Preview

improving tcp performance over manet using ABRA approach

Powerful Essays
Open Document
Open Document
2277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
improving tcp performance over manet using ABRA approach
Improving TCP Performance over Mobile Ad
Hoc Networks Using an Adaptive Backoff
Response Approach
Tamer F. Ghanem, Wail S. Elkilani, Mohiy M. Hadhoud
Department of Information Technology, Faculty of Computers and Information, Minufya University tamerfg@hotmail.com, welkilani @gawab.com, mmhadhoud@yahoo.com

Abstract- Mobile Ad Hoc Network (MANET) suffers

decreasing both the congestion window (CWND) and slow start threshold (SSThr). Then it retransmits the first unacknowledged packet and executes back-off by doubling the value of retransmission timer. With multiple successive back-offs, the value of the retransmission timer will be too long. However during the long retransmission period, the route may come back but TCP will not try to retransmit the first unacknowledged packet until the retransmission timer expires. So there is a wasted time that TCP will not use although the route may come back some period ago. The ideal solution for the route failure problem is to freeze its state as soon as the route breaks and resume as soon as a new route is found [1,02,3].
However, this requires instant notification or feedback from the intermediate nodes to all TCP senders and from the network layer to the transport layer. Such a feedback system is difficult to implement and expensive to operate.
In this paper, we explore a new adoption technique of TCP to frequent route failures without relying on feedback from the network. It is based on adapting the TCP back-off after the expiration of the retransmission timer. When the sender receives an acknowledgement (Ack) for a retransmitted packet,
TCP returns to its state before the expiration of its retransmission timer. Moreover, CWND and SSThr will be divided by 2 and 4 respectively. We call it the adaptive back-off response approach (ABRA). Our study has shown that this approach can improve TCP performance over mobile ad-hoc networks.
The rest of this paper is organized as follows: In

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Analysis and Insights of things asked in Ques. 3 3. A) Observations and Explanations:  There were numerous objects downloaded from both nytimes.com and vox.com. But vox.com had a lot of image files to download and thus the total size of objects downloaded from vox.com (around 25 MB) is very large compared to nytimes.com (2 MB).  Considering vox.com:…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    Note that the fact that the on-demand approach of the AODV protocol minimizes routing table information. AODV uses traditional routing tables as it is a reactive routing protocol. To determine whether routing information is up-to-date and to prevent routing loops sequence numbers are used. The maintenance of time-based states is a crucial feature of AODV which suggests that a routing entry that isn't recently used is expired. In case of route breakage, the neighbours are notified. The discovery of the route from source to destination relies on query and reply cycles and intermediate nodes store the route information within the type of route table entries along the…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Among them the first approach was proposed in 1984 by Chandy and Lamport, to build a possible global state of a distributed system [20]. The goal ofthis protocol is to build a consistent distributed snapshot of the distributed system. A distributed snapshot is a collection of process checkpoints (one per process), and a collection of in-flight messages (an ordered list of messages for each point to point channel). The protocol assumes ordered loss-less communication channel; for a given application, messages can be sent or received after or before a process took its checkpoint. A message from process p to process q that is sent by the application after the checkpoint of process p but received before process q checkpointed is said to be an orphan message. Orphan messages must be avoided by the protocol, because they are going to be re-generated by the application, if it were to restart in that snapshot. Similarly, a message from process p to process q that is sent by the application before the checkpoint of process p but received after the checkpoint of process q is said to be missing. That message must belong to the list of messages in channel p to q, or the snapshot is inconsistent. A snapshot that includes no orphan message, and for which all the saved channel messages are missing messages is consistent, since the application can be started from that state and pursue its computation…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are always many factors that will impact the VPN server performance and stability. There is never a one size fits all solutions to any problem. There are many pros and cons that need to be considered. Two performance factors are the load balancing and software configuration. (Jain, S., 2006) While two stability factors are computer programs/equipment and location. (randomwire.com, 2010)…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethr Protocol Analysis

    • 1396 Words
    • 6 Pages

    The decision to initiate ECPR depended on the provider present in the ED upon patient arrival as well as the availability of the ECPR team. Data for the study was collected from multiple registries including pre-hospital and hospital. Follow-up information was obtained via telephone or inquiry form. Neurologic status at three months after cardiac arrest was analyzed via the Glasgow-Pittsburgh Cerebral Performance and Overall Performance Categories scale (CPC).…

    • 1396 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Wannsee protocol was a meeting of the most senior government officials of the Nazi Germany. The meeting was held in the Germany capital city, Berlin in the suburbs of Wannsee on January 20th, 1942.the meeting was convened by the director SS-Reichssicherheitshauptamt. The conference was to ensure the cooperation of administrative officials of the different government departments in making sure that a solution to the Jewish question was found. The Jewish question had raised issues on whether the German Jewish in Europe would be deported to Poland and killed the protocol was aimed to allow the Jews to migrate from Europe to Poland. The Holocaust historians wanted the Jews to vacate Germany without force or else they would be deported and murdered…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Roman Roads

    • 1504 Words
    • 7 Pages

    “Man has always moved along a road. It’s just what the road has looked like that’s changed over time” (Dan McNichol). Some would say that the legacy of the Roman Empire is viewed as the foundation of civilization, having influenced every aspect of modern society, from literature to mathematics. Even today, Roman law and foundation of government forms the basis of several modern democracies. The ancient Empire`s monuments still stand millennia later, awing and inspiring us. Rome 's extraordinary achievements and the unparalleled string of influential people shaped the whole of Europe and even the rest of the world. Philosophers blame the success of the Empire on many different factors, however, arguably the greatest advantage that the Romans had was, in fact, their roads. Also known as Viae, Roman soldiers created comprehensive stone roads that connected the whole continent. These vast highways spanned over 53,000 miles, and stretched all across Europe. The Roman Roads were the empire`s greatest achievements due to their benefits to the military, impact on the economy and trade, and the significant impact it had on the rise of Christianity and the transformation of European civilization.…

    • 1504 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The key area, and one that is easily overlooked, is the return route from the receiver back to the transmitter.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The RIP protocol is a dynamic, distance-vector routing protocol used in local and wide area networks. This is an implementation of single routing metric (hop count) which measures the best route distance between the source and a destination network RIP. RIP is an interior gateway protocol (IGP) which means that it performs routing within a single autonomous system (AS).…

    • 1294 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    ABSTRACT This paper presents a new mechanism for delivering Qual- ity of Service (QoS) guarantees for web-based applications in the face of Distributed Denial of Service (DDoS) attacks. It accomplishes this by scheduling incoming requests based on a valuation/cost analysis to prioritize and service these requests in a more e±cient manner. This research di®ers from previous works by collaborating with the web server 's Operating System (OS) through the use of probes, which provide active feedback of application resource state. Other heuristics that have proven successful in DDoS detection and prevention are also employed in an extensible framework to facilitate site-speci¯c customization.…

    • 1460 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Before we go to the first recipe, we need to ask ourselves for the key question of first chapter: Why…

    • 1485 Words
    • 6 Pages
    Good Essays
  • Good Essays

    What options are at our disposal? How do we fill the gaps to get a clearer picture?…

    • 853 Words
    • 4 Pages
    Good Essays