Chapter 3 Transport Layer

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 3 Transport Layer Chapter 3 Transport Layer A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you can add, modify, and delete slides Computer Networking: (including this one) and slide content to suit your needs. They obviously A Top Down Approach represent a lot of work on our part. In return for use, we only ask the following: Featuring the Internet, q If you use these slides (e.g., in a class) in substantially unaltered form, 3rd edition. that you mention their source (after all, we’d like people to use our book!) q If you post any slides in substantially unaltered form on a www site, that Jim Kurose, Keith Ross you note that they are adapted from (or perhaps identical to) our slides, and Addison-Wesley, July note our copyright of this material. 2004. Thanks and enjoy! JFK/KWR All material copyright 1996-2005 J.F Kurose and K.W. Ross, All Rights Reserved Transport Layer 3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services r learn about transport layer protocols in the Internet Transport Layer 3-2 Chapter 3 outline r 3.1 Transport-layer r 3.5 Connection-oriented services transport: TCP r 3.2 Multiplexing and m segment structure demultiplexing m reliable data transfer r 3.3 Connectionless m flow control transport: UDP m connection management r r 3.4 Principles of 3.6 Principles of reliable data transfer congestion control r 3.7 TCP congestion control Transport Layer 3-3 Transport services and protocols r provide logical communication application transport between app processes network data link network running on different hosts physical logical end data link network physical r transport protocols run in data link physical end systems network - data link end transport m physical network send side: breaks app data link messages into segments, physical network passes to network layer data link physical m rcv side: reassembles segments into messages, application transport passes to app layer network data link r more than one transport physical protocol available to apps Transport Layer 3-4 Transport vs. network layer r network layer: logical communication between hosts r transport layer: logical communication between processes m relies on, enhances, network layer services Transport Layer 3-5 Common Transport Layer Functions r Demux to upper layer r Delivery semantics m Delivering data to correct m Reliable or unreliable application process m Ordered or unordered r Quality of service m Unicast, multicast, m Providing service anycast guarantees in processing (buffers, process r Flow control scheduling) m Prevent overflow of r Security receiver buffers m Authenticity, Privacy, r Congestion control Integrity for connection m Prevent overflow of r Connection setup network buffers m Providing a connection m Avoid packet loss and abstraction over a connectionless substrate packet delay Transport Layer 3-6 UDP and Transport Layer Functions r Demux to upper layer m UDP port field r Quality of service m none r Security m None r Connection setup m none r Delivery semantics m Unordered, unicast or multicast m Unreliable, but data integrity provided by checksum r Flow control m none r Congestion control m none Transport Layer 3-7 TCP and Transport Layer Functions r Demux to upper layer m TCP port field r Quality of service m none r Security m None, rely on TLS (SSL) r Connection setup m 3-way handshake r Delivery semantics m In-order, unicast m Data integrity provided via 32-bit checksum r Flow control m Receiver advertised window r Congestion control m Window-based Transport Layer 3-8 SCTP and Transport Layer Functions r Demux to upper layer m SCTP port field r Quality of service m none r Security m Limited DoS protection via signed state cookie (SYN cookies) m Rely on TLS (SSL) r Connection setup m 4-way handshake r Delivery semantics m Optional ordering, unicast m Optional reliability, but data integrity provided via 32-bit CRC r Flow control m Receiver advertised window r Congestion control m Window-based Transport Layer 3-9 Chapter 3 outline r 3.1 Transport-layer r 3.5 Connection-oriented services transport: TCP r 3.2 Multiplexing and m segment structure demultiplexing m reliable data transfer r 3.3 Connectionless m flow control transport: UDP m connection management r r 3.4 Principles of 3.6 Principles of reliable data transfer congestion control r 3.7 TCP congestion control Transport Layer 3-10 Multiplexing/demultiplexing Demultiplexing at rcv host: Multiplexing at send host: gathering data from multiple delivering received segments sockets, enveloping data with to correct socket header (later used for demultiplexing) = socket = process application P3 P1P1 application P2 P4 application transport transport transport network network network link link link physical physical physical host 3 host 1 host 2 Transport Layer 3-11 How demultiplexing works r host receives IP datagrams m each datagram has source IP address, destination IP 32 bits address source port # dest port # m each datagram carries 1 transport-layer segment m each segment has source, other header fields destination port number r host uses IP addresses & port numbers to direct segment to appropriate socket application m source, dest port #s in each segment data m recall: well-known port numbers for specific applications (message) m Servers wait on well known ports (/etc/services) TCP/UDP segment format Transport Layer 3-12 Connectionless demultiplexing r When host receives UDP r Create sockets with port numbers: segment: DatagramSocket mySocket1 = new m checks destination port DatagramSocket(99111); number in segment DatagramSocket mySocket2 = new m directs UDP segment to DatagramSocket(99222); socket with that port number r UDP socket identified by two-tuple: r IP datagrams with different source IP (dest IP address, dest port number) addresses and/or source port numbers directed to same socket Transport Layer 3-13 Connectionless demux (cont) DatagramSocket serverSocket = new DatagramSocket(6428); P1 P2 P3 P1 SP: 6428 SP: 6428 DP: 9157 DP: 5775 SP: 9157 SP: 5775 client DP: 6428 server DP: 6428 Client IP: A IP: C IP:B SP provides “return address” Transport Layer 3-14 Connection-oriented demux r TCP socket identified r Server host may support by 4-tuple: many simultaneous TCP m source IP address sockets: m source port number m each socket identified by m dest IP address its own 4-tuple m dest port number r Web servers have r recv host uses all four different sockets for values to direct each connecting client segment to appropriate m non-persistent HTTP will socket have different socket for each request Transport Layer 3-15 Connection-oriented demux (cont) P1 P4 P5 P6 P2 P1P3 SP: 5775 DP: 80 S-IP: B D-IP:C SP: 9157 SP: 9157 client DP: 80 server DP: 80 Client IP: A S-IP: A IP: C S-IP: B IP:B D-IP:C D-IP:C Transport Layer 3-16 Connection-oriented demux: Threaded Web Server P1 P4 P2 P1P3 SP: 5775 DP: 80 S-IP: B D-IP:C SP: 9157 SP: 9157 client DP: 80 server DP: 80 Client IP: A S-IP: A IP: C S-IP: B IP:B D-IP:C D-IP:C Transport Layer 3-17 Chapter 3 outline r 3.1 Transport-layer r 3.5 Connection-oriented services transport: TCP r 3.2 Multiplexing and m segment structure demultiplexing m reliable data transfer r 3.3 Connectionless m flow control transport: UDP m connection management r r 3.4 Principles of 3.6 Principles of reliable data transfer congestion control r 3.7 TCP congestion control Transport Layer 3-18 UDP: User Datagram Protocol [RFC 768] r “no frills,” “bare bones” Internet transport Why is there a UDP? protocol r no connection r “best effort” service, UDP establishment (which can segments may be: add delay) m lost r simple: no connection state m delivered out of order at sender, receiver to app r small segment header r connectionless: r no congestion control: UDP m no handshaking between can blast away as fast as UDP sender, receiver desired m each UDP segment handled independently of others Transport Layer 3-19 UDP: more r often used for streaming 32 bits multimedia apps m loss tolerant Length, in source port # dest port # m rate sensitive bytes of UDP length checksum r other UDP uses segment, m DNS including header m SNMP r reliable transfer over UDP m add reliability at Application application layer data m application-specific error (message) recovery! m Many applications re- implement reliability over UDP segment format UDP to bypass TCP m New transport protocols? Transport Layer 3-20 UDP checksum Goal: detect “errors” (e.g., flipped bits) in transmitted segment Sender: Receiver: r treat segment contents r compute checksum of as sequence of 16-bit received segment integers r check if computed checksum r checksum: addition (1’s equals checksum field value: complement sum) of m NO - error detected segment contents m YES - no error detected. r sender puts checksum But maybe errors value into UDP checksum nonetheless? More later field …. Transport Layer 3-21 Internet Checksum Example r Note m When adding numbers, a carryout from the most significant bit needs to be added to the result m 1s complement => convert 0 to 1 and 1 to 0 r Example: checksum for two 16-bit integers 1 1 1 1 0 0 1 1 0 0 1 1 0 0 1 1 0 1 1 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 wraparound 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1 sum 1 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0 checksum 1 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1 Transport Layer 3-22 Internet Checksum Example r Verification at receiver m Add all 16-bit words and checksum together m If no errors, sum will be all 1s 1 1 1 1 0 0 1 1 0 0 1 1 0
Recommended publications
  • Modeling and Performance Evaluation of LTE Networks with Different TCP Variants Ghassan A
    World Academy of Science, Engineering and Technology International Journal of Electronics and Communication Engineering Vol:5, No:3, 2011 Modeling and Performance Evaluation of LTE Networks with Different TCP Variants Ghassan A. Abed, Mahamod Ismail, and Kasmiran Jumari Abstract—Long Term Evolution (LTE) is a 4G wireless Comparing the performance of 3G and its evolution to LTE, broadband technology developed by the Third Generation LTE does not offer anything unique to improve spectral Partnership Project (3GPP) release 8, and it's represent the efficiency, i.e. bps/Hz. LTE improves system performance by competitiveness of Universal Mobile Telecommunications System using wider bandwidths if the spectrum is available [2]. (UMTS) for the next 10 years and beyond. The concepts for LTE systems have been introduced in 3GPP release 8, with objective of Universal Terrestrial Radio Access Network Long-Term high-data-rate, low-latency and packet-optimized radio access Evolution (UTRAN LTE), also known as Evolved UTRAN technology. In this paper, performance of different TCP variants (EUTRAN) is a new radio access technology proposed by the during LTE network investigated. The performance of TCP over 3GPP to provide a very smooth migration towards fourth LTE is affected mostly by the links of the wired network and total generation (4G) network [3]. EUTRAN is a system currently bandwidth available at the serving base station. This paper describes under development within 3GPP. LTE systems is under an NS-2 based simulation analysis of TCP-Vegas, TCP-Tahoe, TCP- Reno, TCP-Newreno, TCP-SACK, and TCP-FACK, with full developments now, and the TCP protocol is the most widely modeling of all traffics of LTE system.
    [Show full text]
  • Analysing TCP Performance When Link Experiencing Packet Loss
    Analysing TCP performance when link experiencing packet loss Master of Science Thesis [in the Programme Networks and Distributed System] SHAHRIN CHOWDHURY KANIZ FATEMA Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering Göteborg, Sweden, October 2013 The Author grants to Chalmers University of Technology and University of Gothenburg the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company), acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet. Analysing TCP performance when link experiencing packet loss SHAHRIN CHOWDHURY, KANIZ FATEMA © SHAHRIN CHOWDHURY, October 2013. © KANIZ FATEMA, October 2013. Examiner: TOMAS OLOVSSON Chalmers University of Technology University of Gothenburg Department of Computer Science and Engineering SE-412 96 Göteborg Sweden Telephone + 46 (0)31-772 1000 Department of Computer Science and Engineering Göteborg, Sweden October 2013 Acknowledgement We are grateful to our supervisor and examiner Tomas Olovsson for his valuable time and assistance in compilation for this thesis.
    [Show full text]
  • Latency and Throughput Optimization in Modern Networks: a Comprehensive Survey Amir Mirzaeinnia, Mehdi Mirzaeinia, and Abdelmounaam Rezgui
    READY TO SUBMIT TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS JOURNAL 1 Latency and Throughput Optimization in Modern Networks: A Comprehensive Survey Amir Mirzaeinnia, Mehdi Mirzaeinia, and Abdelmounaam Rezgui Abstract—Modern applications are highly sensitive to com- On one hand every user likes to send and receive their munication delays and throughput. This paper surveys major data as quickly as possible. On the other hand the network attempts on reducing latency and increasing the throughput. infrastructure that connects users has limited capacities and These methods are surveyed on different networks and surrond- ings such as wired networks, wireless networks, application layer these are usually shared among users. There are some tech- transport control, Remote Direct Memory Access, and machine nologies that dedicate their resources to some users but they learning based transport control, are not very much commonly used. The reason is that although Index Terms—Rate and Congestion Control , Internet, Data dedicated resources are more secure they are more expensive Center, 5G, Cellular Networks, Remote Direct Memory Access, to implement. Sharing a physical channel among multiple Named Data Network, Machine Learning transmitters needs a technique to control their rate in proper time. The very first congestion network collapse was observed and reported by Van Jacobson in 1986. This caused about a I. INTRODUCTION thousand time rate reduction from 32kbps to 40bps [3] which Recent applications such as Virtual Reality (VR), au- is about a thousand times rate reduction. Since then very tonomous cars or aerial vehicles, and telehealth need high different variations of the Transport Control Protocol (TCP) throughput and low latency communication.
    [Show full text]
  • Lab 6: Understanding Traditional TCP Congestion Control (HTCP, Cubic, Reno)
    NETWORK TOOLS AND PROTOCOLS Lab 6: Understanding Traditional TCP Congestion Control (HTCP, Cubic, Reno) Document Version: 06-14-2019 Award 1829698 “CyberTraining CIP: Cyberinfrastructure Expertise on High-throughput Networks for Big Science Data Transfers” Lab 6: Understanding Traditional TCP Congestion Control Contents Overview ............................................................................................................................. 3 Objectives............................................................................................................................ 3 Lab settings ......................................................................................................................... 3 Lab roadmap ....................................................................................................................... 3 1 Introduction to TCP ..................................................................................................... 3 1.1 TCP review ............................................................................................................ 4 1.2 TCP throughput .................................................................................................... 4 1.3 TCP packet loss event ........................................................................................... 5 1.4 Impact of packet loss in high-latency networks ................................................... 6 2 Lab topology...............................................................................................................
    [Show full text]
  • The Effects of Different Congestion Control Algorithms Over Multipath Fast Ethernet Ipv4/Ipv6 Environments
    Proceedings of the 11th International Conference on Applied Informatics Eger, Hungary, January 29–31, 2020, published at http://ceur-ws.org The Effects of Different Congestion Control Algorithms over Multipath Fast Ethernet IPv4/IPv6 Environments Szabolcs Szilágyi, Imre Bordán Faculty of Informatics, University of Debrecen, Hungary [email protected] [email protected] Abstract The TCP has been in use since the seventies and has later become the predominant protocol of the internet for reliable data transfer. Numerous TCP versions has seen the light of day (e.g. TCP Cubic, Highspeed, Illinois, Reno, Scalable, Vegas, Veno, etc.), which in effect differ from each other in the algorithms used for detecting network congestion. On the other hand, the development of multipath communication tech- nologies is one today’s relevant research fields. What better proof of this, than that of the MPTCP (Multipath TCP) being integrated into multiple operating systems shortly after its standardization. The MPTCP proves to be very effective for multipath TCP-based data transfer; however, its main drawback is the lack of support for multipath com- munication over UDP, which can be important when forwarding multimedia traffic. The MPT-GRE software developed at the Faculty of Informatics, University of Debrecen, supports operation over both transfer protocols. In this paper, we examine the effects of different TCP congestion control mechanisms on the MPTCP and the MPT-GRE multipath communication technologies. Keywords: congestion control, multipath communication, MPTCP, MPT- GRE, transport protocols. 1. Introduction In 1974, the TCP was defined in RFC 675 under the Transmission Control Pro- gram name. Later, the Transmission Control Program was split into two modular Copyright © 2020 for this paper by its authors.
    [Show full text]
  • Computer Networks ICS
    Computer Networks ICS 651 ● congestion collapse ● congestion control: TCP Reno ● congestion control: TCP Vegas ● other ways of detecting congestion ● addressing congestion ● router intervention ● Internet Explicit Congestion Notification ● FIFO queueing ● fair queueing Router Congestion • assume a fast router • two gigabit-ethernet links receiving lots of outgoing data • one (relatively) slow internet link (10 Mb/s uplink speed) sending the outgoing data • if the two links send more than a combined 10 Mb/s over an extended period, the router buffers will fill up • eventually the router will have to discard data due to congestion: more data being sent than the line can carry Congestion Collapse • assume a fixed timeout • if I have n bytes/second to send, I send them • if they get dropped, I retransmit them (total 2n bytes/second, 3n bytes/second, ...) • when there is congestion, packets get dropped • if everybody retransmits with fixed timeout, the amount of data sent grows, increasing congestion • so some congestion (enough to drop packets) causes more congestion!!!! • eventually, very little data gets through, most is discarded • the network is (nearly) down TCP Reno • exponential backoff: if retransmit timer was t before retransmission, it becomes 2t after retransmission • careful RTT measurements give retransmission as soon as possible, but no sooner • keep a congestion window: • effective window is lesser of: (1) flow control window, and (2) congestion window • congestion window is kept only on the sender, and never communicated between
    [Show full text]
  • Better Throughput in TCP Congestion Control Algorithms on Manets
    (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks Scalable TCP: Better Throughput in TCP Congestion Control Algorithms on MANETs M.Jehan Dr. G.Radhamani Associate Professor, Department of Computer Science, Professor & Director, Department of Computer Science, D.J.Academy for Managerial Excellence, Dr.G.R.Damodaran College of Science, Coimbatore, India Coimbatore, India Abstract—In the modern mobile communication world the This paper is entirely devoted to evaluating the Control congestion control algorithms role is vital to data transmission Window (cwnd), Round Trip Delay Time (rtt) and Throughput between mobile devices. It provides better and reliable using the TCP BIC, Vegas and Scalable TCP congestion communication capabilities in all kinds of networking control algorithms in the wireless networks. environment. The wireless networking technology and the new kind of requirements in communication systems needs some II. BACKGROUND WORK extensions to the original design of TCP for on coming technology development. This work aims to analyze some TCP congestion A. Congestion Control in Transmission Control Protocol control algorithms and their performance on Mobile Ad-hoc Algorithms Networks (MANET). More specifically, we describe performance TCP (Transmission Control Protocol) is a set of rules behavior of BIC, Vegas and Scalable TCP congestion control (protocol) used along with the Internet Protocol (IP) to send algorithms. The evaluation is simulated through Network data in the form of message units between computers over the Simulator (NS2) and the performance of these algorithms is Internet. It operates at a higher level, concerned only with the analyzed in the term of efficient data transmission in wireless and two end systems.
    [Show full text]
  • An Efficient Mechanism of TCP-Vegas on Mobile IP Networks
    An Efficient Mechanism of TCP-Vegas on Mobile IP Networks Cheng-Yuan Ho, Yi-Cheng Chan, and Yaw-Chung Chen Department of Computer Science and Information Engineering National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu 30050, Taiwan, R.O.C. [email protected], [email protected], [email protected] Abstract— Mobile IP network provides hosts the connectivity Mobile IP [2], [3]. to the Internet while changing locations. However, when using MIP (Mobile Internet Protocol) provides hosts with the TCP Vegas over a mobile network, it may respond to a handoff ability to change their point of attachment to the network by invoking a congestion control algorithm, thereby resulting in performance degradation, because TCP Vegas is sensitive to the without compromising their ability in communications. The change of RTT (Round-Trip Time) and it may recognize the mobility support provided by MIP is transparent to other increased RTT as a result of network congestion. Since TCP protocol layers so as not to affect those applications which do Vegas could not differentiate whether the increased RTT is due not have mobility features. MIP introduces three new entities to route change or network congestion. This work investigates required to support the protocol: the Home Agent (HA), the how to improve the performance of Vegas after a Mobile IP handoff and proposes a variation of TCP Vegas, so-called Demo- Foreign Agent (FA) and the Mobile Node (MN). Further Vegas, which is able to detect the movement of two end-hosts of information on MIP functionality can be found in [2], [3].
    [Show full text]
  • Performance Evaluation of TCP Vegas Over TCP Reno and TCP New Reno Over TCP Reno
    VOL 3 (2019) NO 3 e-ISSN : 2549-9904 ISSN : 2549-9610 INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION Performance Evaluation of TCP Vegas over TCP Reno and TCP New Reno over TCP Reno Tanjia Chowdhury #, Mohammad Jahangir Alam # # Department of Computer Science and IT, Southern University Bangladesh, Bangladesh E-mail: [email protected], [email protected] Abstract — In the Transport layer, there are two types of Internet Protocol are worked, namely- Transmission Control Protocol (TCP) and User datagram protocol (UDP). TCP provides connection-oriented service and it can handle congestion control, flow control, and error detection whereas UDP does not provide any of service. TCP has several congestion control mechanisms such as TCP Reno, TCP Vegas, TCP New Reno, TCP Tahoe, etc. In this paper, we have focused on the behavior performance between TCP Reno and TCP Vegas, TCP New Reno over TCP Reno, when they share the same bottleneck link at the router. For instigating this situation, we used drop-tail and RED algorithm at the router and used NS-2 simulator for simulation. From the simulation results, we have observed that the performance of TCP Reno and TCP Vegas is different in two cases. In drop tail algorithm, TCP Reno achieves better Performance and throughput and act more an aggressive than Vegas. In Random Early Detection (RED) algorithm, both of congestion control mechanism provides better fair service when they coexist at the same link. TCP NewReno provides better performance than TCP Reno. Keywords — Drop-tail algorithm, Fairness, RED, TCP Congestion control. sending and receiving transmission rate when congestion I.
    [Show full text]
  • TCP in Manets – Challenges and Solutions
    FFI-rapport 2012/01289 TCP in MANETs – challenges and Solutions Erlend Larsen Norwegian Defence Research Establishment (FFI) 27 September 2012 FFI-rapport 2012/01289 1175 P: ISBN 978-82-464-2133-9 E: ISBN 978-82-464-2134-6 Keywords Mobile Ad Hoc Nettverk Metningskontroll Transportprotokoll Approved by Torunn Øvreås Project Manager Anders Eggen Director 2 FFI-rapport 2012/01289 English summary Mobile Ad hoc NETworks (MANETs) have gained significant popularity through the last decade, not least due to the emergence of low cost technology and the pervasiveness of the IP protocol stack. The FFI-project 1175, ”Gjennomgaende˚ kommunikasjon for operative enheter”, is chartered with researching MANETs for use by the Norwegian operational military forces. Self-organizing and self-healing wireless multihop networks, MANETs are aimed at supporting tactical domain communications with a high grade of mobility. These networks will interconnect with other networks in the Networking and Information Infrastructure (NII) using IP as the common connecting protocol. The Transmission Control Protocol (TCP) is ”the protocol that saved the Internet”, most importantly because of its congestion control mechanism. It is a vital building stone in IP-based networks, but it faces serious challenges when used in MANETs, since MANETs are challenged with interference and high grade of mobility, from which wired networks are spared. Thus, to employ MANETs interconnected in the defense communication infrastructure, it is important to study the problems and the current state of the art of TCP in MANETs. This report is aimed at introducing readers to the TCP protocol, describing the challenges that TCP faces in MANETs, and give an overview of ongoing research to adapt TCP to MANETs.
    [Show full text]
  • Scenario Based Performance Analysis of Variants of TCP Using NS2-Simulator
    International Journal of Advancements in Technology http://ijict.org/ ISSN 0976-4860 Scenario Based Performance Analysis of Variants of TCP using NS2-Simulator Yuvaraju B. N, Niranjan N Chiplunkar Department of Computer Science and Engineering NMAM Institute of Technology, Nitte - 574110, Karnataka, INDIA. [email protected], [email protected] Abstract The increasing demands and requirements for wireless communication systems especially in settings where access to wired infrastructure is not possible like natural disasters, conferences and military settings have led to the need for a better understanding of fundamental issues in TCP optimization in MANETS.TCP primarily designed for wired networks, faces performance degradation when applied to the ad-hoc scenario. Earlier work in MANETs focused on comparing the performance of different routing protocols. Our analysis is on performance of the variants of TCP in MANETS. Several different variants have been developed in order to refine congestion control in Mobile Adhoc Networks. These variants of TCP perform better under specific scenarios, our Analysis of the variants of TCP is based on three performance metrics: TCP Throughput ,Average End- to -End delay and Packet Delivery Fraction in high and low mobility. This analysis will be useful in determining the better variant among TCP Protocols to ensure better data transfer, speed, and reliability and congestion control. In this paper we carry out performance study of six variants of TCP to be able to classify which variant of TCP performs better in various possible scenarios in MANETs. Keywords: Ad-hoc Networks, Congestion and Mobile Relays. 1. Introduction Effectively and fairly allocating the resources of a network among a collection of competing users is a major issue.
    [Show full text]
  • CSCI-1680 Transport Layer III Congestion Control Strikes Back
    CSCI-1680 Transport Layer III Congestion Control Strikes Back Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno<, Ion Stoica Last Time • Flow Control • Congestion Control Today • More TCP Fun! • Congestion Control Continued – Quick Review – RTT Estimation • TCP Friendliness – Equation Based Rate Control • TCP on Lossy Links • Congestion Control versus Avoidance – Getting help from the network • Cheating TCP Quick Review • Flow Control: – Receiver sets Advertised Window • Congestion Control – Two states: Slow Start (SS) and Congestion Avoidance (CA) – A window size threshold governs the state transition • Window <= ssthresh: SS • Window > ssthresh: Congestion Avoidance – States differ in how they respond to ACKs • Slow start: +1 w per RTT (Exponential increase) • Congestion Avoidance: +1 MSS per RTT (Additive increase) – On loss event: set ssthresh = w/2, w = 1, slow start AIMD Fair: A = B AI MD Flow Rate B Efficient: A+B = C Flow Rate A States differ in how they respond to acks • Slow start: double w in one RTT – Tere are w/MSS segments (and acks) per RTT – Increase w per RTT à how much to increase per ack? • w / (w/MSS) = MSS • AIMD: Add 1 MSS per RTT – MSS/(w/MSS) = MSS2/w per received ACK Putting it all together cwnd Timeout Timeout AIMD AIMD ssthresh Slow Slow Slow Time Start Start Start Fast Recovery and Fast Retransmit cwnd AI/MD Slow Start Fast retransmit Time TCP Friendliness • Can other protocols co-exist with TCP? – E.g., if you want to write a video streaming app using UDP, how to do congestion control? 10 9 8 RED 1 UDP Flow at 10MBps 7 6 31 TCP Flows 5 Sharing a 10MBps link 4 3 2 Throughput(Mbps) 1 0 1 4 7 10 13 16 19 22 25 28 31 Flow Number TCP Friendliness • Can other protocols co-exist with TCP? – E.g., if you want to write a video streaming app using UDP, how to do congestion control? • Equation-based Congestion Control – Instead of implementing TCP’s CC, estimate the rate at which TCP would send.
    [Show full text]