SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer Applications (0975 – 8887)
                                                                                                   Volume 52– No.13, August 2012


        Comparative Analysis of Different TCP Variants in
                    Mobile Ad-Hoc Network
     Hrituparna Paul                  Anish Kumar Saha               Partha Pratim Deb                   Partha Sarathi
     Research Scholar                    Asstt. Professor               M.Tech CSE                       Bhattacharjee
     Dept. of Comp. Sc.             Dept. of Comp Sc & Engg.         Netaji Subhash Engg              Research Scholar
      Assam University                    N.I.T Agartala                    College                  Dept. of Comp. Sc.
                                                                     West Bengal, India             Assam University, Silchar


ABSTRACT                                                              This protocol is a standard networking protocol on the internet
Mobile Ad-Hoc Network is an autonomous group of mobile                and is the most widely used transport protocol for data
users that communicate using wireless links with no support           services like file transfer, e-mail and WWW browser. It is
from any pre-existing infrastructure network and used as a            primarily designed for wire-line networks, faces performance
highly reliable end-to-end protocol for transporting                  degradation when applied to the ad hoc scenario. In addition,
applications. But in wireless networks suffers from significant       various routing protocols behave differently over the variants
throughput degradation and delays. It uses Congestion Control         of TCP. It is essential to understand the performance of
and Avoidance algorithms which degrades end-to-end                    different MANET routing protocols under TCP variants. In
performance in wireless system. In this paper we have                 this paper, we have done a performance analysis of MANET
analyzed the performance of tcp algorithms with AODV, DSR             Routing Protocols over different TCP Variants.
and TORA for throughput. The effect of throughput on the              The paper is organised as follows. Section 1 provides
TCP variants New Reno, Reno and Tahoe with different node             Introduction. Section 2 describes the Standard TCP
scenarios was studied.                                                congestion control algorithms. Section 3 describes the various
                                                                      TCP variants. Section 4 presents the simulation setup of our
Keyword                                                               work. Finally Section 5 gives the future scope of our work
TCP Variants, Throughput.                                             concludes the paper.

1. INTRODUCTION                                                       2. TCP CONGESTION CONTROL
Mobile Ad Hoc Networks (MANETs) are wireless mobile                   ALGORITHMS
nodes or an autonomous group of mobile users that                     The four algorithms, Slow Start, Congestion Avoidance, Fast
cooperatively form a network without infrastructure. This             Retransmit and Fast Recovery [4][5] are described below:
network allows devices to create a network on demand
without prior coordination or configuration and nodes within a        2.1. Slow Start [9]
MANET are involved in routing and forwarding information              Slow Start, a requirement for TCP software implementations
between neighbors.                                                    is a mechanism used by the sender to control the transmission
There is a direct communication among neighboring devices             rate, and also known as sender based flow control. This is
in MANETs but communication between non-neighboring                   accomplished through the return rate of acknowledgements
devices requires a routing algorithm. A lot of work has been          from the receiver. In other words, the rate of
done on routing protocols since they are critical to the              acknowledgements returned by the receiver determines the
functioning of ad-hoc networks [1], [2], [3] Within the two           rate at which the sender can transmit data.
categories of routing protocols described in literature:              When a TCP connection first begins, the Slow Start algorithm
Proactive and Reactive, it is more suited for highly mobile ad        initializes a congestion window to one segment, which is the
hoc networks due to its ability to cope with rapidly changing         maximum segment size (MSS) initialized by the receiver
network topologies. Because there is no coordination or               during the connection establishment phase and when
configuration prior to setup of a MANET, there are several            acknowledgements are returned by the receiver, the
challenges and these challenges include routing packets in an         congestion window increases by one segment for each
environment where the topology is changing frequently and             acknowledgement returned. In this way, the sender can
the task of locating a node and maintain a path to it becomes         transmit the minimum of the congestion window and the
increasingly in the face of node mobility.                            advertised window of the receiver, which is simply called the
Transport Control Protocol /Internet Protocol (TCP/IP) is a           transmission window.
connection oriented protocol of the transport layer. It provides      At some point the congestion window may become too large
features like flow control, reliability and congestion control. It    for the network or network conditions may change such that
has been very effective in data transmission delivery and have        packets may be dropped. Packets lost will trigger a timeout at
also developed variants to possess the possibility to increase        the sender and when this happens, the sender goes into
performance and multiple packet loss recovery.                        congestion avoidance mode.
Today, the TCP is extensively tuned to provide high-quality
performance in the conventional wired network. In fact, the           2.2. Congestion Avoidance [9]
TCP is responsible for providing reliable data transport in the       During data transfer phase of a TCP connection the Slow Start
Internet. However, it cannot offer reliable service while using       algorithm is used. There may be a point during Slow Start that
e-mail, internet search and file transmission in a MANET.             the network is forced to drop one or more packets due to



                                                                                                                                  19
International Journal of Computer Applications (0975 – 8887)
                                                                                                      Volume 52– No.13, August 2012

overload or congestion. When this happens, Congestion                    based on a principle of conservation of packets, i.e. if the
Avoidance is used to slow the transmission rate and Slow                 connection is running at the available bandwidth capacity then
Start is used in conjunction with Congestion Avoidance as the            a packet is not injected into the network unless a packet is
means to get the data transfer going again so it doesn’t slow            taken out as well. It implements this principle by using the
down and stay slow.                                                      acknowledgements to clock outgoing packets because an
In the Congestion Avoidance [9] algorithm a retransmission               acknowledgement means that a packet was taken off the wire
timer expiring or the reception of duplicate ACKs can                    by the receiver. It also maintains a congestion window CWD
implicitly signal the sender that a network congestion                   to reflect the network capacity. It suggests that whenever a
situation is occurring. The sender immediately sets its                  TCP connection starts or re-starts after a packet loss it should
transmission window to one half of the current window size               go through a procedure called slow-start. Reason for this
(the minimum of the congestion window and the receiver’s                 procedure is that an initial burst might overwhelm the network
advertised window size), but to at least two segments. If                and the connection might never get started.
congestion was indicated by a timeout, the congestion                    The congestion window size is multiplicatively increased that
window is reset to one segment, which automatically puts the             is it becomes double for each transmission until it encounters
sender into Slow Start mode. If congestion was indicated by              congestion. Slow start suggests that the sender set the
duplicate ACKs, the Fast Retransmit and Fast Recovery                    congestion window to 1 and then for each ACK received it
algorithms are invoked.                                                  increase the CWD by 1. So in the first round trip time (RTT)
As data is received during Congestion Avoidance, the                     we send 1 packet, in the second we send 2 and in the third we
congestion window is increased. However, Slow Start is only              send 4. Thus we increase exponentially until we lose a packet
used up to the halfway point where congestion originally                 which is a sign of congestion. When we encounter congestion
occurred. This halfway point was recorded earlier as the new             we decreases our sending rate and we reduce congestion
transmission window. After this halfway point, the congestion            window to one. And start over again. The important thing is
window is increased by one segment for all segments in the               that Tahoe detects packet losses by timeouts. Sender is
transmission window that are acknowledged. This mechanism                notified that congestion has occurred based on the packet loss.
will force the sender to more slowly grow its transmission
rate, as it will approach the point where congestion had                 3.2. TCP Reno
previously been detected.                                                This RENO retains the basic principle of Tahoe, such as slow
                                                                         starts and the coarse grain retransmit timer [8]. However it
2.3. Fast Retransmit and Fast Recovery [9]                               adds some intelligence over it so that lost packets are detected
Whenever a packet segment is transmitted, TCP sets a timer               earlier and the pipeline is not emptied every time a packet is
each time and thus it ensures the reliability. TCP retransmits           lost. Reno requires that we receive immediate
the packet, if it does not obtain any acknowledgement within             acknowledgement whenever a segment is received. The logic
the fixed time-out interval and the reason for not getting any           behind this is that whenever we receive a duplicate
ACKs within a specific duration is due to either the packet              acknowledgment, then his duplicate acknowledgment could
loss or the network congestion. Therefore the TCP sender                 have been received if the next segment in sequence expected,
implements the fast retransmit algorithm for identifying and             has been delayed in the network and the segments reached
also repairing the loss. This fast retransmit phase is applied           there out of order or else that the packet is lost. If we receive a
mainly based on the incoming duplicate ACKs and as TCP is                number of duplicate acknowledgements then that means that
not able to understand whether a packet loss or an out-of-               sufficient time have passed and even if the segment had taken
order segment causes the generation of the duplicate ACK, it             a longer path, it should have gotten to the receiver by now.
waits for more duplicate ACKs to be received. Because in                 There is a very high probability that it was lost. So Reno
case of out-of order segment, one or two duplicate ACKs will             suggests Fast Re- Transmit. Whenever we receive 3 duplicate
be received before the reordered segment is processed and on             ACK‘s we take it as a sign that the segment was lost, so we
the other hand, if there are at least three duplicate ACKs in a          re-transmit the segment without waiting for timeout.
row, it can be assumed that a segment has been lost. In that             Thus we manage to re-transmit the segment with the pipe
case, the sender will retransmit the missing data packets for a          almost full. Another modification that RENO makes is in that
retransmission timer to expire without waiting.                          after a packet loss, it does not reduce the congestion window
                                                                         to 1. Since this empties the pipe. It enters into an algorithm
After the missing segment is retransmitted, the TCP will                 which we call Fast-Recovery.
initiate the fast recovery mechanism until a non-duplicate
ACK arrives. The fast recovery algorithm is an improvement               3.3. TCP New Reno
of congestion control mechanism that ensures higher
                                                                         New RENO is a slight modification over TCP-RENO. It is
throughput even during moderate congestion and the receiver
                                                                         able to detect multiple packet losses and thus is much more
yields the duplicate ACK only when another segment is
                                                                         efficient that RENO in the event of multiple packet losses.
reached to it. Therefore this segment is kept in the receiver's
                                                                         Like RENO, New-RENO [7] also enters into fast retransmit
buffer and does not consume any network resources. This
                                                                         when it receives multiple duplicate packets, however it differs
means that data flow is still running in the network, and TCP is
reluctant to reduce the flow immediately by moving into the slow
                                                                         from RENO in that it doesn‘t exit fast recovery until all the
start phase. Thus, in that case in fast recovery algorithm, congestion   data which was out standing at the time it entered fast
avoidance phase is again invoked instead of slow start phase as soon     recovery is acknowledged. The fast recovery phase proceeds
as the fast retransmission mechanism is completed                        as in Reno, however when a fresh ACK is received then there
3. TCP VARIANTS                                                          are two cases

3.1. TCP Tahoe                                                                    If it ACK‘s all the segments which were outstanding
                                                                                   when we entered fast recovery then it exits fast
Tahoe [5] refers to the TCP congestion control algorithm
                                                                                   recovery and sets CWD to threshold value and
which was suggested by Van Jacobson in his paper. TCP is
                                                                                   continues congestion avoidance like Tahoe.



                                                                                                                                         20
International Journal of Computer Applications (0975 – 8887)
                                                                                                 Volume 52– No.13, August 2012

        If the ACK is a partial ACK then it deduces that the       Total time consumed by each protocol for sending the data
         next segment in line was lost and it re-transmits that     through New Reno, Reno and Tahoe is relatively smaller for
         segment and sets the number of duplicate ACKS              AODV followed by DSR and than TORA. That is TORA has
         received to zero. It exits Fast recovery when all the      worst throughput performance in each of the three cases for
         data in the window is acknowledged.                        MANET in 3 nodes. The cause behind the TORA less
                                                                    performance is considered as the reality of TORA working for
4. SIMULATION                                                       route recreation, maintenance and erasure, if dropping of the
We have evaluated the performance of different variants of          route occurs, that requires more time and have bad impact in
TCP using OPNET simulator. Here AODV, DSR and TORA                  the data performance.
are simulated with different TCP algorithms with different
scenarios (three, five node scenarios).                             In five nodes scenario five nodes working as clients to
                                                                    establish connection with a fixed node working as source, and
 In three node scenarios the throughput performance between         to transfer a file of the same size over each connection.
AODV and DSR at approximately 25 seconds, AODV has
better throughput performance over DSR and comparing                Comparing all the three graphs with each other we observe
AODV with TORA at the approximation of 95 sec, AODV                 that as the number of the nodes are increased approximately
provides better throughput performance, in all the three            75% (3 to 5), throughput has been decreased for every TCP
graphs.                                                             variant and each desired protocols.




                                      Fig:1 Throughput comparison in three nodes scenario




                                       Fig:2 Throughput comparison in five nodes scenario

5. CONCLUSION                                                       MANET. However simulation results for AODV with respect
It has been concluded that throughput performance of DSR            to New Reno, Reno and Tahoe depict that throughput is the
and TORA are minutely affected with increase in the number          same in all the cases, so our proposed solution in this case will
of nodes and due to mobility. In general, MANET could have          be New Reno as it offers multiple packet loss recovery.
dynamic number of nodes connectivity in mobility, so it’s
                                                                    For future work we propose to study the performance of these
important to realize that when the number of nodes is higher,
                                                                    TCP variants for different routing protocols such as OLSR,
DSR and TORA would be avoided. AODV has better
                                                                    DSDV. We would also like to expand the range of analysis by
throughput performance shown in all three figures as
                                                                    considering other new TCP's like HSTCP, TCP Westwood,
compared to DSR and TORA and is the best solution for
                                                                    TCP Veno, TCP Vegas etc.



                                                                                                                                  21
International Journal of Computer Applications (0975 – 8887)
                                                                                           Volume 52– No.13, August 2012


6. REFERENCES                                                 [5] JACOBSON, V. Congestion avoidance and control. In
[1] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand                 Proceedings of SIGCOMM ’88 (Stanford, CA, Aug.
    distance vector routing”, Proceedings of the 2nd IEEE          1988), ACM.
    Workshop on Mobile Computing Systems and                  [6] Laxmi Subedi, Mohamadreza Najiminaini, and Ljiljana
    Applications, New Orleans, LA, pp. 90-100, February            Trajkovi Performance Evaluation of TCP Tahoe, Reno,
    1999.                                                          Reno with SACK, and NewReno using OPNET Modeler.
[2] D. Johnson, D. Maltz and Y. Hu., “The dynamic source      [7] S.Floyd, T.Henderson “The New- Reno Modification to
     routing protocol for mobile ad hoc networks”, IETF            TCP’s Fast Recovery Algorithm” RFC 2582, Apr 1999.
     MANET Working Group, Internet Draft, 2003.
                                                              [8] O. Ait-Hellal, E.Altman “Analysis of TCP Reno and TCP
[3] M.K.J. Kumar and R.S. Rajesh, “Performance analysis of         Vegas”.
     MANET routing protocols in different mobility models”,
     IJCSNS International Journal of Computer Science and     [9]    Suhas Waghmare et. al “Comparative Analysis of
     Network Security, vol. 9 No.2, pp 22-29, Feb 2009              different TCP variants in a wireless environment”, 978-
                                                                    1-4244-8679-3/11 ©2011 IEEE

[4] K.Kathiravan, Dr. S. Thamarai Selvi, A.Selvam “Tcp
    Performance Analysis For Mobile Ad Hoc Network
    Using Ondemand Routing Protocols.




                                                                                                                        22

More Related Content

What's hot

Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCPselvakumar_b1985
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion controlShubham Jain
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationBala Lavanya
 
Congestion control
Congestion controlCongestion control
Congestion controlAbhay Pai
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Justin Frankel
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithmUmesh Gupta
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceKevin Tong
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow ControlRam Dutt Shukla
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 

What's hot (20)

TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
Cubic
CubicCubic
Cubic
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
 
Lect9
Lect9Lect9
Lect9
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Tcp(no ip) review part2
Tcp(no ip) review part2Tcp(no ip) review part2
Tcp(no ip) review part2
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 

Viewers also liked

Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 

Viewers also liked (13)

Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Unit 4
Unit 4Unit 4
Unit 4
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 

Similar to Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network

Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismIDES Editor
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_controlingenioustech
 

Similar to Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network (20)

Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
 
C25008013
C25008013C25008013
C25008013
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
A dynamic performance-based_flow_control
A dynamic performance-based_flow_controlA dynamic performance-based_flow_control
A dynamic performance-based_flow_control
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 

Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network

  • 1. International Journal of Computer Applications (0975 – 8887) Volume 52– No.13, August 2012 Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Hrituparna Paul Anish Kumar Saha Partha Pratim Deb Partha Sarathi Research Scholar Asstt. Professor M.Tech CSE Bhattacharjee Dept. of Comp. Sc. Dept. of Comp Sc & Engg. Netaji Subhash Engg Research Scholar Assam University N.I.T Agartala College Dept. of Comp. Sc. West Bengal, India Assam University, Silchar ABSTRACT This protocol is a standard networking protocol on the internet Mobile Ad-Hoc Network is an autonomous group of mobile and is the most widely used transport protocol for data users that communicate using wireless links with no support services like file transfer, e-mail and WWW browser. It is from any pre-existing infrastructure network and used as a primarily designed for wire-line networks, faces performance highly reliable end-to-end protocol for transporting degradation when applied to the ad hoc scenario. In addition, applications. But in wireless networks suffers from significant various routing protocols behave differently over the variants throughput degradation and delays. It uses Congestion Control of TCP. It is essential to understand the performance of and Avoidance algorithms which degrades end-to-end different MANET routing protocols under TCP variants. In performance in wireless system. In this paper we have this paper, we have done a performance analysis of MANET analyzed the performance of tcp algorithms with AODV, DSR Routing Protocols over different TCP Variants. and TORA for throughput. The effect of throughput on the The paper is organised as follows. Section 1 provides TCP variants New Reno, Reno and Tahoe with different node Introduction. Section 2 describes the Standard TCP scenarios was studied. congestion control algorithms. Section 3 describes the various TCP variants. Section 4 presents the simulation setup of our Keyword work. Finally Section 5 gives the future scope of our work TCP Variants, Throughput. concludes the paper. 1. INTRODUCTION 2. TCP CONGESTION CONTROL Mobile Ad Hoc Networks (MANETs) are wireless mobile ALGORITHMS nodes or an autonomous group of mobile users that The four algorithms, Slow Start, Congestion Avoidance, Fast cooperatively form a network without infrastructure. This Retransmit and Fast Recovery [4][5] are described below: network allows devices to create a network on demand without prior coordination or configuration and nodes within a 2.1. Slow Start [9] MANET are involved in routing and forwarding information Slow Start, a requirement for TCP software implementations between neighbors. is a mechanism used by the sender to control the transmission There is a direct communication among neighboring devices rate, and also known as sender based flow control. This is in MANETs but communication between non-neighboring accomplished through the return rate of acknowledgements devices requires a routing algorithm. A lot of work has been from the receiver. In other words, the rate of done on routing protocols since they are critical to the acknowledgements returned by the receiver determines the functioning of ad-hoc networks [1], [2], [3] Within the two rate at which the sender can transmit data. categories of routing protocols described in literature: When a TCP connection first begins, the Slow Start algorithm Proactive and Reactive, it is more suited for highly mobile ad initializes a congestion window to one segment, which is the hoc networks due to its ability to cope with rapidly changing maximum segment size (MSS) initialized by the receiver network topologies. Because there is no coordination or during the connection establishment phase and when configuration prior to setup of a MANET, there are several acknowledgements are returned by the receiver, the challenges and these challenges include routing packets in an congestion window increases by one segment for each environment where the topology is changing frequently and acknowledgement returned. In this way, the sender can the task of locating a node and maintain a path to it becomes transmit the minimum of the congestion window and the increasingly in the face of node mobility. advertised window of the receiver, which is simply called the Transport Control Protocol /Internet Protocol (TCP/IP) is a transmission window. connection oriented protocol of the transport layer. It provides At some point the congestion window may become too large features like flow control, reliability and congestion control. It for the network or network conditions may change such that has been very effective in data transmission delivery and have packets may be dropped. Packets lost will trigger a timeout at also developed variants to possess the possibility to increase the sender and when this happens, the sender goes into performance and multiple packet loss recovery. congestion avoidance mode. Today, the TCP is extensively tuned to provide high-quality performance in the conventional wired network. In fact, the 2.2. Congestion Avoidance [9] TCP is responsible for providing reliable data transport in the During data transfer phase of a TCP connection the Slow Start Internet. However, it cannot offer reliable service while using algorithm is used. There may be a point during Slow Start that e-mail, internet search and file transmission in a MANET. the network is forced to drop one or more packets due to 19
  • 2. International Journal of Computer Applications (0975 – 8887) Volume 52– No.13, August 2012 overload or congestion. When this happens, Congestion based on a principle of conservation of packets, i.e. if the Avoidance is used to slow the transmission rate and Slow connection is running at the available bandwidth capacity then Start is used in conjunction with Congestion Avoidance as the a packet is not injected into the network unless a packet is means to get the data transfer going again so it doesn’t slow taken out as well. It implements this principle by using the down and stay slow. acknowledgements to clock outgoing packets because an In the Congestion Avoidance [9] algorithm a retransmission acknowledgement means that a packet was taken off the wire timer expiring or the reception of duplicate ACKs can by the receiver. It also maintains a congestion window CWD implicitly signal the sender that a network congestion to reflect the network capacity. It suggests that whenever a situation is occurring. The sender immediately sets its TCP connection starts or re-starts after a packet loss it should transmission window to one half of the current window size go through a procedure called slow-start. Reason for this (the minimum of the congestion window and the receiver’s procedure is that an initial burst might overwhelm the network advertised window size), but to at least two segments. If and the connection might never get started. congestion was indicated by a timeout, the congestion The congestion window size is multiplicatively increased that window is reset to one segment, which automatically puts the is it becomes double for each transmission until it encounters sender into Slow Start mode. If congestion was indicated by congestion. Slow start suggests that the sender set the duplicate ACKs, the Fast Retransmit and Fast Recovery congestion window to 1 and then for each ACK received it algorithms are invoked. increase the CWD by 1. So in the first round trip time (RTT) As data is received during Congestion Avoidance, the we send 1 packet, in the second we send 2 and in the third we congestion window is increased. However, Slow Start is only send 4. Thus we increase exponentially until we lose a packet used up to the halfway point where congestion originally which is a sign of congestion. When we encounter congestion occurred. This halfway point was recorded earlier as the new we decreases our sending rate and we reduce congestion transmission window. After this halfway point, the congestion window to one. And start over again. The important thing is window is increased by one segment for all segments in the that Tahoe detects packet losses by timeouts. Sender is transmission window that are acknowledged. This mechanism notified that congestion has occurred based on the packet loss. will force the sender to more slowly grow its transmission rate, as it will approach the point where congestion had 3.2. TCP Reno previously been detected. This RENO retains the basic principle of Tahoe, such as slow starts and the coarse grain retransmit timer [8]. However it 2.3. Fast Retransmit and Fast Recovery [9] adds some intelligence over it so that lost packets are detected Whenever a packet segment is transmitted, TCP sets a timer earlier and the pipeline is not emptied every time a packet is each time and thus it ensures the reliability. TCP retransmits lost. Reno requires that we receive immediate the packet, if it does not obtain any acknowledgement within acknowledgement whenever a segment is received. The logic the fixed time-out interval and the reason for not getting any behind this is that whenever we receive a duplicate ACKs within a specific duration is due to either the packet acknowledgment, then his duplicate acknowledgment could loss or the network congestion. Therefore the TCP sender have been received if the next segment in sequence expected, implements the fast retransmit algorithm for identifying and has been delayed in the network and the segments reached also repairing the loss. This fast retransmit phase is applied there out of order or else that the packet is lost. If we receive a mainly based on the incoming duplicate ACKs and as TCP is number of duplicate acknowledgements then that means that not able to understand whether a packet loss or an out-of- sufficient time have passed and even if the segment had taken order segment causes the generation of the duplicate ACK, it a longer path, it should have gotten to the receiver by now. waits for more duplicate ACKs to be received. Because in There is a very high probability that it was lost. So Reno case of out-of order segment, one or two duplicate ACKs will suggests Fast Re- Transmit. Whenever we receive 3 duplicate be received before the reordered segment is processed and on ACK‘s we take it as a sign that the segment was lost, so we the other hand, if there are at least three duplicate ACKs in a re-transmit the segment without waiting for timeout. row, it can be assumed that a segment has been lost. In that Thus we manage to re-transmit the segment with the pipe case, the sender will retransmit the missing data packets for a almost full. Another modification that RENO makes is in that retransmission timer to expire without waiting. after a packet loss, it does not reduce the congestion window to 1. Since this empties the pipe. It enters into an algorithm After the missing segment is retransmitted, the TCP will which we call Fast-Recovery. initiate the fast recovery mechanism until a non-duplicate ACK arrives. The fast recovery algorithm is an improvement 3.3. TCP New Reno of congestion control mechanism that ensures higher New RENO is a slight modification over TCP-RENO. It is throughput even during moderate congestion and the receiver able to detect multiple packet losses and thus is much more yields the duplicate ACK only when another segment is efficient that RENO in the event of multiple packet losses. reached to it. Therefore this segment is kept in the receiver's Like RENO, New-RENO [7] also enters into fast retransmit buffer and does not consume any network resources. This when it receives multiple duplicate packets, however it differs means that data flow is still running in the network, and TCP is reluctant to reduce the flow immediately by moving into the slow from RENO in that it doesn‘t exit fast recovery until all the start phase. Thus, in that case in fast recovery algorithm, congestion data which was out standing at the time it entered fast avoidance phase is again invoked instead of slow start phase as soon recovery is acknowledged. The fast recovery phase proceeds as the fast retransmission mechanism is completed as in Reno, however when a fresh ACK is received then there 3. TCP VARIANTS are two cases 3.1. TCP Tahoe  If it ACK‘s all the segments which were outstanding when we entered fast recovery then it exits fast Tahoe [5] refers to the TCP congestion control algorithm recovery and sets CWD to threshold value and which was suggested by Van Jacobson in his paper. TCP is continues congestion avoidance like Tahoe. 20
  • 3. International Journal of Computer Applications (0975 – 8887) Volume 52– No.13, August 2012  If the ACK is a partial ACK then it deduces that the Total time consumed by each protocol for sending the data next segment in line was lost and it re-transmits that through New Reno, Reno and Tahoe is relatively smaller for segment and sets the number of duplicate ACKS AODV followed by DSR and than TORA. That is TORA has received to zero. It exits Fast recovery when all the worst throughput performance in each of the three cases for data in the window is acknowledged. MANET in 3 nodes. The cause behind the TORA less performance is considered as the reality of TORA working for 4. SIMULATION route recreation, maintenance and erasure, if dropping of the We have evaluated the performance of different variants of route occurs, that requires more time and have bad impact in TCP using OPNET simulator. Here AODV, DSR and TORA the data performance. are simulated with different TCP algorithms with different scenarios (three, five node scenarios). In five nodes scenario five nodes working as clients to establish connection with a fixed node working as source, and In three node scenarios the throughput performance between to transfer a file of the same size over each connection. AODV and DSR at approximately 25 seconds, AODV has better throughput performance over DSR and comparing Comparing all the three graphs with each other we observe AODV with TORA at the approximation of 95 sec, AODV that as the number of the nodes are increased approximately provides better throughput performance, in all the three 75% (3 to 5), throughput has been decreased for every TCP graphs. variant and each desired protocols. Fig:1 Throughput comparison in three nodes scenario Fig:2 Throughput comparison in five nodes scenario 5. CONCLUSION MANET. However simulation results for AODV with respect It has been concluded that throughput performance of DSR to New Reno, Reno and Tahoe depict that throughput is the and TORA are minutely affected with increase in the number same in all the cases, so our proposed solution in this case will of nodes and due to mobility. In general, MANET could have be New Reno as it offers multiple packet loss recovery. dynamic number of nodes connectivity in mobility, so it’s For future work we propose to study the performance of these important to realize that when the number of nodes is higher, TCP variants for different routing protocols such as OLSR, DSR and TORA would be avoided. AODV has better DSDV. We would also like to expand the range of analysis by throughput performance shown in all three figures as considering other new TCP's like HSTCP, TCP Westwood, compared to DSR and TORA and is the best solution for TCP Veno, TCP Vegas etc. 21
  • 4. International Journal of Computer Applications (0975 – 8887) Volume 52– No.13, August 2012 6. REFERENCES [5] JACOBSON, V. Congestion avoidance and control. In [1] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand Proceedings of SIGCOMM ’88 (Stanford, CA, Aug. distance vector routing”, Proceedings of the 2nd IEEE 1988), ACM. Workshop on Mobile Computing Systems and [6] Laxmi Subedi, Mohamadreza Najiminaini, and Ljiljana Applications, New Orleans, LA, pp. 90-100, February Trajkovi Performance Evaluation of TCP Tahoe, Reno, 1999. Reno with SACK, and NewReno using OPNET Modeler. [2] D. Johnson, D. Maltz and Y. Hu., “The dynamic source [7] S.Floyd, T.Henderson “The New- Reno Modification to routing protocol for mobile ad hoc networks”, IETF TCP’s Fast Recovery Algorithm” RFC 2582, Apr 1999. MANET Working Group, Internet Draft, 2003. [8] O. Ait-Hellal, E.Altman “Analysis of TCP Reno and TCP [3] M.K.J. Kumar and R.S. Rajesh, “Performance analysis of Vegas”. MANET routing protocols in different mobility models”, IJCSNS International Journal of Computer Science and [9] Suhas Waghmare et. al “Comparative Analysis of Network Security, vol. 9 No.2, pp 22-29, Feb 2009 different TCP variants in a wireless environment”, 978- 1-4244-8679-3/11 ©2011 IEEE [4] K.Kathiravan, Dr. S. Thamarai Selvi, A.Selvam “Tcp Performance Analysis For Mobile Ad Hoc Network Using Ondemand Routing Protocols. 22