SlideShare a Scribd company logo
1 of 6
Download to read offline
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
  A Review of Improvement in TCP congestion Control Using
            Route Failure Detection in MANET
                                     S.A.Jain and Sujata K.Tapkir
                                           MAE, Alandi (D)
                      Emails: sajain@comp.maepune.ac.in, sujata.tapkir@gmail.com


Abstract
A mobile ad-hoc network is an autonomous collection of mobile devices that communicate with each other
over wireless links and cooperate in a distributed manner in order to provide the necessary network
functionality in the absence of a fixed infrastructure. This type of network, operating as a stand-alone
network or with one or multiple points of attachment to cellular networks or the Internet, paves the way for
numerous new and exciting applications. Route failure is very frequent in mobile ad hoc networks as the
nodes are mobile and is a very serious issue also which needs to be addressed. This paper provides an
insight into the TCP congestion control mechanism in mobile ad hoc networks (MANET) and discusses the
recently proposed route failure detection schemes. All these algorithms tend to increase the network
performance in terms of parameters like throughput, packet delivery ratio, end-to-end delay, route
reestablishment delay etc.

Keywords: ad hoc network, route failure, congestion, throughput

INTRODUCTION
At present, a large variety of networks exists, ranging from the well-known infrastructure of cellular
networks to non-infrastructure wireless ad-hoc networks. Wireless ad-hoc or on-the-fly networks are
characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize
themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. The
path between each pair of the users may have multiple links, and the radio between them can be
heterogeneous. This allows an association of various links to be a part of the same network. Mobile ad-hoc
networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as
the Internet. Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of
data over unreliable networks.




                                          Fig.1 Ad-Hoc Network

Due to the inherent reliability of wired networks, there is an implicit assumption made by TCP that any loss
is due to congestion. To reduce congestion, TCP will invoke its congestion control mechanisms whenever
any packet loss is detected. However, MANETs consisting of multi-hop wireless links suffer from packet

                                                     9
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
losses due to error-prone wireless channels, media access control (MAC) layer contention, and route
breakages. TCP will yield poor performance if it still interprets such losses as congestions and consequently
invokes congestion control and avoidance procedures. Some mechanisms have been proposed which help
TCP to distinguish between packet delivery loss due to route failure or, wireless link collisions on routes.
Part II provides a brief description of the current proposed mechanisms for route failure detection in the
MANET and part III contains the comparison of the algorithms in terms of network parameters. Finally
part IV gives conclusion and future scope.

II.ANALYSIS OF THE MECHANISMS

There are many algorithms for route failure detection and avoidance, some of them are explained below:

A. Node Movement Detection to Overcome False Route Failures [1]

There are two reasons of route failure in the MANET namely node mobility and wireless link collisions on
routes (i.e., false route failure). If the packet delivery loss is due to the latter, unnecessary route
reestablishment will degrade the network performance. This algorithm proposes a node movement
detection scheme that can predict false route failures and prevent unnecessary route reestablishments by
referring to changes in its neighborhood. In this mechanism, every node can determine its movement based
on its neighbor table and decide whether to retransmit a failed packet or to discover an alternate route. The
HELLO message is modified by adding an M flag bit to it. Every node in the network periodically
broadcasts modified HELLO messages to its neighbors via 1-hop flooding. If a node receives a HELLO
message with the M flag bit set to1, it updates its neighbor table and makes a prediction on its movement
by calculating changes in its neighborhood. This algorithm focuses on network parameters like end to end
distance and packet delivery ratio (PDR) for the static chain topology.

012 3 4 5 6 7 8 9 0 1 2 3 45 6 7 8 9 0 1 2 3 4 5 6 7 8 9
                                        Prefix Hop
Type R         A      M Reserved
                                         Size Count
                Destination IP address
            Destination Sequence Number
                       Lifetime
                                    Fig.2 Modified Hello message format

Steps for MDS:

Step1: Each node computes Vn periodically

Step2: If there is a packet delivery failure at the MAC layer, the MAC layer notifies the network layer of
the failure.

Step3: When the network layer receives the notification of a packet delivery failure from the MAC layer,

If Vn < Vn_threshold
Network layer retransmits the failed packet.
The network layer increases Vn by α (penalty for retransmission)
Else
The network layer establishes a detouring alternate route.
The Vn_threshold and α are calculated by following equations.




                                                     10
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




This algorithm was simulated in NS-2 and it was found that it gives higher TCP throughput than AODV
and performs almost the same as the static routing protocol. It also gives much higher PDR compared with
other schemes when nodes are static and in the mobile situation, MDS performs better than others when the
traffic load is high, i.e., when the CBR rate is above 30 Kbps.

B. Divert Failure Route Protocol Based on AODV [2]

This algorithm is extension to the main AODV protocol. The main goal is to improve the reliability of
routes after an existing link is going to be down due to nodes mobility. To achieve this objective, the
algorithm is going to develop a very useful mechanism in order to avoid a link failure in advance and
construct a new direction in locally (where the incident takes place). For this purpose, two working models
are developed namely “Detection –Model and New-Path-constructor- Model (DM-NPM)”.The main
functions of these models are to predict the signal strength and to determine a link status before it becomes
completely unavailable and find out a new direction to the destination to divert the current link into a route
with a strong transmission. This algorithm focuses on network parameters like Delay, speed, distance. This
algorithm was simulated in NS-2 and it was found that it avoids link failure in advance and reduces the
delay resulting from sending link failure information back to the sender. Some limitations of this scheme
are Low processing and Memory overhead. DFRP monitors the link to next hop and predict the link status
through the signal strength. Main functions of these Models are to predict the signal strength, and to find a
new route to divert the data to the new path, and improve the overall network health.

C. A Feedback-Based Scheme for Improving TCP Performance [3]

TCP Feedback is a feedback based approach to handle the route failures in MANETs. This approach allows
the TCP sender to distinguish between losses due to route failures and those due to network congestion. In
this scheme, the source is informed of the route failure with the help of a Route Failure
Notification(RFN)so that it does not unnecessarily invoke congestion control and can refrain from sending
any further packets until the route is restored with Route Re-establishment Notification(RRN). For this, it
uses a single bulk data transfer session, where a source mobile host is sending packets to a destination
mobile host As soon as the disruption of a route due to the mobility of the next mobile host along that route
is detected, a route failure notification (RFN) packet is explicitly sent to the source and this event is
recorded. This algorithm focuses on network parameters like Data rate, Failure rate, Route re-establishment
delay (RDD).
    This algorithm was simulated in NS-2 and it was found that it notifies the source of route failures and
route reestablishments. As the route re-establishment delay grows, TCP-F performs significantly better than
TCP and prevents unnecessary timer back offs during the route failure interval and performance
degradation. But some limitations of this scheme are like Throughput of TCP degrades rapidly with
increasing RRD and greater exponential back off. The result found that there is an improvement in
performance by using TCP-F over regular TCP. So for a given time interval the number of packets passing
through the network increases with data rate. Consequently, if we consider a failure that lasts for
the ‘t’ seconds, the number of packets that are lost in time ‘t’ increases with data rate, which leads to
further performance degradation in TCP. Therefore, as data rates in wireless media increase, feedback is
likely to provide even greater benefits.

D. Ant Colony Algorithm in MANET [4]

This algorithm is inspired from the basic behavior which ants exhibit. Real ants deposit a substance called
pheromone on the ground which helps them to find their food and shortest path from nest to food. It is a


                                                     11
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
link failure management algorithm which is based on the alternate route finding by ant agents. At the time
of data flow through the link, all the nodes in the links exchange hello message which symbolizes active
link. If a particular hello message does not get response, link break is detected. Node detecting link
breakage will queue up the data packed and search alternate path with the help of new type of packed
forward ant and backward ant. These control packets will soon find alternate path to the next node in the
link. This algorithm focuses on the end-to-end delay and overhead parameter of the mobile ad hoc network.
In this case, routing table will have one additional column which contains IP address of next to next node in
the active link, which is modified by RREP packet. RREP has information about all nodes present in the
link i.e. generated by the destination. This algorithm improves the network throughput and also reduces the
time needed to establish a route from source to destination. No Overhead in sending RERR and re-RREQ
packets. This algorithm was used by the researchers in the route discovery process but its usage to improve
the routing process will provide a new and exciting scope.

E. Reliable Cross-Layer Multicast with Local Backtracking [6]

 In the working model of reliable cross-layer multicast, Ad- hoc networks have been studied extensively to
 overcome network performance problems and improve performance. In this two types of solutions have
 been proposed; Layer triggers and Cross-layering. The cross-layer approach allows layers to actively
 interact, by exchanging some specific parameters through the adjacent layers. To provide reliable
 multicast and increase the performance of transport communication, the scheme uses the feedback
 information from an intermediate multicast node on detection of a path break. It says that if path is broken
 then, an upstream intermediate multicast node, called PN (Pivot node), and sends a backtracking
 notification message to its upstream nodes and the multicast source. The system maintains a hierarchical
 family group to provide local retransmission. Due to the node mobility problem a PN can be aware of
 either a link failure or congestion when it does not receive any acknowledgment from its downstream
 nodes after a specific interval. Therefore it can cumulate a region that acknowledges the reception of
 packets or request retransmission to the upstream agent node. For the simulation probability of link broken
 is considered. The advantage of this scheme is that the co-ordination of buffers and local repair scheme
 reduces the unnecessary reroute latency and packets retransmission from source node. The simulation
 experiments show that in terms of aggregate throughput and TCP congestion window progression, RBM is
 more efficient than the others.


III. COMPARISON

All the algorithms describe above are trying to improve the performance of mobile ad-hoc networks in one
way or the other by avoiding congestion. The node movement detection scheme takes into account both the
reasons of packet failure, i.e, node movement and wireless link collision. It performs better than AODV in
terms of TCP throughput and gives a higher packet delivery ratio when nodes are static whereas in case of
ant colony algorithm, only link failure is considered. This mechanism is a modification of AODV protocol
which tries to improve the throughput and end-to-end delay parameters. Probably overhead parameter will
also improve as control packets used in this case are only forward ants and backward ants. On the other
hand, control packets transmitted in pure AODV namely RERR and R-RREQ are not required. Divert
failure route protocol uses the most popular model of radio propagation to compute the received signal
powers which is not used in any other algorithm yet. In case of TCP-feedback based scheme, route failure
is likely to result in gaps in the receiver’s window, which adversely affects TCP’s cumulative
acknowledgment scheme. Therefore, it may be worthwhile exploring alternative end-to-end
acknowledgment schemes such as selective acknowledgment (SACK) and comparing their performance
with cumulative acknowledgment. The goal of Reliable Cross -Layer Multicast with Local Backtracking
algorithm is to avoid undesired retransmission from the source and further to improve the efficiency of
source-to-receivers delivery with the aid of buffer.

IV CONCLUSION


                                                     12
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012

We conclude that the cause of TCP performance degradation in MANETs is due to two major problem one
is TCP is unable to distinguish between losses due to route failures and network congestion. Second is TCP
suffers from frequent route failures. So these different algorithms which we have studied are trying to avoid
the route failures in many ways which ultimately helps to improve the TCP performance. Topics for further
research include thorough mathematical analysis of buffer size and to validate different models of DFRP
protocol using NS-2 simulator.


REFERENCES

[1] Hyun Yu, Sanghyun Ahn,” Node Movement Detection to Overcome False
Route Failures in Mobile Ad Hoc Networks”, 2008 IEEE DOI 10.1109/ICISS.2008.40
[2] Sayid Mohamed Abdule,Suhaidi Hassan,” Divert Failure Route Protocol Based on AODv”, 2010 IEEE
DOI 10.1109/NETAPPS.2010.19
[3]KartikChandran,Sudarshan Raghunathan,SubbarayanVenkatesan, Ravi Prakash,” A Feedback-Based
Scheme for Improving TCP Performance in Ad Hoc Wireless Networks”, IEEE Personal
Comsmunications, February 2001
[4] Jyoti Jain, Roopam Gupta, T.K. Bandhopadhyay,” Ant Colony Algorithm in MANET-Local link
repairing of AODV”, 2011 IEEE
[5] Sridhar K N, Mun Choon Chan,” Modeling Link Lifetime Data with Parametric Regression Models in
MANETs”,IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 12, DECEMBER 2009
[6] Y.-M. Huang, M.-H. Tsai, T.-C. Chiang, T.-W. Hou,” Reliable cross-layer multicast with local
backtracking for improving transmission control protocol performance in ad hoc networks”, The Institution
of Engineering and Technology 2007
[7] C. E. Perkins and P. Bhagwat, “Destination Sequenced Distance-Vector Routing(DSDV) for Mobile
Computers,” Proc. ACM SIGCOMM Conf. Commun. Architectures, Protocols and Apps., Aug. 1994, pp.
234–44
[8] K. N. Sridhar and M. C. Chan, “Stability and hop-count based approach for route computation in
MANET,” in Proc. IEEE ICCCN 2005, SanDiego, CA, Oct. 2005, pp. 25–31
[9] Rappaport, T. S.; .Wireless Communications: Principles and Practice(2nd 107 Edition)., Prentice Hall,
2002
[10] EWA ROMANOWICZ,” TCP with Explicit Link Failure Notification”, Department of Computer
Science, York University, Toronto, Canada
[11]Quing CHEN, Zhisheng NIU, “A delayed adaptive retransmission scheme for false route failure in
MANET”,2004 IEEE,10th asia-pacific conference on communications




                                                     13
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

What's hot

A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanambitlick
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
 

What's hot (19)

A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...New adaptation method based on cross layer and TCP over protocols to improve ...
New adaptation method based on cross layer and TCP over protocols to improve ...
 
3
33
3
 

Viewers also liked

Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCPselvakumar_b1985
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Viewers also liked (10)

Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Similar to Improving TCP in MANETs Using Route Failure Detection

Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manetijasuc
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
 

Similar to Improving TCP in MANETs Using Route Failure Detection (20)

Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manet
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
 
TCP for Wireless Environments
TCP for Wireless EnvironmentsTCP for Wireless Environments
TCP for Wireless Environments
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 

More from Alexander Decker

A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceAlexander Decker
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions ofAlexander Decker
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenAlexander Decker
 
A study on financial performance of restructured or revived slp es in kerala
A study on financial performance of restructured or revived slp es in keralaA study on financial performance of restructured or revived slp es in kerala
A study on financial performance of restructured or revived slp es in keralaAlexander Decker
 

More from Alexander Decker (20)

A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among science
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.
 
A study on the dimensions of
A study on the dimensions ofA study on the dimensions of
A study on the dimensions of
 
A study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal womenA study on knowledge and practice of post menopausal women
A study on knowledge and practice of post menopausal women
 
A study on financial performance of restructured or revived slp es in kerala
A study on financial performance of restructured or revived slp es in keralaA study on financial performance of restructured or revived slp es in kerala
A study on financial performance of restructured or revived slp es in kerala
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Improving TCP in MANETs Using Route Failure Detection

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 A Review of Improvement in TCP congestion Control Using Route Failure Detection in MANET S.A.Jain and Sujata K.Tapkir MAE, Alandi (D) Emails: sajain@comp.maepune.ac.in, sujata.tapkir@gmail.com Abstract A mobile ad-hoc network is an autonomous collection of mobile devices that communicate with each other over wireless links and cooperate in a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. This type of network, operating as a stand-alone network or with one or multiple points of attachment to cellular networks or the Internet, paves the way for numerous new and exciting applications. Route failure is very frequent in mobile ad hoc networks as the nodes are mobile and is a very serious issue also which needs to be addressed. This paper provides an insight into the TCP congestion control mechanism in mobile ad hoc networks (MANET) and discusses the recently proposed route failure detection schemes. All these algorithms tend to increase the network performance in terms of parameters like throughput, packet delivery ratio, end-to-end delay, route reestablishment delay etc. Keywords: ad hoc network, route failure, congestion, throughput INTRODUCTION At present, a large variety of networks exists, ranging from the well-known infrastructure of cellular networks to non-infrastructure wireless ad-hoc networks. Wireless ad-hoc or on-the-fly networks are characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. The path between each pair of the users may have multiple links, and the radio between them can be heterogeneous. This allows an association of various links to be a part of the same network. Mobile ad-hoc networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as the Internet. Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. Fig.1 Ad-Hoc Network Due to the inherent reliability of wired networks, there is an implicit assumption made by TCP that any loss is due to congestion. To reduce congestion, TCP will invoke its congestion control mechanisms whenever any packet loss is detected. However, MANETs consisting of multi-hop wireless links suffer from packet 9
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 losses due to error-prone wireless channels, media access control (MAC) layer contention, and route breakages. TCP will yield poor performance if it still interprets such losses as congestions and consequently invokes congestion control and avoidance procedures. Some mechanisms have been proposed which help TCP to distinguish between packet delivery loss due to route failure or, wireless link collisions on routes. Part II provides a brief description of the current proposed mechanisms for route failure detection in the MANET and part III contains the comparison of the algorithms in terms of network parameters. Finally part IV gives conclusion and future scope. II.ANALYSIS OF THE MECHANISMS There are many algorithms for route failure detection and avoidance, some of them are explained below: A. Node Movement Detection to Overcome False Route Failures [1] There are two reasons of route failure in the MANET namely node mobility and wireless link collisions on routes (i.e., false route failure). If the packet delivery loss is due to the latter, unnecessary route reestablishment will degrade the network performance. This algorithm proposes a node movement detection scheme that can predict false route failures and prevent unnecessary route reestablishments by referring to changes in its neighborhood. In this mechanism, every node can determine its movement based on its neighbor table and decide whether to retransmit a failed packet or to discover an alternate route. The HELLO message is modified by adding an M flag bit to it. Every node in the network periodically broadcasts modified HELLO messages to its neighbors via 1-hop flooding. If a node receives a HELLO message with the M flag bit set to1, it updates its neighbor table and makes a prediction on its movement by calculating changes in its neighborhood. This algorithm focuses on network parameters like end to end distance and packet delivery ratio (PDR) for the static chain topology. 012 3 4 5 6 7 8 9 0 1 2 3 45 6 7 8 9 0 1 2 3 4 5 6 7 8 9 Prefix Hop Type R A M Reserved Size Count Destination IP address Destination Sequence Number Lifetime Fig.2 Modified Hello message format Steps for MDS: Step1: Each node computes Vn periodically Step2: If there is a packet delivery failure at the MAC layer, the MAC layer notifies the network layer of the failure. Step3: When the network layer receives the notification of a packet delivery failure from the MAC layer, If Vn < Vn_threshold Network layer retransmits the failed packet. The network layer increases Vn by α (penalty for retransmission) Else The network layer establishes a detouring alternate route. The Vn_threshold and α are calculated by following equations. 10
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 This algorithm was simulated in NS-2 and it was found that it gives higher TCP throughput than AODV and performs almost the same as the static routing protocol. It also gives much higher PDR compared with other schemes when nodes are static and in the mobile situation, MDS performs better than others when the traffic load is high, i.e., when the CBR rate is above 30 Kbps. B. Divert Failure Route Protocol Based on AODV [2] This algorithm is extension to the main AODV protocol. The main goal is to improve the reliability of routes after an existing link is going to be down due to nodes mobility. To achieve this objective, the algorithm is going to develop a very useful mechanism in order to avoid a link failure in advance and construct a new direction in locally (where the incident takes place). For this purpose, two working models are developed namely “Detection –Model and New-Path-constructor- Model (DM-NPM)”.The main functions of these models are to predict the signal strength and to determine a link status before it becomes completely unavailable and find out a new direction to the destination to divert the current link into a route with a strong transmission. This algorithm focuses on network parameters like Delay, speed, distance. This algorithm was simulated in NS-2 and it was found that it avoids link failure in advance and reduces the delay resulting from sending link failure information back to the sender. Some limitations of this scheme are Low processing and Memory overhead. DFRP monitors the link to next hop and predict the link status through the signal strength. Main functions of these Models are to predict the signal strength, and to find a new route to divert the data to the new path, and improve the overall network health. C. A Feedback-Based Scheme for Improving TCP Performance [3] TCP Feedback is a feedback based approach to handle the route failures in MANETs. This approach allows the TCP sender to distinguish between losses due to route failures and those due to network congestion. In this scheme, the source is informed of the route failure with the help of a Route Failure Notification(RFN)so that it does not unnecessarily invoke congestion control and can refrain from sending any further packets until the route is restored with Route Re-establishment Notification(RRN). For this, it uses a single bulk data transfer session, where a source mobile host is sending packets to a destination mobile host As soon as the disruption of a route due to the mobility of the next mobile host along that route is detected, a route failure notification (RFN) packet is explicitly sent to the source and this event is recorded. This algorithm focuses on network parameters like Data rate, Failure rate, Route re-establishment delay (RDD). This algorithm was simulated in NS-2 and it was found that it notifies the source of route failures and route reestablishments. As the route re-establishment delay grows, TCP-F performs significantly better than TCP and prevents unnecessary timer back offs during the route failure interval and performance degradation. But some limitations of this scheme are like Throughput of TCP degrades rapidly with increasing RRD and greater exponential back off. The result found that there is an improvement in performance by using TCP-F over regular TCP. So for a given time interval the number of packets passing through the network increases with data rate. Consequently, if we consider a failure that lasts for the ‘t’ seconds, the number of packets that are lost in time ‘t’ increases with data rate, which leads to further performance degradation in TCP. Therefore, as data rates in wireless media increase, feedback is likely to provide even greater benefits. D. Ant Colony Algorithm in MANET [4] This algorithm is inspired from the basic behavior which ants exhibit. Real ants deposit a substance called pheromone on the ground which helps them to find their food and shortest path from nest to food. It is a 11
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 link failure management algorithm which is based on the alternate route finding by ant agents. At the time of data flow through the link, all the nodes in the links exchange hello message which symbolizes active link. If a particular hello message does not get response, link break is detected. Node detecting link breakage will queue up the data packed and search alternate path with the help of new type of packed forward ant and backward ant. These control packets will soon find alternate path to the next node in the link. This algorithm focuses on the end-to-end delay and overhead parameter of the mobile ad hoc network. In this case, routing table will have one additional column which contains IP address of next to next node in the active link, which is modified by RREP packet. RREP has information about all nodes present in the link i.e. generated by the destination. This algorithm improves the network throughput and also reduces the time needed to establish a route from source to destination. No Overhead in sending RERR and re-RREQ packets. This algorithm was used by the researchers in the route discovery process but its usage to improve the routing process will provide a new and exciting scope. E. Reliable Cross-Layer Multicast with Local Backtracking [6] In the working model of reliable cross-layer multicast, Ad- hoc networks have been studied extensively to overcome network performance problems and improve performance. In this two types of solutions have been proposed; Layer triggers and Cross-layering. The cross-layer approach allows layers to actively interact, by exchanging some specific parameters through the adjacent layers. To provide reliable multicast and increase the performance of transport communication, the scheme uses the feedback information from an intermediate multicast node on detection of a path break. It says that if path is broken then, an upstream intermediate multicast node, called PN (Pivot node), and sends a backtracking notification message to its upstream nodes and the multicast source. The system maintains a hierarchical family group to provide local retransmission. Due to the node mobility problem a PN can be aware of either a link failure or congestion when it does not receive any acknowledgment from its downstream nodes after a specific interval. Therefore it can cumulate a region that acknowledges the reception of packets or request retransmission to the upstream agent node. For the simulation probability of link broken is considered. The advantage of this scheme is that the co-ordination of buffers and local repair scheme reduces the unnecessary reroute latency and packets retransmission from source node. The simulation experiments show that in terms of aggregate throughput and TCP congestion window progression, RBM is more efficient than the others. III. COMPARISON All the algorithms describe above are trying to improve the performance of mobile ad-hoc networks in one way or the other by avoiding congestion. The node movement detection scheme takes into account both the reasons of packet failure, i.e, node movement and wireless link collision. It performs better than AODV in terms of TCP throughput and gives a higher packet delivery ratio when nodes are static whereas in case of ant colony algorithm, only link failure is considered. This mechanism is a modification of AODV protocol which tries to improve the throughput and end-to-end delay parameters. Probably overhead parameter will also improve as control packets used in this case are only forward ants and backward ants. On the other hand, control packets transmitted in pure AODV namely RERR and R-RREQ are not required. Divert failure route protocol uses the most popular model of radio propagation to compute the received signal powers which is not used in any other algorithm yet. In case of TCP-feedback based scheme, route failure is likely to result in gaps in the receiver’s window, which adversely affects TCP’s cumulative acknowledgment scheme. Therefore, it may be worthwhile exploring alternative end-to-end acknowledgment schemes such as selective acknowledgment (SACK) and comparing their performance with cumulative acknowledgment. The goal of Reliable Cross -Layer Multicast with Local Backtracking algorithm is to avoid undesired retransmission from the source and further to improve the efficiency of source-to-receivers delivery with the aid of buffer. IV CONCLUSION 12
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 We conclude that the cause of TCP performance degradation in MANETs is due to two major problem one is TCP is unable to distinguish between losses due to route failures and network congestion. Second is TCP suffers from frequent route failures. So these different algorithms which we have studied are trying to avoid the route failures in many ways which ultimately helps to improve the TCP performance. Topics for further research include thorough mathematical analysis of buffer size and to validate different models of DFRP protocol using NS-2 simulator. REFERENCES [1] Hyun Yu, Sanghyun Ahn,” Node Movement Detection to Overcome False Route Failures in Mobile Ad Hoc Networks”, 2008 IEEE DOI 10.1109/ICISS.2008.40 [2] Sayid Mohamed Abdule,Suhaidi Hassan,” Divert Failure Route Protocol Based on AODv”, 2010 IEEE DOI 10.1109/NETAPPS.2010.19 [3]KartikChandran,Sudarshan Raghunathan,SubbarayanVenkatesan, Ravi Prakash,” A Feedback-Based Scheme for Improving TCP Performance in Ad Hoc Wireless Networks”, IEEE Personal Comsmunications, February 2001 [4] Jyoti Jain, Roopam Gupta, T.K. Bandhopadhyay,” Ant Colony Algorithm in MANET-Local link repairing of AODV”, 2011 IEEE [5] Sridhar K N, Mun Choon Chan,” Modeling Link Lifetime Data with Parametric Regression Models in MANETs”,IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 12, DECEMBER 2009 [6] Y.-M. Huang, M.-H. Tsai, T.-C. Chiang, T.-W. Hou,” Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks”, The Institution of Engineering and Technology 2007 [7] C. E. Perkins and P. Bhagwat, “Destination Sequenced Distance-Vector Routing(DSDV) for Mobile Computers,” Proc. ACM SIGCOMM Conf. Commun. Architectures, Protocols and Apps., Aug. 1994, pp. 234–44 [8] K. N. Sridhar and M. C. Chan, “Stability and hop-count based approach for route computation in MANET,” in Proc. IEEE ICCCN 2005, SanDiego, CA, Oct. 2005, pp. 25–31 [9] Rappaport, T. S.; .Wireless Communications: Principles and Practice(2nd 107 Edition)., Prentice Hall, 2002 [10] EWA ROMANOWICZ,” TCP with Explicit Link Failure Notification”, Department of Computer Science, York University, Toronto, Canada [11]Quing CHEN, Zhisheng NIU, “A delayed adaptive retransmission scheme for false route failure in MANET”,2004 IEEE,10th asia-pacific conference on communications 13
  • 6. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).