PERFORMANCE OF TRANSMISSION CONTROL PROTOCOL (TCP) CONGESTION CONTROL OVER WIRELESS LINKS USING MODIFIED SNOOP PROTOCOL

Similar documents
Transmission Control Protocol. ITS 413 Internet Technologies and Applications

CMPE 257: Wireless and Mobile Networking

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

TRANSMISSION CONTROL PROTOCOL

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

Wireless TCP Performance Issues

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Lecture 3: The Transport Layer: UDP and TCP

Impact of transmission errors on TCP performance. Outline. Random Errors

cs/ee 143 Communication Networks

TCP over wireless links

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

ECS-087: Mobile Computing

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Outline 9.2. TCP for 2.5G/3G wireless

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

UNIT IV -- TRANSPORT LAYER

Mobile Communications Chapter 9: Mobile Transport Layer

TCP OVER AD HOC NETWORK

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Computer Networking Introduction

TCP based Receiver Assistant Congestion Control

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

Multiple unconnected networks

UNIVERSITI PUTRA MALAYSIA WEIGHTED WINDOW FOR TCP FAIR BANDWIDTH ALLOCATION IN WIRELESS LANS

Two approaches to Flow Control. Cranking up to speed. Sliding windows in action

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

TSIN02 - Internetworking

Mobile Transport Layer

Wireless Heterogeneity. EEC173B/ECS152C, Spring 09. Data Transport Over Wireless. Wireless Performance. Reliable Data Transport over Wireless Networks

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

CS457 Transport Protocols. CS 457 Fall 2014

Fall 2012: FCM 708 Bridge Foundation I

Congestion / Flow Control in TCP

Mobile Communications Chapter 9: Mobile Transport Layer

ECE 333: Introduction to Communication Networks Fall 2001

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

8. TCP Congestion Control

OPTIMIZED BURST ASSEMBLY ALGORITHM FOR MULTI-RANKED TRAFFIC OVER OPTICAL BURST SWITCHING NETWORK OLA MAALI MOUSTAFA AHMED SAIFELDEEN

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Transport Protocols & TCP TCP

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

CSCD 330 Network Programming

CS321: Computer Networks Congestion Control in TCP

TRANSMISSION CONTROL PROTOCOL

UNIVERSITI PUTRA MALAYSIA LAYER OVER MULTI-HOP AD-HOC NETWORKS FK

TCP Congestion Control

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Chapter 09 Network Protocols

TCP Congestion Control in Wired and Wireless networks

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD

A thesis submitted to the Faculty of Graduate Studies and Research. in partial fulfillment of the requirements for the degree of

image 3.8 KB Figure 1.6: Example Web Page

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

TSIN02 - Internetworking

Transport Protocols Reading: Sections 2.5, 5.1, and 5.2. Goals for Todayʼs Lecture. Role of Transport Layer

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

Lecture 15: TCP over wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday

Computer Communication Networks Midterm Review

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

TSIN02 - Internetworking

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Congestions and Control Mechanisms in Wired and Wireless Networks

Transmission Control Protocol (TCP)

Chapter 12 Network Protocols

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

Transport layer issues

Transport Protocols. Raj Jain. Washington University in St. Louis

TCP Review. Carey Williamson Department of Computer Science University of Calgary Winter 2018

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

PERFORMANCE ANALYSIS OF SNOOP TCP WITH FREEZING AGENT OVER CDMA2000 NETWORKS

TCP : Fundamentals of Computer Networks Bill Nace

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

Introduction to Networks and the Internet

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

05 Transmission Control Protocol (TCP)

COMP/ELEC 429/556 Introduction to Computer Networks

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

TCP Service Model. Today s Lecture. TCP Support for Reliable Delivery. EE 122:TCP, Connection Setup, Reliability

CNT 6885 Network Review on Transport Layer

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

Transcription:

PERFORMANCE OF TRANSMISSION CONTROL PROTOCOL (TCP) CONGESTION CONTROL OVER WIRELESS LINKS USING MODIFIED SNOOP PROTOCOL By FURAT ASMAT MOOJID Thesis Submitted to the School of Graduate Studies, Universiti Putra Malaysia In Partial Fulfillment of the Requirements for the degree of Master of Science December 2003

To my Parents, My friends, My cousin Bahaa, And especially my wife. ii

Abstract of thesis presented to Senate of Universiti Putra Malaysia in partial fulfilment of the requirement for the degree of Master of Science PERFORMANCE OF TRANSMISSION CONTROL PROTOCL (TCP) CONGESTION CONTROL OVER WIRELESS LINKS USING MODIFIED SNOOP PROTOCOL By FURAT ASMAT MOOJID December 2003 Chairman: Professor Borhanuddin Mohd. Ali, Ph.D. Faculty: Engineering Because of the burgeoning increase for data communication and multimedia services over wireless links, and rapid growth of wireless communications, many researches have been undertaken to find effective integrated protocols that satisfy this demands. Since wireless links normally show higher bit error rate and temporal disconnections compared with wired links, the losses are greater, this may also be caused by the mobility like handoff, and many wireless channel impairment errors and not just congestion. TCP deals with packet losses by applying congestion control mechanisms, which tends to degrade its performance. Many protocols have been proposed including Snoop, to alleviate this problem. Our objectives here are to study and enhance the Snoop protocol using the modified ACK called Fake Acknowledgment under various network parameters. iii

In this thesis, a Fake ACK technique proposed based on the Snoop Acknowledgment procedure; this reduces the waiting time of the Fixed Host waiting for the right Acknowledgment to be received, and hence reducing the probability of initiating congestion control mechanism. The results show that the throughput of our technique is increased and the losses are decreased compared to traditional Snoop protocol, under different parameter values. iv

Abstrak tesis yang dikemukakan kepada Senat Universiti Putra Malaysia sebagai memenuhi keperluan untuk ijazah Master Sains Oleh FURAT ASMAT MOOJID Desember 2003 Pengerusi: Professor Borhanuddin Mohd. Ali, Ph.D. Fakulti: Kejuruteraan Disebabkan peningkatan mendadak komunikasi data dan servis-servis multimedia melalui penghubung wayarles, dan perkembangan mendadak komunikasi wayarles, banyak kajian telah dijalankan untuk mencari protokol yang dapat memenuhi keperluan ini. Memandangkan penghubung wayarles kebiasaannya mempunyai kadar kesalahan bit yang lebih tinggi dan kemunskinan terputus hubungan yang lebih tinggi berbanding penghubung wayar, kehilangannya adalah lebih besar disebabkan masalah pergerakan seperti handoff dan banyak kesalahan pada saluran wayarles dan peringisan bukan sahaja kesesakan. Pelbagai protokol telah dicadangkan antaranya Snoop, untuk mengatasi masalah ini. Matlamat kami adalah untuk mengkaji dan mengemaskini protokol Snoop menggunakan kaedah yang telah diubahsuai dipanggil Fake Acknowledgment dibawah parameter rangkaian dasar yang berbeza. Di dalam tesis ini, kaedah Fake ACK dicadang berdasarkan kepada prosedur Snoop Acknowledgment ; ini v

mengurangkan masa menunggu untuk hos tetap sementara Acknowledgment yang betul diterima, dan dari itu mengurangkan kemungkinan memulakan mekanisma kawalan kesesakan. Keputusan yang diperolehi menunjukkan bahawa prestasi pencapaian untuk kaedah kami ini akan meningkat dan kehilangan akan berkurangan berbanding protokol Snoop tradisional, dibawah nilai parameter yang berbeza. vi

ACKNOWLEDGEMNETS I would like to express deep gratitude to my advisor and chairman of my supervisory committee Prof. Dr. Borhanuddin Mohd Ali, who has helped me with his guidance, advices, and corrections, especially his kind and patient. I am no less grateful to the other committee members Dr. Mohamed Hadi Habaebi for support me all the times with his ideas and experience, which helped me to solve a number of problems those faced me. And Puan Ratna, who is kind enough to read and comments on my work. Also my thanks, to my colleagues at the wireless and broadband laboratories, for their kindness and help during my research time. It is particular that I express my affectionate and deeply felt gratitude to my parents, my brothers, especially my wife who joined me step by step, my dear friend Khalid and my cousin Bahaa who encourage and support me to complete my work. vii

I certify that an examination committee met on 23 rd December 2003 to conduct the final examination of Furat Asmat Moojid on his Master of Science thesis entitled Performance of Transmission Control Protocol (TCP) Congestion Control Over Wireless Links using Snoop Protocol in accordance with Universiti Pertanian Malaysia (Higher Degree) act 1980 and Universiti Pertanian Malaysia (Higher Degree) Regulations 1981. The committee recommends that the candidate be awarded the relevant degree. Members of Examination Committee are as follows: SAMSUL BAHARI BIN MOHD NOOR, Ph.D. Faculty of Engineering Universiti Putra Malaysia (Chairman) BORHANUDDIN MOHD ALI, Ph.D. Professor Faculty of Engineering Universiti Putra Malaysia (Member) MOHAMED HADI HABAEBI, Ph.D. Faculty of Engineering Universiti Putra Malaysia (Member) RATNA KALOS ZAKIAH Lecturer Faculty of Engineering Universiti Putra Malaysia (Member) GULAM RUSUL RAHMAT ALI, Ph.D. Professor/Deputy Dean School of Graduate Studies, Universiti Putra Malaysia Date: 21 APR 2004 viii

This thesis submitted to the Senate of Universiti Putra Malaysia has been accepted as fulfilment of the requirement for the degree of Master of Science. The members of the Supervisory Committee are as follows: BORHANUDDIN MOHD ALI, Ph.D. Professor Faculty of Engineering Universiti Putra Malaysia (Chairman) MOHAMED HADI HABAEBI, Ph.D. Faculty of Engineering Universiti Putra Malaysia (Member) RATNA KALOS ZAKIAH Lecturer Faculty of Engineering Universiti Putra Malaysia (Member) AINI IDRIS, Ph.D. Professor/Dean School of Graduate Studies Universiti Putra Malaysia Date: ix

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations which have been duly acknowledged. I also declare that it has not been previously or currently submitted for any other degree at UPM or other institution. Date: FURAT ASMAT MOOJID x

TABLE OF CONTENTS DEDICATION ABSTRACT ABSTRAK ACKNOWLEDGEMENTS APROVAL DECLARATION FORM LIST OF FIGURES LIST OF ABBREVIATIONS Page ii iii v vii viii x xiii xv CHAPTER 1 Background 1.1 Introduction 1 1.2 Objectives 3 1.3 Thesis Organization 4 2 Literature Review 2.1 Introduction 6 2.2 TCP Protocol 6 2.2.1 TCP Header 9 2.2.2 Sliding window 12 2.2.3 TCP s self-clocking mechanism 15 2.2.4 TCP congestion control mechanisms 16 2.3 TCP over wireless networks and related problems 20 2.4 Alternative solutions 21 2.4.1 End-to-End schemes 23 2.4.2 Split-connection schemes 23 2.4.3 Link layer schemes 24 2.5 Optimum link-layer scheme 25 2.6 The reason for choosing link-layer schemes 26 2.7 Snoop protocol 27 2.8 Snoop procedures 29 2.8.1 Snoop data 29 2.8.2 Snoop ACK 31 2.9 Brief analysis using TCP equations 34 2.10 Conclusions 37 3 Methodology 3.1 Introduction to NSv2 38 3.2 Designing the Simulator 39 3.3 The proposed technique 41 3.3.1 Fake ACK technique 43 xi

3.4 Conclusion 44 4 RESULTS AND DISCUSSION 4.1 Introduction 46 4.1.1 Dropped packets over different used BW in wired networks 47 4.1.2 Effect of different used wired TD values on dropped packets 48 4.1.3 Effect of loss probability on sent packets 48 4.1.4 Effect of different used CHD on E2E dropped packets 49 4.1.5 Effect of different used BW on E2E dropped packets 50 4.1.6 Effect of different TD values on E2E dropped packets 51 4.2 applying Fake ACK technique on W/Ws network 55 4.3 Effect of Fake acknowledgment technique on the buffers 63 4.4 Conclusion 65 5 CONCLUSION AND FUTURE WORKS 5.1 Conclusion 66 5.2 Future works 67 REFERENCES 68 APPENDICES 71 Appendix A 71 Appendix B 74 BIODATA OF THE AUTHOR 102 xii

LIST OF FIGURES Figure Page 1 The TCP protocol 7 2 Three-Way handshaking method 8 3 TCP header 9 4 Sliding window 13 5 Congestion control mechanisms 17 6 Packet losses recovery mechanism in TCP 18 7 (Snoop agent) modified module at base station 27 8 Link-layer protocol 28 9 Snoop data procedure 10 Snoop acknowledgement procedure 11 Wired-cum-wireless (FH to MH) topology 39 12 ACK procedure in Snoop protocol 42 13 Fake ACK proposed procedure in Snoop protocol 29 31 43 14 Comparison between the effects of different wired BW values On dropped packets 47 15 Comparison between the effects of different wired transmission delay values on dropped packets 48 16 Comparison between the effects of different loss probability values on received packets 49 17 Comparison between the effects of different channel delay values on dropped packets 50 xiii

18 Comparison between the effects of different wireless bandwidth values on dropped packets 51 19 Comparison between the effects of different wireless transmission delay values on dropped packets 51 20 Comparison between the cumulative dropped packets for wired And wired-cum-wireless with 10Mbps bandwidth 50 21 Comparison between the cumulative dropped packets for wired and wired-cum-wireless with 10ms transmission delay 53 22 Comparison between the original Snoop and Fake ACK technique (Cumulative sent packets with BW=5Mbps) 56 23 Comparison between the original Snoop and Fake ACK technique (Cumulative dropped packets with BW=5Mbps) 57 24 Comparison between the original Snoop and Fake ACK technique (Seq. Numbers of all dropped packets with BW=5Mbps) 58 25 Comparison between the original Snoop and Fake ACK technique (Cumulative sent packets with BW=10Mbps) 60 26 Comparison between the original Snoop and Fake ACK technique (Cumulative dropped packets with BW=10Mbps) 61 27 Comparison between the original Snoop and Fake ACK technique (Sequence Numbers of all dropped packets with BW=10Mbps) 62 28 Comparison between total buffered packets in original and Fake ACK Snoop with BW=10Mbps 63 29 Comparison between total buffered packets in original and Fake ACK Snoop with BW=5Mbps 64 xiv

LIST OF ABBREVIATIONS ACK ARQ ATM BER BS BW CHD Cwnd Dup ACK E2E FEC FH FIFO ELN Acknowledgment Automatic repeat request Asynchronous Transfer Mode Bit Error Rate Base Station Bandwidth Channel Delay Congestion Window Duplicate Acknowledgment End-to End Forward Error Correction Fixed Host First In First Out Explicit Loss Notification FDDI Fiber Distributed Data Interface FIN HDR LEN IP Finish Header Length Internet Protocol xv

LP Losses Probability MH Mobile Host MSS MTU Maximum Segment Size Maximum Transfer Unit NSv2 Network Simulator version 2 OTcl PER Pkt PS PSH RST RTT SACK Ssthresh SYN Objective Tcl Packet Error Rate Packet Packet Size Push Flag Request Round Trip Time Selective Acknowledgment Slow Start Threshold Synchronization TCP Transmission Control Protocol TD Transmission Delay URG Urgent Flag xvi

CHAPTER 1 BACKGROUND 1.1 Introduction The transport layer is a heart of the whole protocol hierarchy. Its task is to provide reliable, cost-effective data transport from the source machine to the destination machine, independently of the physical network or networks currently in use. Transmission Control Protocol was designed to provide a reliable end-to-end byte stream over an unreliable internetwork. An internetwork differs from a single network because different parts may have wildly different topologies, bandwidths, delays, packet sizes, and other parameters [18]. TCP was formally defined in RFC 793; the transmission control protocol (TCP) is a reliable connection oriented, end-to-end, error free protocol. A TCP connection is like telephone connection but with reliable data transmission between the computers. The reliability guaranteed by sending cumulative Acknowledgment (ACK) after receiving in-sequence segment. Early TCP implementations only had a simple sliding window flow control mechanism without any congestion control. After observing a series of congestion collapses in 1980 s, several innovative xvii

congestion control mechanisms introduced into TCP in 1988. This TCP version called TCP Tahoe, includes the slow start, congestion avoidance, and fast retransmit algorithm. Two years later in 1990, the fast recovery algorithm was added to Tahoe to form a new TCP version called TCP Reno. And currently the dominating TCP version deployed in the Internet is TCP Reno version. These clarifications and some bug fixes are detailed in RFC 1122. Extensions are given in RFC 1323. Since 1988, the Internet has grown tremendously; it has become clear that the TCP congestion avoidance mechanisms are not sufficient to provide good service in all circumstances [24]. Especially for instance, in wireless networks, the traditional assumption that packet loss is an indicator of network congestion may be invalid since high bet error rate and temporarily disconnection could be the main reason behind packet losses in wireless networks. Likewise, in asymmetric networks in which two directions of the connection could have vastly different bandwidth and different characteristics, TCP performance may suffer in the current heterogeneous networks. Over the past decade, many schemes proposed to solve wireless networks low performance. Some of them attempt to make the TCP sender aware of existing wireless; others try to hide non-congestion related losses from TCP sender, because that some of packets losses can avoid invoking the congestion control algorithm when new congestion related losses occur [1]. A different solution, due to Balakrishnan, Snoop protocol does not break the semantics of TCP. It works by making several small modifications to the network layer code in the xviii

base station. One of the changes is the addition of Snooping agent that observes and caches TCP segments going out to the mobile host and acknowledgments coming back from it. When the snooping agent sees a TCP segment going out to the mobile host but does not see an acknowledgment coming back before its (relatively short) timer goes off, it just retransmits when it sees duplicate acknowledgments from the mobile host go by [18]. Most current network application is Snoop protocol that desirable to achieve improving wireless part performance without changing existing TCP implementations [2]. The truth that is Snoop or any other solution could also suffer from not being able to completely shield the sender from wireless losses [3]. 1.2 Objectives The objectives of this thesis are as follow: a) To study the transmission control protocol, and its problems over wireless networks. b) To investigate Fake ACK proposed scheme to improve TCP performance over wireless links especially link layer schemes. c) To examine the effect of some parameters on the performance of TCP, by using Snoop Protocol, between fixed host and mobile host over Wireless Local Area Network. xix

d) To propose a modified Snoop Protocol to evaluate the performance of the TCP congestion control, and e) To improve the TCP congestion control by Proposed technique called Fake ACK Scheme to minimize the opportunity of referring to congestion control mechanism. In our study we focus on the packets dropping as a standard for the performance. For pure wired network we studied the effect of three parameters on the dropping packets (performance). The original simulation runs within 10 seconds with fixed host, base station, mobile host. The design parameters are Bandwidth, Transmission Delay, Loss Probability, and Channel Delay, while the performance parameters are the Throughput and Number of Packets Lost. The performance parameters observed by changing the design parameters one after another. 1.3 Thesis Organization The thesis is organized as follow: Chapter 1 is divided into five sections. The first three sections introduce the transmission control protocol (TCP), performance of TCP over wireless networks, and the motivations and objectives of this thesis. Chapter 2 consists of five sections introducing the evaluation of the transmission control protocol and its versions with basic explanations and simple xx

mechanisms that used in TCP. Detailed explanation of how congestion control mechanisms work, and the TCP over wireless networks, with the related problems and the existing solutions proposed to enhance TCP over wireless and its performance. Chapter 3 describes the methodology, including problem formulation and Snoop protocol as a link layer scheme, then the simulation and modeling including the topology and our proposed technique. Chapter 4 presents the results and discussion of the comparisons and proposed technique in the thesis. Finally, chapter 5 concludes the thesis and proposed future work to be done in this research area. xxi

CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Wireless networks play a very important role in communications today. People want information on demand any place, any time. Wireless networks help solve this problem. Reliable transport protocols however, such as TCP that have been traditionally used for wired networks do not perform as well on wireless networks. This is because TCP assumes that packet loss and unusual delays are mainly caused by congestion. TCP is thus tuned to adapt to such congestion losses by slowing down the amount of data it transmits. It drops its transmission window size and backs off its retransmission timer, thus reducing the load and congestion on the network. In wireless networks however, packet loss is often caused due to other factors besides congestion. Wireless channels often suffer from high bit error rates (BER) and intermittent connectivity due to handoffs [8]. 2.2 TCP Protocol Since 1981, TCP is the most popular transfer layer protocol, which provides transparent segmentation and reassembly of user data, and handles flow and xxii

congestion control. For that reason, TCP is the base for Internet in this period [4]. Simply, TCP is transport layer connection oriented, reliable, full duplex, byte stream and end-to-end protocol [5]. Early TCP implementations only had a simple sliding window flow control mechanism without any congestion control. After observing a series of congestion collapses in 1980 s, Jacobson introduced several innovative congestion control mechanisms into TCP in 1988 and they called this version of TCP Tahoe, includes slow start congestion avoidance and fast retransmit algorithms. After two years, in 1990, they added fast recovery algorithm to Tahoe to form a new TCP version called TCP Reno, and currently it is the most popular version used in the Internet. The current TCP versions seem to be not so efficient for the modern networking environment. TCP can be used over a large variety of networking and physical infrastructures that have very different characteristics: Ethernet, FDDI, and ATM over wires, optical fibers, radio waves, or infrared signals. A TCP connection may, and usually does, work over all these different quality of service levels, and segments face different transmission environments [13]. xxiii

Fig.1 The TCP protocol TCP assumes that all losses indicate congestion simply as increased delay, and it avoids this problem by retransmitting the lost packet, but sometimes when TCP retransmit the lost packets, this retransmission will aggravate the congestion instead of alleviating it, leading to increased traffic, until the network becomes useless (Congestion collapse). To avoid congestion collapse, when losses are detected, TCP retransmits the lost packet, and also reduces its transmission rate, allowing router queues to drain. Subsequently, it gradually increases its transmission rate so as to gently probe the network s capacity [15]. We must remember that the router or any switching point has a finite strong capacity (buffer) so on the worst case the total number of data-grams arriving at the congested switching point will grow until it reaches full capacity and starts to drop data-grams. [16]. From TCP definition, TCP is a connection- xxiv