SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 12 (December 2014), PP.67-71
67
A Survey of Different Approaches for Differentiating Bit Error
and Congestion Error
Hina Asari1
, Rajendra Patel2
, Hitesh Ghadiya3
Abstract:- TCP provides reliable wireless communication. The packet loss occurs in wireless network during
the data transmission and these losses are always classified as congestion losses. While Packet is also lost due to
random bit error. But traditional TCP always consider as packet is lost due to congestion and reduce it
congestion window. Thus, TCP gives poor performance in wireless link. Many TCP variants have been
proposed for congestion control but they cannot distinguish error either due to congestion or due to bit error thus
it reduces congestion window every time but when there is a bit error then no need to reduce the transmission
rate. In this survey the general approaches taken for differentiating congestion or bit error has been discussed.
Keywords:- Congestion Control, Random Bit error, TCP Variants, Throughput, Congestion Window
I. INTRODUCTION
Many Internet applications and their protocols, e.g., HTTP and FTP, use TCP as their transport layer.
Transmission control protocol (TCP) is reliable and connection oriented protocol. The network is not perfect
and a small percentage of packets are lost during transmission, which is either due to network error or
congestion error. TCP ensures reliability by starting a timer whenever it sends a segment. If it doesn‟t receive an
acknowledgement from the receiver within the „time-out‟ interval then it retransmits the segment. The
congestion control algorithms of TCP are very essential for the reliability of data transmission as well as
stability of the Internet.
Now a day‟s internet user are gradually increases so that internet congestion is much possible, and is
one of the key issues in network. Congestion occurs when the number of received packets at node is more than
its output capacity. TCP Tahoe is the first TCP variant which includes the first congestion control algorithm.
Jacobson and Karle‟s developed this congestion control algorithm in 1986. Then after, many enhancements and
modifications are introduced on Tahoe, and leads to design and development of new TCP variants with different
congestion window algorithms. RFC 793 standardized the first TCP version with its basic configuration based
on a scheme of window-based flow control. TCP Tahoe performs the second generation of TCP versions, which
includes two techniques, congestion avoidance and fast transmission. Reno represents the third version of the
first developed series, and it‟s standardized in RFC 2011, where the congestion control mechanisms are further
extensive by fast recovery algorithm. Consequently, researchers have focused much in improving the
performance of TCP - Reno and Vegas.
The main reason for TCP degradation is its incapability to determine the reason for three duplicate
acknowledgement and retransmission timeout. Retransmission timeout caused by non congestion event is the
main problem.
II. TRANSMISSION CONTROL PROTOCOL (TCP)
TCP [1, 2, 3] is a reliable, connection-oriented, end-to-end, error free in-order protocol. TCP
connection is a virtual circuit between two computers, conceptually very much like a telephone connection but
with reliable data transmission between them. A sending host divides the data stream into segments. Each
segment is labelled with an explicit sequence number to guarantee ordering and reliability. When a host receives
in sequence the segments, it sends a cumulative acknowledgment (ACK) in return, notifying the sender that all
of the data preceding that segment‟s sequence number has been received. If an out-of sequence segment is
received, the receiver sends an acknowledgement indicating the sequence number of the segment that was
expected. If data is not acknowledged for a period of time, the sender will timeout and retransmit the
unacknowledged segments.
In wireless network has some transmission errors are present that is generated by noise, interference,
distortion or bit synchronization errors, but all TCP variants like TCP Tahoe, TCP Reno, TCP New Reno, TCP
Vegas cannot able to distinguish both the error. But all these variants of the TCP and original TCP are still
unable to sense the cause of packet loss. Hence all loss is treated as congestion loss, not consider as bit error and
Performance Analysis of TCP by Differentiating Bit Error and Congestion Error
68
hence reduce window size and data flow. So that, congestion control algorithms perform poorly in wireless
environment.
The TCP performs better in wire network but in wireless network; degrade the performance of the TCP.
Therefore, first is need to distinguishing congestion loss from random loss in wireless link. Second is to reaction
according to error. If the packet is lost due to congestion then retransmit that lost packet and set cwnd to half of
the current cwnd. If the packet lost due to random error then its need to retransmit that packet but no need to
reduce the cwnd.
III. RELATED WORK
There are several ways to differentiate congestion error and bit error or transmission error to improve
the performance of TCP over wireless networks.
The first approach is based on ECN (Explicit Congestion Notification) referred from [14] with active
queue management is used to control congestion in wired networks. And also suggests that ECN can be used to
distinguish congestion loss from wireless loss by diagnosing a loss.
TCP NRT [4] uses modified ECN mechanism to differentiate congestion retransmission time out from
non- congestion RTO. ECN is an extension to the random early detection (RED) algorithm for dropping packets.
In modified ECN, the router is configured with 2 parameters: minimum threshold (minth
) and maximum
threshold (maxth
). When a packet arrives at the router, ECN calculates the average queue length (AQL) and if it
is below minth
, the router will not mark the packets. If the AQL exceeds maxth
then TCP router marks the packet.
As a result there is no need to mark and reduce the size of cwnd when the AQL is between minth
and maxth
.
Whenever sender detects RTO, the sender checks whether the last received ACK is RTO is marked or not, If it
is marked then the sender considers that there is congestion in the network and sender immediately retransmits
the lost packet and reduces the current cwnd. Otherwise the sender assumes that the RTO is due to some other
non congestion either random loss or packet reordering. If the detected RTO is due to random packet loss, the
sender retransmits the lost segment without changing current cwnd.
In [6] , Explicit Congestion Notification (ECN) for congestion control mechanism and propose a
solution to distinguish wireless and congestion losses. ECN avoids congestion losses by making use of early
congestion warnings. By avoiding congestion losses it gives performance benefits. In this way it avoids the end-
to-end retransmissions, as well as timeouts caused by multiple losses in a window.
Current ECN uses two bits in the IP header [14]. This scheme is not efficient, because it uses two bits
indicate three states: not ECT (ECN Capable Transport); ECT and congested; and ECT and not congested. Since
two bits can represent four states, a more efficient scheme is possible. Based on that proposed new scheme has
been presented in [14], which also uses three levels of congestion with ECN signals to detect congestion losses.
The ECN field consists of two bits and the ECN-Echo field consists of two bits. The ECN field is set by the
source and changed by the intermediate routers; the ECN-Echo field is set by the receiver. The proposed bit
patterns are summarized in Table 1.
With these bit patterns, network routers can indicate three levels of congestion with ECN signals: no
congestion, mild congestion and severe congestion. The receiver can then faithfully reflect the ECN signals in
the ECN-Echo field. Use of this feedback is left to the sender TCP.
Table 1 Proposed ECN and ECN Echo Field
ECN ECN Field Meaning ECN Echo ECN-Echo Field Meaning
00 Not ECN capable 00 Reserved for other use
01 ECN capable and no congestion 01 Echo of no congestion
10 ECN capable and mild congestion 10 Echo of mild congestion
11 ECN capable and severe congestion 11 Echo of severe congestion
The routers set congestion signals based on two thresholds, one for mild congestion and another for
severe congestion. A router marks the packet according to its current congestion status, but if the packet already
carries a higher level mark, it will not change the mark.
In [8], TCP_Reno cooperates with the router configured with explicit congestion notification (ECN), it
is capable of distinguishing the wireless packet losses from the congestion packet losses, and reacting
accordingly. This is done by observing the Congestion Experienced (CE) bit in the duplicate ACKs received if
Performance Analysis of TCP by Differentiating Bit Error and Congestion Error
69
the TCP is ECN-capable. When the packet loss occurred due to bit error then the sender estimates the packet
loss rate. Suppose queue length has exceeded the minimum threshold value of the average queue length. If this
occurs and the network is ECN-capable, it will set the CE bit in the TCP header of the packet with some
probability. The receiver also sends ACK to the sender with its CE bit set. If the sender receives three duplicate
ACK with its CE bit set then the sender can assume that a packet loss has occurred due to congestion in the
network and it can start its congestion avoidance algorithm to take care of it. When the buffer actually overflows
and a packet is dropped then the receiver sends duplicate ACK and the sender can conclude that there is
congestion in the network. Suppose the queue length of the buffer is below the minimum threshold value, then
CE bit in the TCP header will not be set by the node and as a result the ACKs coming from the receiver will also
not have their CE bit set
In Second approach is discuss in [5] and [9] , TCP NCE [5] differentiates congestion from non
congestion losses by computing the queue length of the bottleneck link. If the queue length is greater than a
threshold value then, congestion is reported. Otherwise the packet loss is because of some non congestion event.
The formula to compute queue length (Ql) is,
Ql = B (RTTnow – RTTmin)
Where, RTTnow is the current round-trip time when the sender receives an ACK.
RTTmin is the observed minimum RTT by the TCP sender
B is the bandwidth of the link.
Here, RTT is measure using the Time stamp option field[13]. For detecting the non-congestion events
at the time of receiving the three dupacks, than sender check the current queue length which is greater than a
threshold value. If Ql is greater than a threshold value, the TCP sender confirms that the dupacks is due to
network congestion and router uses drop-tail queuing policy and modified router queue management scheme is
as shown in table 2.
Table 2 Router Queue Management Scheme
Buffer Size Load Status
less than 30% Light not congested
less than 90% and greater than
30%
medium not congested (easy to become congested after
sometime)
greater than 90% heavy under congestion (easily overflow)
When the sender receives three dupacks and the current queue length is less than the threshold value, then the
sender assumes that these dupacks are the sign of non-congestion events.
In [9] TCP CERL (Congestion Control Enhancement for Random Loss), TCP CERL modifies sender-
side of TCP. It is utilize the RTT measurements made throughout the duration of the connection to estimate the
queue length of the link and after that estimates the congestion status. By distinguishing random losses from
congestion losses based on a dynamically set threshold value, TCP CERL successfully distinguish performance
degradation issue of TCP that is random loss. Unlike other TCP variants, TCP CERL doesn‟t reduce the
congestion window and slow start threshold when random loss is detected. Assume that TCP connection that
performs first-in-first-out drop tail queuing. When packet is received by router then it is first measure queue
length. Queue length l can be calculated using the following equation:
l = (RTT – T) B
Where, T to be the smallest RTT observed by the TCP sender and l is updated with the most recent RTT
measurement every time a new RTT measurement is received. To distinguish random losses from congestive
losses, the queue length l measured by above equation is used to estimate the congestion status of the link.
Specifically, set a dynamic queue length threshold N:
N = A × lmax
Where, lmax = largest value of l observed by the sender
A = constant between 0 and 1
Performance Analysis of TCP by Differentiating Bit Error and Congestion Error
70
If l < N, when a segment loss is detected by three duplicate acknowledgments, It assume the loss has been
random rather than congestive. Otherwise, CERL will assume the loss has been caused by congestion.
Third approach is TCP K-Reno [7], when there is less congestion in the network but the probability of
random bit error is high, some segments will be corrupted and rejected by the receiver. If the next segments in
sequence do not suffer from bit error then they will reach the receiver and be regarded as out of order segments
then receiver generat duplicate acknowledgements. The continuous flow of acknowledgements from the receiver
will prevent timeouts from being occurred at the sender. Therefore, the number of 3-dupacks experienced by the
sender will be much higher than the number of timeouts. This phenomenon can be used during a timeout or a 3-
dupack event to decide whether there is real congestion in the network, or the segment loss occurred due to
random bit error. It keeps count of the number of timeouts and the number of 3-dupacks. Whenever the sender
experiences a timeout or 3-dupack event, TCP K-Reno computes the ratio of the number of timeouts to the
number of 3-dupacks. If the ratio is very small (in between 0.01 to 0.2) that means this event has been caused by
a bit error event, not by the congestion. If the ratio is high (e.g. greater than 0.5) then the event is more likely the
result of segment drops at intermediate routers due to congestion.
In Fourth approach [10], it use 1 bit flag of TCP Header for strong indication of congestion or bit error.
If F = 0 then congestion and F = 1 then bit error. This algorithm states if any segment loss due to any reasons
during communication, receiver has been received out of order sequence numbers. When receiver receives out
of order sequence number, it will start observing timing of next successive segments and continuous retransmits
dupack. If next successive segments suffer from delay, then receiver assume that congestion occurs in the
medium and segment loss due to congestion. If next successive segments does not suffer from delay and
received continuously without delay, then receiver assume that congestion not occur in medium. So set FLAG =
0 in the 3 rd dupack (duplicate acknowledgment) otherwise set FLAG = 1.
If F = 0 in 3 rd dupack, Sender assumes that packet loss due to congestion and set cwnd to half & enter
into fast retransmit phase of TCP. If F = 1 in 3 rd dupack, Sender assumes that packet loss due to bit error and
not reduce cwnd & enter into congestion avoidance phase of TCP.
From study this different approaches we can classified as shown in below table 3.
Table 3 Different Detection Approach
Approach Detection
approach
Different TCP
Approaches
Modification Indication of error
First ECN
TCP NRT [4] Using ECN capable router If Packet is marked
then it is congestion
otherwise random bit
error
Modified TCP
[6]
ECN is modified with
Three level ECN
TCP_Reno [8] Using ECN capable router
Second
Measure
Queue
length(l)
TCP NCE [5] Define threshold value
based on buffer size (90%)
If buffer size is grater
than 90% then received
3 dupack is due to
congestion
TCP CERL
[9]
Set dynamic queue length
threshold (N)
If l < N then random
bit error
Otherwise congestion
Third
Based on
no. of
timeout
and no. of 3
dupack
TCP K-Reno
[7]
Count the number of
timeouts and the number
of 3-dupacks
Ratio of no. Of timeout
to no. Of 3 dupack is
small then 3 dupack is
due to bit error
Fourth
Observing
timing of
next
successive
Modified
TCPW [10]
Measure delay of
subsequent packet and set
on reserved bit in header
Successive segments
suffer from delay then
set FLAG = 0 in 3rd
dupack Otherwise it set
FLAG = 1 in 3rd
dupack
Performance Analysis of TCP by Differentiating Bit Error and Congestion Error
71
IV. CONCLUSIONS
Wireless networks are not always perfect due to that packets are lost and these losses are always
classified as congestion loss by sender, causing reduced throughput. While Packet losses are mainly due to
congestion and random bit error which is vary negligible. Traditional TCP does not differentiate losses either
congestion or bit error. If packet loss is due to bit error even though it reduce congestion window and reducing
its performance. So unfortunately it reduces congestion window in both cases and degrade the performance. So,
there are several different approaches for differentiating congestion and bit error. ECN is mostly used for
detection to differentiate congestion and non congestion error.
REFERENCES
[1] W. Boulevard, and A. Way, “Transmission Control Protocol”, RFC 793, September 1981
[2] V. Jacobson and M. J. Karels, "Congestion avoidance and control", In ACM Computer Communication
Review; Proceedings of the Sigcomm‟88 Symposium, volume 18, pages 314–329, Stanford, CA, USA,
August 1988.
[3] Hanaa A. Torkey, Gamal M. Attiya and I. Z. Morsi, "Performance Evaluation of End-to-End
Congestion Control Protocols", Menoufia journal of Electronic Engineering Research (MJEER), Vol.
18, no. 2, pp. 99- 118, July 2008.
[4] Prasanthi Sreekumari and Meejeong Lee, “TCP NRT: a new TCP algorithm for differentiating non-
congestion retransmission timeouts over multihop wireless networks”, EURASIP Journal on Wireless
Communications and Networking, 2013
[5] Prasanthi Sreekumari and Sang-Hwa Chung, “TCP NCE: A unified solution for non-congestion events
to improve the performance of TCP over wireless networks ”, EURASIP Journal on Wireless
Communications and Networking, 2011
[6] Mohammad Usman Ali Khan, Shahid Khan, Yasir Ali Rasheed, “Optimization of tcp over wireless
networks”, International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05,
October 2011
[7] Ahmed Khurshid, Md. Humayun Kabir, Md. Anindya Tahsin Prodhan, “An Improve d TCP Congestion
Control Algorithm for Wireless Networks”, IEEE ,2011
[8] Hu Han, “Performance Improvement of TCP_Reno Based on Monitoring the Wireless Packet Loss
Rate”, IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011
[9] Hosam El-Ocla, “TCP CERL: congestion control enhancement over wireless networks”, Conference on
wireless network Springer, 2010
[10] B.Chellaprabha, J.Priyadharsini, “RARELD for Loss Differentiation and Reduction in Wireless
Network”, International Journal of Scientific and Research Publications, Volume 3, Issue 6, ISSN
2250-3153, June 2013
[11] Qian Wang, Dongfeng Yuan, Senior, “An Improved TCP Congestion Control Mechanism with
Adaptive Congestion Window”, in International Symposium on Performance Evaluation of Computer
and Telecommunication Systems, Vol.4, July-2010
[12] RFC: 2001, “TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms”,
January 1997
[13] RFC: 1323, “TCP Extension for High Performance”, 1992
[14] RFC: 2481, “A Proposal to add Explicit Congestion Notification (ECN) to IP”,1999

More Related Content

What's hot

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocolsRio Nguyen
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols Amr Nasr
 
Explicit congestion notification
Explicit congestion notificationExplicit congestion notification
Explicit congestion notificationAbhishek Kesharwani
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68myrajendra
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp networkHamzahMohammed4
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_ControlAhmar Hashmi
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control anuragjagetiya
 

What's hot (20)

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
C10 transport protocols
C10 transport protocolsC10 transport protocols
C10 transport protocols
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...
 
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
Tcp snoop protocols
Tcp snoop protocols  Tcp snoop protocols
Tcp snoop protocols
 
Explicit congestion notification
Explicit congestion notificationExplicit congestion notification
Explicit congestion notification
 
Tcp
TcpTcp
Tcp
 
Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Tcp udp
Tcp udpTcp udp
Tcp udp
 
Transport layer udp and tcp network
Transport layer udp and tcp networkTransport layer udp and tcp network
Transport layer udp and tcp network
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Transport layer
Transport layerTransport layer
Transport layer
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
udp , tcp ,sctp
udp , tcp ,sctpudp , tcp ,sctp
udp , tcp ,sctp
 

Viewers also liked

Karal Clay in the Far North Cameroon: Study on Behavioural Floor Structures
Karal Clay in the Far North Cameroon: Study on Behavioural Floor StructuresKaral Clay in the Far North Cameroon: Study on Behavioural Floor Structures
Karal Clay in the Far North Cameroon: Study on Behavioural Floor StructuresIJERD Editor
 
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...New Social Communications
 
PDO Recommendation Letter
PDO Recommendation LetterPDO Recommendation Letter
PDO Recommendation LetterMundhir Almaadi
 
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...рівненська обласна універсальна наукова бібліотека на сторінках електронних в...
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...Yulia Kovalchuk
 
Mindfulness4business leaders… The latest hype-2
Mindfulness4business leaders… The latest hype-2Mindfulness4business leaders… The latest hype-2
Mindfulness4business leaders… The latest hype-2Anne Lemaire
 
หลักกาลามสูตรกับการพัฒนาคุณภาพ
หลักกาลามสูตรกับการพัฒนาคุณภาพหลักกาลามสูตรกับการพัฒนาคุณภาพ
หลักกาลามสูตรกับการพัฒนาคุณภาพSuradet Sriangkoon
 
Certificate_bonding_conductors_Jon_Jensen_Fagertun
Certificate_bonding_conductors_Jon_Jensen_FagertunCertificate_bonding_conductors_Jon_Jensen_Fagertun
Certificate_bonding_conductors_Jon_Jensen_FagertunJon Jensen Fagertun
 
Comparative of Conventional and Intelligence Controller based Hybrid Generati...
Comparative of Conventional and Intelligence Controller based Hybrid Generati...Comparative of Conventional and Intelligence Controller based Hybrid Generati...
Comparative of Conventional and Intelligence Controller based Hybrid Generati...IJERD Editor
 

Viewers also liked (13)

Karal Clay in the Far North Cameroon: Study on Behavioural Floor Structures
Karal Clay in the Far North Cameroon: Study on Behavioural Floor StructuresKaral Clay in the Far North Cameroon: Study on Behavioural Floor Structures
Karal Clay in the Far North Cameroon: Study on Behavioural Floor Structures
 
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...
Будущее маркетинга ‐ в умении монетизировать возможности Интернета для бизнес...
 
PDO Recommendation Letter
PDO Recommendation LetterPDO Recommendation Letter
PDO Recommendation Letter
 
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...рівненська обласна універсальна наукова бібліотека на сторінках електронних в...
рівненська обласна універсальна наукова бібліотека на сторінках електронних в...
 
Mindfulness4business leaders… The latest hype-2
Mindfulness4business leaders… The latest hype-2Mindfulness4business leaders… The latest hype-2
Mindfulness4business leaders… The latest hype-2
 
Rica urte
Rica  urteRica  urte
Rica urte
 
หลักกาลามสูตรกับการพัฒนาคุณภาพ
หลักกาลามสูตรกับการพัฒนาคุณภาพหลักกาลามสูตรกับการพัฒนาคุณภาพ
หลักกาลามสูตรกับการพัฒนาคุณภาพ
 
Certificate_bonding_conductors_Jon_Jensen_Fagertun
Certificate_bonding_conductors_Jon_Jensen_FagertunCertificate_bonding_conductors_Jon_Jensen_Fagertun
Certificate_bonding_conductors_Jon_Jensen_Fagertun
 
IFRS
IFRSIFRS
IFRS
 
Ivanov e 277
Ivanov e 277Ivanov e 277
Ivanov e 277
 
Comparative of Conventional and Intelligence Controller based Hybrid Generati...
Comparative of Conventional and Intelligence Controller based Hybrid Generati...Comparative of Conventional and Intelligence Controller based Hybrid Generati...
Comparative of Conventional and Intelligence Controller based Hybrid Generati...
 
Booklet nursery- নার্সারি
Booklet nursery- নার্সারিBooklet nursery- নার্সারি
Booklet nursery- নার্সারি
 
tesis
tesistesis
tesis
 

Similar to A Survey of Different Approaches for Differentiating Bit Error and Congestion Error

Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxTekle12
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfIUA
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.pptSwatiRani13
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptxECE01AJAYS
 

Similar to A Survey of Different Approaches for Differentiating Bit Error and Congestion Error (20)

Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Chap-13.ppt
Chap-13.pptChap-13.ppt
Chap-13.ppt
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.ppt
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

A Survey of Different Approaches for Differentiating Bit Error and Congestion Error

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 12 (December 2014), PP.67-71 67 A Survey of Different Approaches for Differentiating Bit Error and Congestion Error Hina Asari1 , Rajendra Patel2 , Hitesh Ghadiya3 Abstract:- TCP provides reliable wireless communication. The packet loss occurs in wireless network during the data transmission and these losses are always classified as congestion losses. While Packet is also lost due to random bit error. But traditional TCP always consider as packet is lost due to congestion and reduce it congestion window. Thus, TCP gives poor performance in wireless link. Many TCP variants have been proposed for congestion control but they cannot distinguish error either due to congestion or due to bit error thus it reduces congestion window every time but when there is a bit error then no need to reduce the transmission rate. In this survey the general approaches taken for differentiating congestion or bit error has been discussed. Keywords:- Congestion Control, Random Bit error, TCP Variants, Throughput, Congestion Window I. INTRODUCTION Many Internet applications and their protocols, e.g., HTTP and FTP, use TCP as their transport layer. Transmission control protocol (TCP) is reliable and connection oriented protocol. The network is not perfect and a small percentage of packets are lost during transmission, which is either due to network error or congestion error. TCP ensures reliability by starting a timer whenever it sends a segment. If it doesn‟t receive an acknowledgement from the receiver within the „time-out‟ interval then it retransmits the segment. The congestion control algorithms of TCP are very essential for the reliability of data transmission as well as stability of the Internet. Now a day‟s internet user are gradually increases so that internet congestion is much possible, and is one of the key issues in network. Congestion occurs when the number of received packets at node is more than its output capacity. TCP Tahoe is the first TCP variant which includes the first congestion control algorithm. Jacobson and Karle‟s developed this congestion control algorithm in 1986. Then after, many enhancements and modifications are introduced on Tahoe, and leads to design and development of new TCP variants with different congestion window algorithms. RFC 793 standardized the first TCP version with its basic configuration based on a scheme of window-based flow control. TCP Tahoe performs the second generation of TCP versions, which includes two techniques, congestion avoidance and fast transmission. Reno represents the third version of the first developed series, and it‟s standardized in RFC 2011, where the congestion control mechanisms are further extensive by fast recovery algorithm. Consequently, researchers have focused much in improving the performance of TCP - Reno and Vegas. The main reason for TCP degradation is its incapability to determine the reason for three duplicate acknowledgement and retransmission timeout. Retransmission timeout caused by non congestion event is the main problem. II. TRANSMISSION CONTROL PROTOCOL (TCP) TCP [1, 2, 3] is a reliable, connection-oriented, end-to-end, error free in-order protocol. TCP connection is a virtual circuit between two computers, conceptually very much like a telephone connection but with reliable data transmission between them. A sending host divides the data stream into segments. Each segment is labelled with an explicit sequence number to guarantee ordering and reliability. When a host receives in sequence the segments, it sends a cumulative acknowledgment (ACK) in return, notifying the sender that all of the data preceding that segment‟s sequence number has been received. If an out-of sequence segment is received, the receiver sends an acknowledgement indicating the sequence number of the segment that was expected. If data is not acknowledged for a period of time, the sender will timeout and retransmit the unacknowledged segments. In wireless network has some transmission errors are present that is generated by noise, interference, distortion or bit synchronization errors, but all TCP variants like TCP Tahoe, TCP Reno, TCP New Reno, TCP Vegas cannot able to distinguish both the error. But all these variants of the TCP and original TCP are still unable to sense the cause of packet loss. Hence all loss is treated as congestion loss, not consider as bit error and
  • 2. Performance Analysis of TCP by Differentiating Bit Error and Congestion Error 68 hence reduce window size and data flow. So that, congestion control algorithms perform poorly in wireless environment. The TCP performs better in wire network but in wireless network; degrade the performance of the TCP. Therefore, first is need to distinguishing congestion loss from random loss in wireless link. Second is to reaction according to error. If the packet is lost due to congestion then retransmit that lost packet and set cwnd to half of the current cwnd. If the packet lost due to random error then its need to retransmit that packet but no need to reduce the cwnd. III. RELATED WORK There are several ways to differentiate congestion error and bit error or transmission error to improve the performance of TCP over wireless networks. The first approach is based on ECN (Explicit Congestion Notification) referred from [14] with active queue management is used to control congestion in wired networks. And also suggests that ECN can be used to distinguish congestion loss from wireless loss by diagnosing a loss. TCP NRT [4] uses modified ECN mechanism to differentiate congestion retransmission time out from non- congestion RTO. ECN is an extension to the random early detection (RED) algorithm for dropping packets. In modified ECN, the router is configured with 2 parameters: minimum threshold (minth ) and maximum threshold (maxth ). When a packet arrives at the router, ECN calculates the average queue length (AQL) and if it is below minth , the router will not mark the packets. If the AQL exceeds maxth then TCP router marks the packet. As a result there is no need to mark and reduce the size of cwnd when the AQL is between minth and maxth . Whenever sender detects RTO, the sender checks whether the last received ACK is RTO is marked or not, If it is marked then the sender considers that there is congestion in the network and sender immediately retransmits the lost packet and reduces the current cwnd. Otherwise the sender assumes that the RTO is due to some other non congestion either random loss or packet reordering. If the detected RTO is due to random packet loss, the sender retransmits the lost segment without changing current cwnd. In [6] , Explicit Congestion Notification (ECN) for congestion control mechanism and propose a solution to distinguish wireless and congestion losses. ECN avoids congestion losses by making use of early congestion warnings. By avoiding congestion losses it gives performance benefits. In this way it avoids the end- to-end retransmissions, as well as timeouts caused by multiple losses in a window. Current ECN uses two bits in the IP header [14]. This scheme is not efficient, because it uses two bits indicate three states: not ECT (ECN Capable Transport); ECT and congested; and ECT and not congested. Since two bits can represent four states, a more efficient scheme is possible. Based on that proposed new scheme has been presented in [14], which also uses three levels of congestion with ECN signals to detect congestion losses. The ECN field consists of two bits and the ECN-Echo field consists of two bits. The ECN field is set by the source and changed by the intermediate routers; the ECN-Echo field is set by the receiver. The proposed bit patterns are summarized in Table 1. With these bit patterns, network routers can indicate three levels of congestion with ECN signals: no congestion, mild congestion and severe congestion. The receiver can then faithfully reflect the ECN signals in the ECN-Echo field. Use of this feedback is left to the sender TCP. Table 1 Proposed ECN and ECN Echo Field ECN ECN Field Meaning ECN Echo ECN-Echo Field Meaning 00 Not ECN capable 00 Reserved for other use 01 ECN capable and no congestion 01 Echo of no congestion 10 ECN capable and mild congestion 10 Echo of mild congestion 11 ECN capable and severe congestion 11 Echo of severe congestion The routers set congestion signals based on two thresholds, one for mild congestion and another for severe congestion. A router marks the packet according to its current congestion status, but if the packet already carries a higher level mark, it will not change the mark. In [8], TCP_Reno cooperates with the router configured with explicit congestion notification (ECN), it is capable of distinguishing the wireless packet losses from the congestion packet losses, and reacting accordingly. This is done by observing the Congestion Experienced (CE) bit in the duplicate ACKs received if
  • 3. Performance Analysis of TCP by Differentiating Bit Error and Congestion Error 69 the TCP is ECN-capable. When the packet loss occurred due to bit error then the sender estimates the packet loss rate. Suppose queue length has exceeded the minimum threshold value of the average queue length. If this occurs and the network is ECN-capable, it will set the CE bit in the TCP header of the packet with some probability. The receiver also sends ACK to the sender with its CE bit set. If the sender receives three duplicate ACK with its CE bit set then the sender can assume that a packet loss has occurred due to congestion in the network and it can start its congestion avoidance algorithm to take care of it. When the buffer actually overflows and a packet is dropped then the receiver sends duplicate ACK and the sender can conclude that there is congestion in the network. Suppose the queue length of the buffer is below the minimum threshold value, then CE bit in the TCP header will not be set by the node and as a result the ACKs coming from the receiver will also not have their CE bit set In Second approach is discuss in [5] and [9] , TCP NCE [5] differentiates congestion from non congestion losses by computing the queue length of the bottleneck link. If the queue length is greater than a threshold value then, congestion is reported. Otherwise the packet loss is because of some non congestion event. The formula to compute queue length (Ql) is, Ql = B (RTTnow – RTTmin) Where, RTTnow is the current round-trip time when the sender receives an ACK. RTTmin is the observed minimum RTT by the TCP sender B is the bandwidth of the link. Here, RTT is measure using the Time stamp option field[13]. For detecting the non-congestion events at the time of receiving the three dupacks, than sender check the current queue length which is greater than a threshold value. If Ql is greater than a threshold value, the TCP sender confirms that the dupacks is due to network congestion and router uses drop-tail queuing policy and modified router queue management scheme is as shown in table 2. Table 2 Router Queue Management Scheme Buffer Size Load Status less than 30% Light not congested less than 90% and greater than 30% medium not congested (easy to become congested after sometime) greater than 90% heavy under congestion (easily overflow) When the sender receives three dupacks and the current queue length is less than the threshold value, then the sender assumes that these dupacks are the sign of non-congestion events. In [9] TCP CERL (Congestion Control Enhancement for Random Loss), TCP CERL modifies sender- side of TCP. It is utilize the RTT measurements made throughout the duration of the connection to estimate the queue length of the link and after that estimates the congestion status. By distinguishing random losses from congestion losses based on a dynamically set threshold value, TCP CERL successfully distinguish performance degradation issue of TCP that is random loss. Unlike other TCP variants, TCP CERL doesn‟t reduce the congestion window and slow start threshold when random loss is detected. Assume that TCP connection that performs first-in-first-out drop tail queuing. When packet is received by router then it is first measure queue length. Queue length l can be calculated using the following equation: l = (RTT – T) B Where, T to be the smallest RTT observed by the TCP sender and l is updated with the most recent RTT measurement every time a new RTT measurement is received. To distinguish random losses from congestive losses, the queue length l measured by above equation is used to estimate the congestion status of the link. Specifically, set a dynamic queue length threshold N: N = A × lmax Where, lmax = largest value of l observed by the sender A = constant between 0 and 1
  • 4. Performance Analysis of TCP by Differentiating Bit Error and Congestion Error 70 If l < N, when a segment loss is detected by three duplicate acknowledgments, It assume the loss has been random rather than congestive. Otherwise, CERL will assume the loss has been caused by congestion. Third approach is TCP K-Reno [7], when there is less congestion in the network but the probability of random bit error is high, some segments will be corrupted and rejected by the receiver. If the next segments in sequence do not suffer from bit error then they will reach the receiver and be regarded as out of order segments then receiver generat duplicate acknowledgements. The continuous flow of acknowledgements from the receiver will prevent timeouts from being occurred at the sender. Therefore, the number of 3-dupacks experienced by the sender will be much higher than the number of timeouts. This phenomenon can be used during a timeout or a 3- dupack event to decide whether there is real congestion in the network, or the segment loss occurred due to random bit error. It keeps count of the number of timeouts and the number of 3-dupacks. Whenever the sender experiences a timeout or 3-dupack event, TCP K-Reno computes the ratio of the number of timeouts to the number of 3-dupacks. If the ratio is very small (in between 0.01 to 0.2) that means this event has been caused by a bit error event, not by the congestion. If the ratio is high (e.g. greater than 0.5) then the event is more likely the result of segment drops at intermediate routers due to congestion. In Fourth approach [10], it use 1 bit flag of TCP Header for strong indication of congestion or bit error. If F = 0 then congestion and F = 1 then bit error. This algorithm states if any segment loss due to any reasons during communication, receiver has been received out of order sequence numbers. When receiver receives out of order sequence number, it will start observing timing of next successive segments and continuous retransmits dupack. If next successive segments suffer from delay, then receiver assume that congestion occurs in the medium and segment loss due to congestion. If next successive segments does not suffer from delay and received continuously without delay, then receiver assume that congestion not occur in medium. So set FLAG = 0 in the 3 rd dupack (duplicate acknowledgment) otherwise set FLAG = 1. If F = 0 in 3 rd dupack, Sender assumes that packet loss due to congestion and set cwnd to half & enter into fast retransmit phase of TCP. If F = 1 in 3 rd dupack, Sender assumes that packet loss due to bit error and not reduce cwnd & enter into congestion avoidance phase of TCP. From study this different approaches we can classified as shown in below table 3. Table 3 Different Detection Approach Approach Detection approach Different TCP Approaches Modification Indication of error First ECN TCP NRT [4] Using ECN capable router If Packet is marked then it is congestion otherwise random bit error Modified TCP [6] ECN is modified with Three level ECN TCP_Reno [8] Using ECN capable router Second Measure Queue length(l) TCP NCE [5] Define threshold value based on buffer size (90%) If buffer size is grater than 90% then received 3 dupack is due to congestion TCP CERL [9] Set dynamic queue length threshold (N) If l < N then random bit error Otherwise congestion Third Based on no. of timeout and no. of 3 dupack TCP K-Reno [7] Count the number of timeouts and the number of 3-dupacks Ratio of no. Of timeout to no. Of 3 dupack is small then 3 dupack is due to bit error Fourth Observing timing of next successive Modified TCPW [10] Measure delay of subsequent packet and set on reserved bit in header Successive segments suffer from delay then set FLAG = 0 in 3rd dupack Otherwise it set FLAG = 1 in 3rd dupack
  • 5. Performance Analysis of TCP by Differentiating Bit Error and Congestion Error 71 IV. CONCLUSIONS Wireless networks are not always perfect due to that packets are lost and these losses are always classified as congestion loss by sender, causing reduced throughput. While Packet losses are mainly due to congestion and random bit error which is vary negligible. Traditional TCP does not differentiate losses either congestion or bit error. If packet loss is due to bit error even though it reduce congestion window and reducing its performance. So unfortunately it reduces congestion window in both cases and degrade the performance. So, there are several different approaches for differentiating congestion and bit error. ECN is mostly used for detection to differentiate congestion and non congestion error. REFERENCES [1] W. Boulevard, and A. Way, “Transmission Control Protocol”, RFC 793, September 1981 [2] V. Jacobson and M. J. Karels, "Congestion avoidance and control", In ACM Computer Communication Review; Proceedings of the Sigcomm‟88 Symposium, volume 18, pages 314–329, Stanford, CA, USA, August 1988. [3] Hanaa A. Torkey, Gamal M. Attiya and I. Z. Morsi, "Performance Evaluation of End-to-End Congestion Control Protocols", Menoufia journal of Electronic Engineering Research (MJEER), Vol. 18, no. 2, pp. 99- 118, July 2008. [4] Prasanthi Sreekumari and Meejeong Lee, “TCP NRT: a new TCP algorithm for differentiating non- congestion retransmission timeouts over multihop wireless networks”, EURASIP Journal on Wireless Communications and Networking, 2013 [5] Prasanthi Sreekumari and Sang-Hwa Chung, “TCP NCE: A unified solution for non-congestion events to improve the performance of TCP over wireless networks ”, EURASIP Journal on Wireless Communications and Networking, 2011 [6] Mohammad Usman Ali Khan, Shahid Khan, Yasir Ali Rasheed, “Optimization of tcp over wireless networks”, International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05, October 2011 [7] Ahmed Khurshid, Md. Humayun Kabir, Md. Anindya Tahsin Prodhan, “An Improve d TCP Congestion Control Algorithm for Wireless Networks”, IEEE ,2011 [8] Hu Han, “Performance Improvement of TCP_Reno Based on Monitoring the Wireless Packet Loss Rate”, IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011 [9] Hosam El-Ocla, “TCP CERL: congestion control enhancement over wireless networks”, Conference on wireless network Springer, 2010 [10] B.Chellaprabha, J.Priyadharsini, “RARELD for Loss Differentiation and Reduction in Wireless Network”, International Journal of Scientific and Research Publications, Volume 3, Issue 6, ISSN 2250-3153, June 2013 [11] Qian Wang, Dongfeng Yuan, Senior, “An Improved TCP Congestion Control Mechanism with Adaptive Congestion Window”, in International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Vol.4, July-2010 [12] RFC: 2001, “TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms”, January 1997 [13] RFC: 1323, “TCP Extension for High Performance”, 1992 [14] RFC: 2481, “A Proposal to add Explicit Congestion Notification (ECN) to IP”,1999