation Multi-hop ad-hoc networks Security in ad-hoc networks Routing designs challenges TCP challenges in ad-hoc networks MAC induced challenges Network induced challenges Limiting TCP s packet output Handling ACK traffic Managing a shared medium Dealing with route failure Distinguish between route failure & congestion Lower layer Interaction Single Layered Alternative protocol designs Lower layer Interaction Solutions Single Layered TCP-MAC Network TCP Link layer Transport protocols MAC protocols TCP-Network Physical- Network Network TCP Figure 1-1: Study module 1.6 Thesis Organization This Thesis has five chapters: 7