SlideShare a Scribd company logo
1 of 4
Download to read offline
Review: “Measurement and Modeling of the Origins of Starvation of
Congestion-Controlled Flows in Wireless Mesh Networks”
Bhavesh Singh
2010CS50281
1. Summary
1.1 Motivation
The basic scenario of any CSMA-based Mesh Networks is sufficient to induce starvation.
Previous work showed that severe unfairness and even complete starvation can occur in
multi-hop wireless networks due to MAC behavior. TCP magnifies MAC unfair contention.
Though significant progress has been made in this area, no prior work identified severe
throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow
contends with a two-hop flow for gateway access. The prior understanding of “why starvation
occurs” is incorrect and has yielded solutions that are not effective because it is believed that
TCP pacing/smart dropping with the optimal pacing rate solves this. It is also believed that
limiting or fixing TCP window to a small value is sufficient to induce fairness. These two beliefs
are not only the reason for starvation according to the authors.

1.2 Contribution
Their contributions are as follows 







Described the protocol origins of starvation as a compounding effect of three factors:
1. the MAC protocol induces bistability in which pairs of nodes alternate in capturing
system resources
2. despite the inherent symmetry of MAC bistability, the transport protocol induces
asymmetry in the time spent in each state and favors the one-hop flow
3. most critically, the multihop flow’s transmitter often incurs a high penalty in terms
of loss, delay, and consequently, throughput, in order to recapture system
resources
Demonstrated the existence of starvation under saturation conditions and show that only
a one-hop TCP flow in competition with a two-hop TCP flow is sufficient to induce
starvation.
Developed an analytical model both to study starvation and to devise a solution to
counter starvation.
Their counter-starvation policy completely solves the starvation problem.
Implement and empirically validate the solution on MirrorMesh, a network redeployment within the same urban environment.
1|Page
1.3 Methodology
Authors have presented an experimental demonstration of starvation in urban mesh
networks, an analysis of starvation’s cross layer protocol origins, an analytical model and a
counter-starvation policy, the experimental evaluation of such a policy. This methodology can
be briefly understood from the following points

STARVATION IN URBAN MESH NETWORKS: First authors defined a basic topology of any
mesh network as shown in Fig. 1, in which two mesh nodes, A and B are located two and
one hops away from the gateway, GW, respectively. This topology is necessarily
embedded in any larger mesh network topology given that mesh networks are defined as
multihop wireless networks with gateways.

Then they experimentally demonstrate the potential for starvation in the TFA
network. TFA network is an operational mesh network that provides Internet access in a
densely populated urban neighborhood in Houston. They showed that the two-hop node
(A) “starves” when contending with the one-hop node (B).


STARVATION’S PROTOCOL ORIGINS: The collision avoidance mechanism in CSMA/CA
causes bistability, in which node pairs (A,B) and (B,GW) alternate in transmission of
multiple packet bursts. In order to understand the bistability, we first examine the
behavior of two flows in the scenario where the gateway node GW and two-hop node A
contend for transmitting TCP ACK and TCP DATA, respectively.
Due to such factors like bistability, asymmetry induced by sliding window and
some severe transition penalties, Node A faces severe starvation in the basic topology.
Then they also showed demonstration for the broader topology.



ANALYTICAL MODEL AND STARVATION SOLUTION: The analytical model was designed
with the following objectiveso Isolate and capture the root cause of starvation
o Only model one aspect of congestion control
 Sliding window
Technique used was Embedded Markov chain model.

2|Page


Counter-Starvation Policy: All nodes that are directly connected to a gateway, or
gateways in case of multiple gateways, should increase their minimum contention
window to a value greater than that of all other nodes.
o Simple to implement-no overhead or message exchange between nodes.
o Compliant with IEEE 802.11e EDCA.



Evaluation:

o Model
 Static sliding window congestion control mechanism
o NS2
 Fixed TCP congestion window (TCP mechanisms including timeouts and
cumulative ACKs)
o NS2
 Legacy TCP New Reno (dynamic congestion window)
o TFA
 Legacy TCP New Reno (dynamic congestion window + MAC and PHY
influences)
1.4 Conclusion
The interaction of one-hop TCP flows with two-hop TCP flows is sufficient to induce
starvation. They measured starvation in an operational multitier urban mesh network and
describe how the starvation’s originating factors stem from interaction between the
transport layer’s congestion control and the MAC layer’s collision avoidance. They analytically
model the system and utilize the model to devise a simple counter-starvation policy in which
nodes one hop away from the gateway increase their minimum contention window. They
finally implement and empirically validate the solution not only via simulation, but also on
MirrorMesh, a network redeployment within the same urban environment.
3|Page
2. Critique
2.1 Proposed model considers only one aspect of congestion control – ‘sliding window’
As described in paper, the DATA-ACK control loop in the transport layer is a key factor in
starvation. Consequently, they model only one aspect of congestion control, the sliding
window. Their counter starvation policy is also based on this single factor i.e. the size of the
contention window. They considered a fixed congestion control window and analytically
show that the combination of CSMA MAC and transport-layer sliding window congestion
control alone is sufficient to induce severe throughput imbalance. But apart from this, there
are other factors which are also responsible for starvation, for example asynchronization is
also one of the reason for starvation. The counter-starvation policy should have taken it into
account.

2.2 Limitation of counter-starvation policy is not mentioned
It is not clear from the paper that for which cases the counter-starvation policy will work.
Whether it is a generic solution for the starvation problem or it is limited to some specific
scenarios only. Apart from basic scenario as mentioned in paper, other scenarios are TCP
multi-stream, broader and denser multi-hop topologies etc. All the analysis which is done for
basic topology is not done for these cases in detail and the limitations of this policy is also not
mentioned.

3. Synthesis
The points which I mentioned in the second critique, that limitations of counter-starvation
policy is not mentioned, should be considered. The scenarios should be short-out where it
will not work and work-out some other solution for these scenarios. Similar analysis which
are done in paper should also be done for such cases.
The DATA-ACK control loop in the transport layer is a key factor in starvation.
Consequently, they model only one aspect of congestion control, the sliding window. Other
reasons for starvations should be considered to devise different solution. Some other
parameters are SIFS, DIFS etc., and asynchronization should be taken into account.

4|Page

More Related Content

What's hot

Matlb communication
Matlb communicationMatlb communication
Matlb communicationxlncinfotech
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstracttsysglobalsolutions
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Polytechnique Montreal
 
On residual path lifetime in mobile networks
On residual path lifetime in mobile networksOn residual path lifetime in mobile networks
On residual path lifetime in mobile networksredpel dot com
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041Hanin Almutairi
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksJPINFOTECH JAYAPRAKASH
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...IJCSIS Research Publications
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...IEEEGLOBALSOFTTECHNOLOGIES
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestionijwmn
 

What's hot (18)

Matlb communication
Matlb communicationMatlb communication
Matlb communication
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstract
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
Channel Assignment With Access Contention Resolution for Cognitive Radio Netw...
 
D0431013019
D0431013019D0431013019
D0431013019
 
C0351725
C0351725C0351725
C0351725
 
On residual path lifetime in mobile networks
On residual path lifetime in mobile networksOn residual path lifetime in mobile networks
On residual path lifetime in mobile networks
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networks
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
 
I05745368
I05745368I05745368
I05745368
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestion
 

Similar to Paper Review : Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks

MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...IJNSA Journal
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...IJNSA Journal
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Polytechnique Montreal
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsIJMER
 
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...ijdpsjournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksPolytechnique Montreal
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelXin-She Yang
 
Addressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination CostAddressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination Costpijans
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 

Similar to Paper Review : Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks (20)

MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...
INVESTIGATING THE EFFECTS OF THE COMMON CONTROL CHANNEL CHALLENGE IN MULTICHA...
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...
 
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
Distributed MAC Protocol for Cognitive Radio Networks: Design, Analysis, and ...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
I1102014953
I1102014953I1102014953
I1102014953
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in Manets
 
05688207
0568820705688207
05688207
 
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design Model
 
Addressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination CostAddressing the Multichannel Selection, Scheduling and Coordination Cost
Addressing the Multichannel Selection, Scheduling and Coordination Cost
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Paper Review : Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks

  • 1. Review: “Measurement and Modeling of the Origins of Starvation of Congestion-Controlled Flows in Wireless Mesh Networks” Bhavesh Singh 2010CS50281 1. Summary 1.1 Motivation The basic scenario of any CSMA-based Mesh Networks is sufficient to induce starvation. Previous work showed that severe unfairness and even complete starvation can occur in multi-hop wireless networks due to MAC behavior. TCP magnifies MAC unfair contention. Though significant progress has been made in this area, no prior work identified severe throughput imbalances in the basic scenario of mesh networks, in which a one-hop flow contends with a two-hop flow for gateway access. The prior understanding of “why starvation occurs” is incorrect and has yielded solutions that are not effective because it is believed that TCP pacing/smart dropping with the optimal pacing rate solves this. It is also believed that limiting or fixing TCP window to a small value is sufficient to induce fairness. These two beliefs are not only the reason for starvation according to the authors. 1.2 Contribution Their contributions are as follows      Described the protocol origins of starvation as a compounding effect of three factors: 1. the MAC protocol induces bistability in which pairs of nodes alternate in capturing system resources 2. despite the inherent symmetry of MAC bistability, the transport protocol induces asymmetry in the time spent in each state and favors the one-hop flow 3. most critically, the multihop flow’s transmitter often incurs a high penalty in terms of loss, delay, and consequently, throughput, in order to recapture system resources Demonstrated the existence of starvation under saturation conditions and show that only a one-hop TCP flow in competition with a two-hop TCP flow is sufficient to induce starvation. Developed an analytical model both to study starvation and to devise a solution to counter starvation. Their counter-starvation policy completely solves the starvation problem. Implement and empirically validate the solution on MirrorMesh, a network redeployment within the same urban environment. 1|Page
  • 2. 1.3 Methodology Authors have presented an experimental demonstration of starvation in urban mesh networks, an analysis of starvation’s cross layer protocol origins, an analytical model and a counter-starvation policy, the experimental evaluation of such a policy. This methodology can be briefly understood from the following points STARVATION IN URBAN MESH NETWORKS: First authors defined a basic topology of any mesh network as shown in Fig. 1, in which two mesh nodes, A and B are located two and one hops away from the gateway, GW, respectively. This topology is necessarily embedded in any larger mesh network topology given that mesh networks are defined as multihop wireless networks with gateways. Then they experimentally demonstrate the potential for starvation in the TFA network. TFA network is an operational mesh network that provides Internet access in a densely populated urban neighborhood in Houston. They showed that the two-hop node (A) “starves” when contending with the one-hop node (B).  STARVATION’S PROTOCOL ORIGINS: The collision avoidance mechanism in CSMA/CA causes bistability, in which node pairs (A,B) and (B,GW) alternate in transmission of multiple packet bursts. In order to understand the bistability, we first examine the behavior of two flows in the scenario where the gateway node GW and two-hop node A contend for transmitting TCP ACK and TCP DATA, respectively. Due to such factors like bistability, asymmetry induced by sliding window and some severe transition penalties, Node A faces severe starvation in the basic topology. Then they also showed demonstration for the broader topology.  ANALYTICAL MODEL AND STARVATION SOLUTION: The analytical model was designed with the following objectiveso Isolate and capture the root cause of starvation o Only model one aspect of congestion control  Sliding window Technique used was Embedded Markov chain model. 2|Page
  • 3.  Counter-Starvation Policy: All nodes that are directly connected to a gateway, or gateways in case of multiple gateways, should increase their minimum contention window to a value greater than that of all other nodes. o Simple to implement-no overhead or message exchange between nodes. o Compliant with IEEE 802.11e EDCA.  Evaluation: o Model  Static sliding window congestion control mechanism o NS2  Fixed TCP congestion window (TCP mechanisms including timeouts and cumulative ACKs) o NS2  Legacy TCP New Reno (dynamic congestion window) o TFA  Legacy TCP New Reno (dynamic congestion window + MAC and PHY influences) 1.4 Conclusion The interaction of one-hop TCP flows with two-hop TCP flows is sufficient to induce starvation. They measured starvation in an operational multitier urban mesh network and describe how the starvation’s originating factors stem from interaction between the transport layer’s congestion control and the MAC layer’s collision avoidance. They analytically model the system and utilize the model to devise a simple counter-starvation policy in which nodes one hop away from the gateway increase their minimum contention window. They finally implement and empirically validate the solution not only via simulation, but also on MirrorMesh, a network redeployment within the same urban environment. 3|Page
  • 4. 2. Critique 2.1 Proposed model considers only one aspect of congestion control – ‘sliding window’ As described in paper, the DATA-ACK control loop in the transport layer is a key factor in starvation. Consequently, they model only one aspect of congestion control, the sliding window. Their counter starvation policy is also based on this single factor i.e. the size of the contention window. They considered a fixed congestion control window and analytically show that the combination of CSMA MAC and transport-layer sliding window congestion control alone is sufficient to induce severe throughput imbalance. But apart from this, there are other factors which are also responsible for starvation, for example asynchronization is also one of the reason for starvation. The counter-starvation policy should have taken it into account. 2.2 Limitation of counter-starvation policy is not mentioned It is not clear from the paper that for which cases the counter-starvation policy will work. Whether it is a generic solution for the starvation problem or it is limited to some specific scenarios only. Apart from basic scenario as mentioned in paper, other scenarios are TCP multi-stream, broader and denser multi-hop topologies etc. All the analysis which is done for basic topology is not done for these cases in detail and the limitations of this policy is also not mentioned. 3. Synthesis The points which I mentioned in the second critique, that limitations of counter-starvation policy is not mentioned, should be considered. The scenarios should be short-out where it will not work and work-out some other solution for these scenarios. Similar analysis which are done in paper should also be done for such cases. The DATA-ACK control loop in the transport layer is a key factor in starvation. Consequently, they model only one aspect of congestion control, the sliding window. Other reasons for starvations should be considered to devise different solution. Some other parameters are SIFS, DIFS etc., and asynchronization should be taken into account. 4|Page