Preview

Data Transport in wireless network

Powerful Essays
Open Document
Open Document
13423 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Transport in wireless network
Data Transport in Wireless Networks
Akinniyi Ojo, Alireza Ranjbar, Bastian Arjun Shajit, Behzad Savabi, Misikir Gebrehiwot, Robin Babujee Jerome,
Setareh Roshan, Swapnil Pande
Department of Communication Engineering,
Aalto University School of Electrical Engineering,
Espoo, Finland
Abstract— The popularity of wireless networks used to access the Internet is increasing immensely. With huge advancements in the field of wireless technology, the
Internet has slowly moved from a traditional wired network to a wireless network. Data transport layer or L4 of the OSI model plays a significant role in wireless networks. Research shows that wireless link characteristics vary significantly from wired network.
Hence traditional transport layer protocols cannot be used without modifications in wireless networks. One of the main reasons for the degraded performance of transport protocols, like TCP in wireless networks is the interpretation that packet loss is caused by congestion. On the contrary, in wireless networks, packet loss occurs mostly due to higher bit error rates, link failures, packet corruption, user mobility, handoffs etc. Various mechanisms have been proposed to improve transport layer performance in wireless links. This paper discusses about some of the popular enhancements of transport layer protocols to make them suitable for both wireless networks and heterogeneous networks like cellular networks. It also discusses the merits and demerits of each approach thereby trying to find out the characteristics of an ideal data transport layer protocol for the wireless network suited for the modern internet and its users.
Keywords—Congestive & Non Congestive Control in L4,
Proxy Basesd Approaches, Mobile Networks, Cellular
SCTP, Freeze TCP, Enhanced Snoop, Indirect TCP, TCP
Variants for MANETs, Network Coding for Wireless
Networks,.

I. INTRODUCTION
The transport layer provides end to end communication services for



References: router,” in Proceedings of IEEE GLOBECOM, vol. 6, pp. 32373241, 2003. Proceedings of SIGCOMM, pp. 24-35, 1994. Task Force (IETF), Apr. 1999. packet losses,” in Proceedings of IEEE WCNC, pp. 1-6, 2009. retransmission timeouts with TCP”, Proposed Standard, RFC 5682, Internet Engineering Task Force (IETF), 2009. vol.2, pp. 682-686, Dec. 2003. Engineering Task Force (IETF), Feb. 2005. 517-529, 2005. Wireless Networks”, IEEE GLOBECOM Workshops, pp. 20652069, 2010. ICCCN, pp. 285-290, 2003. IEEE ICCCAS, pp. 246-250, 2009. 1537-1545, 2000. Distributed Computing Systems, pp. 136-143, 1995. Proceedings of IEEE INFOCOM, vol. 3, pp. 1754-1764, 2003.

You May Also Find These Documents Helpful

  • Best Essays

    Basios, C. and Solidakis, M. "Current trends and challenges towards wireless Internet", Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on 2005 Page(s):77…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A mother and a wife of a marine, Patricia Kime is a journalist and author that specialize in military, travel and lifestyle. She was a Senior Staff Writer for the Military Times and a Correspondent for the Navy Times. Military Times is an Independent military news and benefits information for troops, spouses, and veterans. Navy Times, on the other hand, provides news, information, and analysis for serving active, reserve and veteran U.S. Navy personnel. She is currently a senior staff writer for the Gannett Government Media. She covers military healthcare and medicine.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    For a while in the past, we refer the wireless technology as cellular phones. But now, the term "wireless" refers to more varied devices & technologies, like smartphones, computers, printers, headphones and even speakers that connects together in different ways. Today’s wireless phones for example, may include data packets like 3G & 4G cellular radio signals, Wi-Fi and even Bluetooth technologies, these technologies have advance in a fast pace that investing in equipment like 4G phone and/or 802.11x wireless routers can offer you & your business a variety of speed improvements for your money. Now I shall describe the characteristics of every type of wireless signal types so we can learn to use every signal type.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the pursuit of opening a great venture with my business partner we are hoping to capture a share this booming industry of high tech wireless devices in the 21st century. Our goal is to open up a store (Wireless World LLC) in the high end area, most probably in Millenia Mall shopping center; for the purpose of meeting our budget demands. In which our product line would include high tech devices such as: phones, wireless eBook readers, high-end notebook and netbook computers, iPads, and other wireless computing devices. Our initial plan is to market our products to the wealthy individuals ranging from the age group of 22-49. For the purpose of their consistency in trying to stay up to date with the latest fashion or trying to make their work more productive with the capabilities of the devices.…

    • 1518 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    With the introduction of wireless edge devices on a network it has an increase in performance and freedom compared to those who use a wired connection. With fewer user on the wireless network than on the wired network, traffic and user are fewer, which makes the network faster comparably. But as we have learned, increases in wireless traffic have problems like physical obstacles, interference from other wireless devices, the distance from an access point, and access rights to other…

    • 1245 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Hello all, when it comes to designing a wireless network there are four steps to follow the first is the correct deployment scenario like Ad hoc or peer-to-peer, infrastructure, point-to-point and point-to-multipoint remote wireless bridge, Ethernet to wireless bridge, and wireless gate. However, infrastructure is the most commonly used with an access point connected to a wired infrastructure.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Also, after completing the lab, you must show your work by copying and pasting a screenshot of the following configurations/verification:…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Data and Communication

    • 1200 Words
    • 5 Pages

    Databases are great when you want to create a model of data such as numbers for figuring out how much you can spend on a new home when you are in the buying marketing, you can use excel to figure out how much you can spend and a monthly payment. You can also use a database to track of shipping components from a trade show that you are in charge of. You can use a database to organize the information about the components and equipment that will make a booth work and run properly at the trade show to.…

    • 1200 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Data Communications

    • 1027 Words
    • 5 Pages

    Figure 1 shows the frequency domain function for a single square pulse. The signal pulse could represent a digital 1 in a communications system. Note that an infinite number of higher frequencies of decreasing magnitudes is needed to represent the single pulse. What implication does that have for a real digital transmission system?…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Answer: Packet losses occur from network congestion and wireless communication. Since the wired Internet does not consider the packet loss due to errors in wireless communication, the congestion control of TCP should be revised. A way…

    • 955 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Andreas Johnsson Research Area Packet Systems Ericsson Research Mats Björkman The Department of Computer Science and Electronics Mälardalen University…

    • 6697 Words
    • 27 Pages
    Good Essays
  • Satisfactory Essays

    Data Transmission over

    • 529 Words
    • 3 Pages

    The main goals for the experiment 3 are first, to get basic knowledge of various factors affecting data throughput in a wireless channel, second, to analyze effect of sporadic losses on TCP throughput and finally, to familiarize with basic performance measurement tools in computer networks. In order for us to accomplish these goals, we conduct two experiments. First, we measure UDP and TCP data throughput using Iperf measurement tool at different locations in Boelter Hall. Second, we measure UDP and TCP data throughput in Lab with and without effect of microwave turned on.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Panko and Panko Business Data Networks and Telecommunications, 8th Edition 1 Chapters 1–4: Introductory material Chapters 5–6: Switched networks Chapter 7: 802.11 standards and operation Chapter 8: 802.11 security, 802.11 management, other local wireless technologies, and cellular technologies Chapter 8 Chapters 9–10: Internetworking Panko and Panko Business Data Networks and Telecommunications, 8th Edition © 2011…

    • 2613 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    Network security management is equivalent to managing a computerised network against security threads, unauthorised access, misuse and modifications. In today’s interconnected society the protection of confidential data, business continuity, availability and integrity became of great importance to any organisation. This document aims to provide you with a better understanding of network security in terms of history, network security policies, prevention systems and detection systems available on the market that may help secure your computer network.…

    • 1334 Words
    • 6 Pages
    Powerful Essays