TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
TCP is one of the main protocols that govern the Internet traffic nowadays. However, it suffers significant
performance degradation over wireless links. Since wireless networks are leading the communication
technologies recently, it is imperative to introduce effective solutions for the TCP congestion control
mechanisms over such networks. In this research four End-to-End TCP implementations are discussed,
they are TCP Westwood, Hybla, Highspeed, and NewReno. The performance of these variants is compared
using LTE emulated environment in terms of throughput, delay, and fairness. Ns-3 simulator is used to
simulate the LTE networks environment. The simulation results showed that TCP Highspeed achieves the
best throughput results. Although TCP Westwood recorded the lowest latency values comparing to others,
it behaved unfairly among different traffic flows. Moreover, TCP Hybla demonstrated the best fairness
behaviour among other TCP variants
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
TCP is one of the main protocols that govern the Internet traffic nowadays. However, it suffers significant
performance degradation over wireless links. Since wireless networks are leading the communication
technologies recently, it is imperative to introduce effective solutions for the TCP congestion control
mechanisms over such networks. In this research four End-to-End TCP implementations are discussed,
they are TCP Westwood, Hybla, Highspeed, and NewReno. The performance of these variants is compared
using LTE emulated environment in terms of throughput, delay, and fairness. Ns-3 simulator is used to
simulate the LTE networks environment. The simulation results showed that TCP Highspeed achieves the
best throughput results. Although TCP Westwood recorded the lowest latency values comparing to others,
it behaved unfairly among different traffic flows. Moreover, TCP Hybla demonstrated the best fairness
behaviour among other TCP variants
The performance of wireless ad hoc networks is impacted significantly by the way TCP reacts to lost packets. TCP was designed specifically for wired, reliable networks; thus, any packet loss is attributed to congestion in the network. This assumption does not hold in wireless networks as most packet loss is due to link failure. In our research we analyzed several implementations of TCP, including TCP Vegas, TCP Feedback, and SACK TCP, by measuring throughput, retransmissions, and duplicate acknowledgements through simulation with ns-2. We discovered that TCP throughput is related to the number of hops in the path, and thus depends on the performance of the underlying routing protocol, which was DSR in our research.
UNIT IV TRANSPORT LAYER 9
Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol – Transmission Control Protocol – SCTP.
Here, we will cover all topic about transport layer. Transport layer which is belongs to networking field. here i will provide all about transport layer in networking. And also handshakes procses. connection-oriented and connectionless protocols. TCP(Transmission control protocol) and UDP (User datagram protocol)
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...ijcsit
ABSTRACT
This paper prefers a fuzzy-logic-based sending rate adaption scheme named FSR(Fuzzy Sending Rate) intending to improve the evenness of TCPFriendly Multicast Congestion Control (TFMCC). To mitigate fluctuation of sending rate for TFMCC sender, FSR intends, five actions and link utilization for tuning sending rate and uses a fuzzy controller to determine which operation should be reaped according to the feedback information from CLR (current limiting receiver). Asymmetrical membership functions and biased fuzzy inference rules make FSR as friendly to TCP flows as TFMCC. Simulation results show that FSR has exceptional smoothness and fine TCP Friendliness.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
The Transport Control Protocol (TCP) is used to establish and control a session between two endpoints. The problem is that in 802.11 wireless environments TCP always considers that the packet loss is caused by network congestion. However, in these networks packet loss are usually caused by the high bit error rate, and the wireless link failures. Researchers found out that TCP performance in wireless networks can be highly enhanced as long as it is feasible to identify the packet loss causes; hence appropriate measures can be dynamically applied during an established TCP session in order to adjust the session parameters. This paper proposes an endto-end adaptive mechanism that allows the TCP session to dynamically adjust the RTO (Retransmission Timeout) of a TCP session; the server will have to adjust the timers based on feedbacks from clients. Feedbacks are piggybacked in the TCP Options header field of the ACK (Acknowledgment) messages. A feedback is an approximation of the time needed by the wireless channel to get the errors fixed. The mechanism has been validated using numerical analysis and simulations, and then compared to the original TCP protocol. Simulation results have shown better performance in terms of number of retransmissions at the server side due to the decrease in the number of timeouts; and thus lowest congestion on the wireless access point.
A Survey of Different Approaches for Differentiating Bit Error and Congestion...IJERD Editor
TCP provides reliable wireless communication. The packet loss occurs in wireless network during
the data transmission and these losses are always classified as congestion losses. While Packet is also lost due to
random bit error. But traditional TCP always consider as packet is lost due to congestion and reduce it
congestion window. Thus, TCP gives poor performance in wireless link. Many TCP variants have been
proposed for congestion control but they cannot distinguish error either due to congestion or due to bit error thus
it reduces congestion window every time but when there is a bit error then no need to reduce the transmission
rate. In this survey the general approaches taken for differentiating congestion or bit error has been discussed.
The performance of wireless ad hoc networks is impacted significantly by the way TCP reacts to lost packets. TCP was designed specifically for wired, reliable networks; thus, any packet loss is attributed to congestion in the network. This assumption does not hold in wireless networks as most packet loss is due to link failure. In our research we analyzed several implementations of TCP, including TCP Vegas, TCP Feedback, and SACK TCP, by measuring throughput, retransmissions, and duplicate acknowledgements through simulation with ns-2. We discovered that TCP throughput is related to the number of hops in the path, and thus depends on the performance of the underlying routing protocol, which was DSR in our research.
UNIT IV TRANSPORT LAYER 9
Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol – Transmission Control Protocol – SCTP.
Here, we will cover all topic about transport layer. Transport layer which is belongs to networking field. here i will provide all about transport layer in networking. And also handshakes procses. connection-oriented and connectionless protocols. TCP(Transmission control protocol) and UDP (User datagram protocol)
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...ijcsit
ABSTRACT
This paper prefers a fuzzy-logic-based sending rate adaption scheme named FSR(Fuzzy Sending Rate) intending to improve the evenness of TCPFriendly Multicast Congestion Control (TFMCC). To mitigate fluctuation of sending rate for TFMCC sender, FSR intends, five actions and link utilization for tuning sending rate and uses a fuzzy controller to determine which operation should be reaped according to the feedback information from CLR (current limiting receiver). Asymmetrical membership functions and biased fuzzy inference rules make FSR as friendly to TCP flows as TFMCC. Simulation results show that FSR has exceptional smoothness and fine TCP Friendliness.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
Proposition of an Adaptive Retransmission Timeout for TCP in 802.11 Wireless ...IJERA Editor
The Transport Control Protocol (TCP) is used to establish and control a session between two endpoints. The problem is that in 802.11 wireless environments TCP always considers that the packet loss is caused by network congestion. However, in these networks packet loss are usually caused by the high bit error rate, and the wireless link failures. Researchers found out that TCP performance in wireless networks can be highly enhanced as long as it is feasible to identify the packet loss causes; hence appropriate measures can be dynamically applied during an established TCP session in order to adjust the session parameters. This paper proposes an endto-end adaptive mechanism that allows the TCP session to dynamically adjust the RTO (Retransmission Timeout) of a TCP session; the server will have to adjust the timers based on feedbacks from clients. Feedbacks are piggybacked in the TCP Options header field of the ACK (Acknowledgment) messages. A feedback is an approximation of the time needed by the wireless channel to get the errors fixed. The mechanism has been validated using numerical analysis and simulations, and then compared to the original TCP protocol. Simulation results have shown better performance in terms of number of retransmissions at the server side due to the decrease in the number of timeouts; and thus lowest congestion on the wireless access point.
A Survey of Different Approaches for Differentiating Bit Error and Congestion...IJERD Editor
TCP provides reliable wireless communication. The packet loss occurs in wireless network during
the data transmission and these losses are always classified as congestion losses. While Packet is also lost due to
random bit error. But traditional TCP always consider as packet is lost due to congestion and reduce it
congestion window. Thus, TCP gives poor performance in wireless link. Many TCP variants have been
proposed for congestion control but they cannot distinguish error either due to congestion or due to bit error thus
it reduces congestion window every time but when there is a bit error then no need to reduce the transmission
rate. In this survey the general approaches taken for differentiating congestion or bit error has been discussed.
Transmission Control Protocol (TCP) is a fundamental protocol of the Internet Protocol Suite. TCP complements the Internet Protocol (IP), therefore it is common to refer to the internet protocol suit as TCP/IP. TCP is used for error detection, detection of packet loss or out of order delivery of data. TCP requests retransmission, rearranges data and helps with network congestion.
Several congestion control algorithms have been developed, over the last years, to improve TCP's performance over various technologies and network conditions.
The purpose of this assignment is to present TCP, network congestion, congestion algorithms and simulate different algorithms in different network conditions to measure their performance. For this assignment's needs, OPNET IT Guru Academic Edition software was used to accomplish the reproduction of projects that have been already published and gave the wanted results.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
This paper prefers a fuzzy-logic-based sending rate adaption scheme named FSR(Fuzzy Sending Rate) intending to improve the evenness of TCPFriendly Multicast Congestion Control (TFMCC). To mitigate fluctuation of sending rate for TFMCC sender, FSR intends, five actions and link utilization for tuning sending rate and uses a fuzzy controller to determine which operation should be reaped according to the feedback information from CLR (current limiting receiver). Asymmetrical membership functions and biased fuzzy inference rules make FSR as friendly to TCP flows as TFMCC. Simulation results show that FSR has exceptional smoothness and fine TCP Friendliness
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...IJCNCJournal
With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired
networks, where packet losses occur mostly because of congestion. However cellular wireless network
suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by
invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This
paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics.
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
Improving the performance of the transmission
control protocol (TCP) in wireless environment has been an
active research area. Main reason behind performance
degradation of TCP is not having ability to detect actual reason
of packet losses in wireless environment. In this paper, we are
providing a simulation results for TCP-P (TCP-Performance).
TCP-P is intelligent protocol in wireless environment which
is able to distinguish actual reasons for packet losses and
applies an appropriate solution to packet loss.
TCP-P deals with main three issues, Congestion in
network, Disconnection in network and random packet losses.
TCP-P consists of Congestion avoidance algorithm and
Disconnection detection algorithm with some changes in TCP
header part. If congestion is occurring in network then
congestion avoidance algorithm is applied. In congestion
avoidance algorithm, TCP-P calculates number of sending
packets and receiving acknowledgements and accordingly set
a sending buffer value, so that it can prevent system from
happening congestion. In disconnection detection algorithm,
TCP-P senses medium continuously to detect a happening
disconnection in network. TCP-P modifies header of TCP
packet so that loss packet can itself notify sender that it is
lost.This paper describes the design of TCP-P, and presents
results from experiments using the NS-2 network simulator.
Results from simulations show that TCP-P is 4% more
efficient than TCP-Tahoe, 5% more efficient than TCP-Vegas,
7% more efficient than TCP-Sack and equally efficient in
performance as of TCP-Reno and TCP-New Reno. But we can
say TCP-P is more efficient than TCP-Reno and TCP-New
Reno since it is able to solve more issues of TCP in wireless
environment.
Effective Router Assisted Congestion Control for SDN IJECEIAES
Router Assisted Congestion Control (RACC) was designed to improve endto-end congestion control performance by using prior knowledge on network condition. However, the traditional Internet does not provide such information, which makes this approach is not feasible to deliver. Our paper addresses this network information deficiency issue by proposing a new congestion control method that works on the Software Defined Network (SDN) framework. We call this proposed method as PACEC (Path Associativity Centralized Congestion Control). In SDN, global view of the network information contains the network topology including link properties (i.e., type, capacity, power consumption, etc.). PACEC uses this information to determine the feedback signal, in order for the source to start sending data at a high rate and to quickly reach fair-share rate. The simulation shows that the efficiency and fairness of PACEC are better than Transmission Control Protocol (TCP) and Rate Control Protocol (RCP).
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
In the last few years, video streaming facilities over TCP or UDP, such as YouTube, Facetime, Daily-motion, Mobile video calling have become more and more popular. The important
challenge in streaming broadcasting over the Internet is to spread the uppermost potential quality,
observe to the broadcasting play out time limitation, and efficiently and equally share the offered
bandwidth with TCP or UDP, and additional traffic types. This work familiarizes the Streaming
Media Data Congestion Control protocol (SMDCC), a new adaptive broadcasting streaming
congestion management protocol in which the connection’s data packets transmission frequency is
adjusted allowing to the dynamic bandwidth share of connection using SMDCC, the bandwidth share
of a connection is projected using algorithms similar to those introduced in TCP Westwood. SMDCC
avoids the Slow Jump phase in TCP. As a result, SMDCC does not show the pronounced rate
alternations distinguishing of modern TCP, so providing congestion control that is more appropriate
for streaming broadcasting applications. Besides, SMDCC is fair, sharing the bandwidth equitably
among a set of SMDCC connections. Main benefit is robustness when packet harms are due to
indiscriminate errors, which is typical of wireless links and is becoming an increasing concern due to
the emergence of wireless Internet access. In the presence of indiscriminate errors, SMDCC is also
approachable to TCP Tahoe and Reno (TTR). We provide simulation results using the ns3 simulator
for our protocol running together with TCP Tahoe and Reno.
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKScscpconf
The usage of fixed buffers in 802.11 networks has a number of disadvantages associated with
it. This includes high delay, reduced throughput and inefficient channel utilisation. To
overcome this, a dynamic buffer sizing algorithm, the A* algorithm has been implemented at
the access point. In this algorithm buffer size is dynamically adjusted depending upon the
current channel conditions and hence delay is reduced and the throughput is maintained. But
in 802.11 networks with DCF collision avoidance mechanism, it creates significant amount of
unfairness between the upstream and downstream TCP flows, with clusters of upstream ACKs
blocking downstream data at the access point. Thus a variation of the Explicit Window
Adaptation (EWA) scheme has been used to regulate the queuing time of the upload clients by
calculating the feedback value at the access point. This creates fairness and increases the number of transmission opportunities for the downstream traffic
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2. 160 Computer Science & Information Technology ( CS & IT )
related to one pair of transmitting – receiving nodes, but also one to all nodes in the
neighbourhood[2]. When congestion occurs and queues build up, congestion and contention will
become severe, leading to significant reduction in end-to-end throughput for any communication
pair in the neighbourhood.
In highly congested condition, the quick changes such as decreasing contention window after
successful transmission or doubling contention window after a collision, cause bandwidth
wastage and high variation in delay. Hence the intelligent and cooperative congestion and
contention algorithm is a must to provide end-to-end QoS at packet level and at flow level.
The rest of the paper is organized as follows. Section 2 gives various schemes presented in the
literature which incorporates MAC layer information to improve the TCP performance in wireless
environment and presents the detailed method to calculate the Retransmission Time-out and
focuses the existing Modified TCP congestion control algorithm. Section 3 shows the various
situations where the intelligent and collaborative congestion and contention algorithm are highly
recommended and the Finite State Machine definition is also given for Binary Exponential
Backoff (BEB), Exponential Increase Exponential Decrease(EIED), Double Increment Double
Decrement(DIDD), Linear/Multiplicative Increase and Linear Decrease(LMILD), Binary
Negative Exponential Backoff (BNEB) algorithms. Section 4 analyzes the performance of
modified TCP congestion control method with various backoff algorithms using NS2.34 under
different performance metrics. Finally the section 5 concludes the paper.
2. RELATED WORK
The contention based congestion control method is proposed in [3] which uses local information
such as successful transmissions and collisions undergone by each station. By monitoring number
of entries into the Backoff (BO) state, the station detects the collision rate. If the station gets into
BO state frequently, then it will suffer serious congestion. To indicate the degree of congestion,
the metric Backoff State Ratio (BSR) is determined based on the number of node’s entry into the
BO state. By comparing BSR ratio with threshold values, the packet is either sent out or dropped
or marked at the MAC layer to allow the ECN enhanced TCP flows. From the simulation results,
it has been shown that [3] this method increases the TCP performance in static wireless
environment by providing an early sign of network congestion.
Based on the channel busyness ratio, Wireless Congestion Control Protocol (WCCP) is proposed
in [4] to enhance the TCP performance in static multi hop ad hoc networks. Each intermediate
station monitors and allocates channel resources to the passing flows and modifies the feedback
field of the data packets according to its measured channel busyness ratio. The destination uses
this information to calculate its congestion window size which is sent along with ACK to the
sender. Finally, the sender adjusts the sending rate accordingly. Since the usable congestion
window of the TCP sender is determined by channel utilization status at each bottleneck node
along the transmission path, it has been shown that [4] WCCP significantly enhances the TCP
performance by solving the starvation problem.
The joint congestion and contention window control scheme is designed in [5] to help the TCP to
differentiate congestion losses from transmission errors to take proper remedial actions. The
snoop agent is implemented in both the transport layer and the MAC layer, which monitors every
packet that passes through the connection in either direction. The snoop agent caches TCP
packets sent from the TCP source and keeps track of the last ACK sent from mobile host. It
removes the TCP packets from cache if their corresponding ACKs are received. By estimating
probability of transmission failure and collision, the snoop agent adjusts the contention window
of the MAC layer and informs the TCP source to reset its congestion window size. With the
simulation, it has been shown that [5] this mechanism enhances the TCP performance in WLANs
by successfully alleviating the effects of radio channel errors on TCP protocol.
3. Computer Science & Information Technology ( CS & IT ) 161
A cross layer approach called Link Layer CLAMP-TCP (L2
CLAMP-TCP) is proposed in [6]. It
requires two additional software modules L2
CLAMP-Agent inside Base Station / Access Point
and L2
CLAMP-Client on the receiver which are included in the protocol stack above the Link
Layer. When the TCP packet is received by L2
CLAMP-Agent, it calculates the desired size of the
Advertised Window based on the values of congestion measure, receiver rate and RTT. It
generates and stores a TCP ACK with the calculated information in the buffer. Then it forwards
the TCP packet to the receiver and waits for Link Layer acknowledgement from L2
CLAMP-
client. Once it is received, L2
CLAMP-Agent sends the generated ACK with optimal Advertised
Window value to the TCP sender. If it is not, the generated ACK is dropped from the buffer.
Since the TCP ACK is suppressed from the receiver over wireless channel, it saves time which
can be utilized for data packet delivery. It has been shown from the simulation results [6], this
approach improves the TCP performance under error free and error prone environment.
2.1. Retransmission Time-Out (RTO)
TCP limits the transmission rate by adjusting the congestion window which gives a range of
sequence numbers of TCP packets which can be transmitted at a moment without waiting for
ACK. After transmitting a window’s worth of data, the TCP sender may stall while waiting for
an ACK. If an ACK packet is not received within RTO value, the TCP sender will assume that
the packet is lost and will retransmit the lost packet. To calculate RTO, Round Trip Time (RTT)
is required, which is the time needed for the packet to reach the destination and be acknowledged.
If an RTT measurement is started, no other measurement starts until the value of this RTT is
finalized. Due to Wireless Network dynamics, RTT of one packet could be different from that of
another. So the Exponential weighted moving average RTT (ṫ) and RTT variation (σt) are
determined based on the collected RTT samples and are used to compute the RTO value [7]. At
time k, let t(k) be the RTT sample, ṫ(k) be the smoothed RTT value, σt(k) be the RTT variation
and ∆ refer to t(k+1) - ṫ(k), then
By having equations (2) and (4), an unbound RTO value is found instead of using eqn (1) and (3)
to reduce the number of arithmetic operations.
4. 162 Computer Science & Information Technology ( CS & IT )
The stall time after transmitting the kth
window is given as follows [8]
where S refers to Maximum Segment Size (MSS) in bits and R denotes the transmission rate of
the link. The component (S/R + RTT) denotes the time the TCP sender begins to transmit the kth
window until the time when the sender receives an ACK for the first segment in the window. The
component 2k-1
(S/R) is the transmission time of the Kth
window. The RTO value needs to be
optimized according to the tradeoffs: a small RTO value leads to unnecessary packet
retransmission while a large RTO value results in high latency of packet loss detection.
2.2. Modified TCP Congestion Control
According to the Modified TCP which is proposed by A. Elrahim et al in [9], let w be the current
congestion window and wth be a slow start threshold, then, if w < wth, for every received ACK, w
is incremented as follows
When a time-out occurs, then the Modified TCP sets the value of the wth to ¾ of the previous w
and reduces w back to 4 MSS. The Fast Retransmit phase is started when 2 duplicate ACKs are
received. The differences between Modified TCP and TCP are summarised in Table 1.
Table 1 : Differences between TCP and Modified TCP
TCP m in
eqn (5)
wth Loss Detection
Timeout Fast Retransmission
TCP 4 ½ * w Reset w to 1 Entered when 3 ACKs are
received
Modifi
ed
TCP
5 ¾ * 3 Reset w to 4 Entered when 2 ACKs are
received
2.2.1. Benefits of Modifies TCP
(i)Unnecessary spurious timeouts are reduced due to increase in the value of m in eqn (3).
(ii) Early start of Fast Retransmission phase to reduce delay.
(iii) More transmission by a small increment of w for each ACK that arrives.
(iv)Fast recovery of the w by increasing slow start initialization point to 4 MSS .
(v)Longer slow start period by increasing wth.
3. PROPOSED METHODOLOGY
This section identifies the necessities for cooperative contention and congestion control
algorithms in wireless adhoc networks and gives the Finite State Machine definition for various
Backoff Algorithms.
5. Computer Science & Information Technology ( CS & IT ) 163
3.1. Need for cooperative algorithm
It is required to have intelligent and collaborative mechanism between TCP congestion control
and MAC contention window algorithm to reduce the effect of wireless interference on the TCP
performance. The most important reasons are listed below.
(i) Due to the nature of wireless communication (high probability of path loss, channel noise,
fading and interference), an unacknowledged packet could result from not only collisions
but also frame loss. But TCP always presumes that the packet was lost due to collision.
Consequently, slow start phase is started which reduces the congestion window and BO
parameters are exponentially increased. As a result, TCP throughput is not stabilized. So a
proper approach dealing with lost but non-collided packets should try to resend them
again as quickly as possible without unnecessarily exponential increase of BO parameters
and decrease of congestion window.
(ii) Even though MAC layer provides retransmission mechanism, packet may still be lost
without delivered to transport layer due to spurious interference or collision [5]. So TCP
triggers the retransmission with the help of recovery routines which degrade TCP
performance since the original packets need end-to-end retransmissions, which leads to an
undesirable reduction in the TCP congestion window.
(iii) The greediness of TCP flows, hidden terminal and receiver blocking problems cause a
severe unfairness problem which leads to flow starvation and packet collision [4].
Figure 1. Linear topology
Figure 1 shows the transmission range of node 4 and node2 by solid circle and carrier
sensing range by dotted circle. When node 4 is transmitting to node 5, node 2 is a
blocked receiver of node 1, since it is in carrier sensing range of node 4. Due to this,
node 1 continues to double its contention window and retransmitting packet until
dropping it. After completion of the transmission, node 4 has the highest priority to
capture the medium by resetting its contention window to minimum. If node 4 wants to
start a new transmission again, it has the highest priority for accessing the medium
because it has to wait only for the minimum duration. Thereby flow between node 1 and
node 2 will be starved. The situation will get worse, if TCP flows have to traverse more
hops to reach their destinations.
(iv) Mobility is one of the factor that causes TCP performance degradation in Ad hoc
networks even at very light traffic. MAC layer has to take a decision about whether the
link failure is caused by mobility or by congestion[10] and corrective mechanism has to
be started. Based on this, route discovery by network layer protocol or congestion
control by TCP will be initiated. Hence MAC layer highly influences the upper layer
operations.
From the aforementioned reasons, the cross layer interaction between the transport layer and the
MAC layer is an extremely important mechanism in wireless environment to help the TCP sender
to determine the reason for packet loss based on the information provided from the MAC layer
protocol.
6. 164 Computer Science & Information Technology ( CS & IT )
3.2 Backoff Contention Algorithms
IEEE 802.11 medium access mechanism uses a random access scheme with carrier sense and
collision avoidance through random backoff as shown in Figure 2 [11]. If the medium is idle for
at least the DIFS duration, a station can access the medium. If the medium is not idle, stations
have to wait for the DIFS duration and entering into the contention phase. Then the station has to
choose random BO time within the contention window(CW) and delays medium access for this
random time. Tremendous BO algorithms were proposed in the literature which differ from other
algorithms by means of selecting the random BO time from the chosen contention window. In
this paper, Binary Exponential Backoff (BEB) [11], Exponential Increase Exponential Decrease
(EIED)[12], Double Increment Double Decrement (DIDD) [13], Linear/ Multiplicative Increase
and Linear Decrease(LMILD)[14], Binary Negative Exponential Backoff (BNEB)[15] algorithms
are analyzed based on the NS2 simulation.
Figure 2. Medium Access Mechanism of IEEE 802.11
The behaviour of these algorithms are depicted as Finite State Machine (FSM) definition in
Figure. 3. The arrows in the FSM description indicate the transition of the BO Algorithm from
one state to another. The event causing the transition is shown above the horizontal line and the
actions taken when the event occurs are shown below the horizontal line. The state transition
occurs based on the event, if no action is taken on transition, then the symbol ᴧ is used below the
horizontal line. The initial state of the FSM is indicated by the dashed arrow.
Figure 3. FSM Definition for BO Algorithms
7. Computer Science & Information Technology ( CS & IT ) 165
Whenever the packet is ready to send, station performs the carrier sensing and goes to the next
state in which it waits for the amount of duration given by Waiting Time (WT). Once WT
expired, it goes to Transmission state. There are three possible events at this state. If there are no
more packets to send, then station goes to Idle state. When collision occurs during the
transmission or transmission is successful and more packets are to be sent, CW is adjusted based
on the BO algorithms used. Then the station goes to waiting state to wait for the newly calculated
WT.
4. PERFORMANCE ANALYSIS
The simulation to evaluate the performance of Modified TCP congestion control with various
BO algorithms is done by using NS2 simulator [16] for the metrics throughput, end-to-end delay,
packet loss, congestion window variation. For simulation, 20 mobile nodes and 10 TCP flows to
transfer data during the simulation time (200sec) are considered. The source and destination pairs
are randomly chosen by cbrgen.tcl script [16] and random mobility pattern is applied by setdest
command. To calculate the movement of nodes, pause time of 2 sec and maximum speed of 5 m/s
are used in the simulation. Each node moves towards a random destination with a speed
uniformly distributed between 0 and maximum speed. When it moves to target position, it waits
for pause time and then selects another target and moves towards it. This mobility will continue
till the end of the simulation.
4.1 Performance of Modified TCP
The benefits of modified TCP listed in section 2.2.1 are validated by NS2 simulation under the
metrics throughput and energy consumption. The results obtained from the simulation are plotted
in Figure 4 and Figure 5. From Figure 4, it is inferred that higher throughput is achieved by
modified TCP by having larger, stable and optimal congestion window size due to the above
mentioned benefits, whereas in Traditional TCP, the throughput is decreased due to unstable
congestion window size.
Figure 4. Throughput Comparison
8. 166 Computer Science & Information Technology ( CS & IT )
It is observed from Figure 5, modified TCP has consumed less energy by avoiding incorrect
triggering of usable congestion window reduction. Consequently it reduces number of
retransmission leading to lesser energy consumption. Based on these results, Modified TCP is
considered further for analyzing the impact of MAC layer contention algorithms in the TCP
congestion control algorithm.
Figure 5. Energy Consumption
4.2 Changes in Congestion Window
By simulating various BO Contention algorithm with modified TCP, the changes in the
congestion window are noted and plotted in Figure 6. It is inferred that from the Figure 6, from
the simulation time 120sec onwards, the congestion window size is unstable because of increased
traffic load. Among the analyzed BO algorithms, DIDD has fairly unstable congestion window
sizes. This is because of the characteristic of DIDD contention scheme[13]. In this, every data
packet is being retransmitted until its successful transmission. Due to this repeated
retransmission, frequent time-out event occurs which requires frequent changes in congestion
window. It is also observed that LMILD has similar fluctuation of congestion window sizes at the
beginning and ending of the simulation upto 150sec. LMILD assumes that packet loss is only due
to congestion. It fails to detect the collided packets due to channel fading[17] in mobile
environment.
As a result, usable congestion window is reduced. BNEB gives better performance in ideal
channel condition, but not in the presence of transmission errors. Whenever the traffic load and
transmission errors are increased, BNEB keeps a maximum CW size. Moreover in EILD, after
successful transmission, CW size is linearly decreased. Whereas in some BO algorithms, CW is
set to either minimum CW(as in BEB) or half of the current CW (as in DIDD).Due to this, EILD
also chooses longer waiting time. This increased contention time triggers the time-out frequently
in TCP congestion control mechanism, and hence more fluctuation in congestion window size
after 120sec.
4.3 Throughput
Throughput refers to the amount of data received by the receiver per unit seconds. The simulation
is carried out to compute the throughput while executing various BO algorithms. The results are
plotted in Figure 7 . It is inferred that, EILD has lesser throughput. Because usable congestion
window is nearly 1 from 60sec to 120 sec and after that high fluctuation in congestion window
size as shown in Figure 7. It implies lesser throughput compared with other algorithms. LMILD
has higher throughput after 150sec, because its congestion window is more stable during that
time which implies high throughput.
10. 168 Computer Science & Information Technology ( CS & IT )
4.4 Packet loss
The number of lost packets are calculated at different simulation time which is plotted in Figure
8. It is inferred that from Figure 8, packet loss is less in DIDD from 60sec onwards. This is
because, the packets that reach their maximum number of retransmission are not discarded in
DIDD scheme [13]. In BNEB,when collision occurs, CW is incremented linearly, so it doesn't
give much difference between previous and current CW size, which is not favorable in case of
highly congested situation as it increases packet loss.
Figure 8. Packet Loss Comparison
4.5 End-to-end delay
End-to-End delay is the sum of delays experienced at each node from source and destination. It
includes transmission delay, propagation delay and processing time. The simulation is carried out
to calculate the end-to-end delay while executing various BO algorithms. The results are plotted
in Figure 9. It is inferred that BNEB increases the end-to-end delay, since it keeps a maximum
CW size to avoid collision probability. After successful transmission, EILD linearly decreases the
CW size. Due to this, larger BO time is chosen from the CW range thereby increasing delay.
Whereas in some BO algorithms, CW is set to either minimum CW(as in BEB) or half of the
current CW (as in DIDD) to reduce the CW range.
5. CONCLUSIONS
TCP congestion control implicitly assumes the packet loss only due to congestion. But in wireless
environment, packet loss may also due to transmission error, collisions, link breakage and
medium contention, which must be correctly attributed by MAC layer. The incorrect reaction to
the packet loss may lead to a curbing of congestion window size thereby limiting the performance
of TCP in wireless ad hoc networks. From the simulation results, it is evident that the contention
window greatly influences the congestion control mechanism which affects the overall
performance of the network. Hence the designing of an intelligent and collaborative MAC layer
contention and TCP layer Congestion control algorithm is an extremely important issue in
wireless adhoc network.
11. Computer Science & Information Technology ( CS & IT ) 169
Figure 9. End to End Delay Comparison
REFERENCES
[1] Ahmad Al Hanbali, Eitan Altman and Philippe,(2005) “ A survey of TCP over Ad Hoc Networks”,
IEEE communications surveys & tutorials, Third Quarters, Vol: 7 pp. 22 - 36.
[2] H. Zhai, J. Wang, X. Chen, and Y. Fang, (2004) “Medium access control in mobile ad hoc networks:
Challenges and solutions”, Journal on Wireless Communications & Mobile Computing, Vol 6, pp.
151 – 170.
[3] Lin Ma, Jun Zhang and Kai Liu, (2010) “ Contention-based congestion control in wireless ad hoc
networks”, International Conference on Information, Networking and Automation (ICINA), Vol. 2,
pp. 28 –32.
[4] H. Zhai, X. Chen, and Y. Fang, (2007) “Improving Transport Layer Performance In Multihop Ad Hoc
Networks by Exploiting MAC Layer Information”, IEEE Transactions on Wireless Communications,
vol. 6, no. 5, pp. 1692 – 1701.
[5] Der-Jiunn Deng, Rung-Shiang Cheng, Heng-Jia Chang, Hui-Tang Lin and Ruay-Shiung Chang,
(2009) “A cross-layer congestion and contention window control scheme for TCP performance
improvement in wireless LANs” , Telecommunication Systems, Volume 42, pp. 17-27.
[6] Priya, S.S., Murugan, K., (2009) “Cross Layer Approach to Enhance TCP Performance over Wireless
Networks”, In:Proc. IEEE Students’ Technology Symposium(TechSym),pp.171–176.
[7] Teerawat Issariyakul and Ekram Hossain, (2009) “Introduction to Network Simulator NS2”, Springer
publication.
[8] James F.Kurose, Keith W.Ross, (2005) “Computer Networking- A Top Down Approach Featuring the
Internet”, Third Edition, Pearson Education. .
[9] Adel Gaafar A Elrahim, Hussein A Elsayed, Salwa El Ramaly, Magdy M Ibrahim, (2011) “Energy
efficient congestion control operation in WSNs “, International Conference on Computer
Engineering Systems , pp . 41-46.
[10] Noor Mast and Thomas J Owens, (2011), “A survey of performance enhancement of transmission
control protocol (TCP) in wireless ad hoc networks”, EURASIP Journal on Wireless Communications
and Networking, DOI : http://dx.doi.org/10.1186/1687-1499-2011-96
[11] Jochen H. Schiller, (2003) “Mobile Communication”, Second Edition, Pearson Education.
[12] Jian Li, Xianwen Zeng, Q. Su, (2008) “Performance Investigation of Backoff Algorithms in Multihop
Wireless Networks”, International Conference for Young Computer Scientists, pp.564-569.
12. 170 Computer Science & Information Technology ( CS & IT )
[13] P. Chatzimisios, V. Vitsas, A.C. Boucouvalas, M. Tsoulfa, (2007) “Achieving performance
enhancement in IEEE 802.11 WLANs by using the DIDD backoff mechanism”, International Journal
of Communication Systems. Vol 20, pp. 23-41.
[14] J. Deng, P. K. Varshney, and Z. J. Haas, (2009) “A new backoff algorithm for the IEEE 802.11
distributed coordination function”, In Proceedings of the 6th International Conference on Fuzzy Systems and
Knowledge Discovery (FSKD 2009), Vol 3,pp. 455-459 .
[15] Ki, H.J., Choi, S.-H., Chung, M.Y., Lee, T.-J, (2006) “Performance evaluation of Binary Negative-
Exponential Backoff Algorithm in IEEE 802.11 WLAN”, In Proceedings of Mobile Adhoc ans Sensor
Networks (MSN), vol. 4325, pp. 294–303.
[16] http://isi.edu/nsnam
[17] Bum-Gon Choi, Hyung Joo Ki, Min Young Chung, and Tae-Jin Lee, (2007) “Performance Evaluation
of Binary Negative-Exponential Backoff Algorithm in Presence of a Channel Bit Error Rate”,
International Conference on Computational Science, Part IV: ICCS 2007, pp. 554–557.