International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
TCP for Wireless Environments
Mr. Ranjeet V. Bidwe, Mr. Mahesh A. Kandekar
Dept of Computer engineering, PICT, Pune. Maharashtra, India.
Dept of Computer engineering, AISSMS COE, Pune. Maharashtra, India.
Abstract— Computer networks have experienced an explosive
growth over the past few years, which has lead to some severe
congestion problems. Reliable protocols like TCP works well
in wired networks where loss occurs mostly because of
congestion. However, in wireless networks, loss occurs
because of bit rates and handoffs too. TCP responds all losses
by congestion control and avoidance algorithms, which
results in degradation of TCP’s End-To-End performance in
wireless networks. This paper discusses different issues and
problems regarding use of TCP in wireless networks and
provides comprehensive survey of various schemes to improve
performance of TCP in Wireless Networks.
Keywords—TCP, Mobile-IP, Wireless networks, Protocol
design.
I. INTRODUCTION
Due to rapid advances in the area of wireless communications
and the popularity of the Internet, the provision of packet data
services for applications like e-mail, web browsing, mobile
computing etc. over wireless is gaining importance. The
TCP/IP protocol suites have number of layers, of which
transport layer is used widely for mobility. It uses protocols
like TCP and UDP for transferring data.
While coming towards wireless environment, we must
understand what wireless environment is first. Wireless
environment can be broadly distinguished in three types:
Cellular networks, Ad-hoc networks and Satellite networks. In
Cellular Networks a mobile host is connected to the fixed
network with the help of the Base Station. This is the most
common form of Wireless Network currently in use. Mobile
devices like cell phones, laptops use this network. Most of the
proposed solutions to TCP use this model. All service
providers are on the fixed network and hence we have to
address the problem of wireless networks only at one end
point. Ad – Hoc Networks are formed by mobile hosts which
are connected to each other within a radio distance. This kind
of a model is not well deployed and very few solutions have
been proposed to this model. Satellite Networks are those
where a satellite link is in between the sender and the receiver.
These have very high BERs (Bit Error Rates) and high latency
because the Satellite are at a great distance from the surface.
Now going towards our main concept, Transmission Control
Protocol (TCP) [1] is one of the important standards in the
internet world and also a very vital element in internet
www.ijaems.com
protocol suite. It provides a connection oriented service with
reliable data transfer over the unreliable underlying protocols.
It uses sequence numbering and timers to ensure reliable
transfer of packets. TCP's flow control increases the data
sending rate until there are signs of congestion in the network.
The basis of TCP congestion control lies in the following
algorithms: slow start, congestion, avoidance, fast retransmit
and fast recovery [2].
In the following we first outline the different issues of TCP in
wireless networks. Then the main problem regarding TCP.
Then we summarize some proposed solutions with their
strengths and weaknesses.
II. ISSUES IN WIRELESS ENVIRONMENTS
Wired services are relatively reliable compared to wireless
networks. So if any packet get lost then it is due to congestion
only, so that they can carried out a congestion control scheme
to get lost packets. But in wireless networks some serious
issues are found, those are:
First issue is Bit Error Rate (BER). Wireless host uses radio
transmission
or
infrared
wave
transmission
for
communication. Experimentally found that, The BER of
wireless links is typically higher than that of wired networks.
Also BER also varies by a large amount when wireless
environment changes quickly.
Second issue is Bandwidth. Wireless links having very less
bandwidth as compared to the wired links. Wireless links
offers bandwidth of 2MBPS, while wired links offers 10-100
MBPS. As wireless links offers very low bandwidth, Optimum
use of available bandwidth is a major issue in heterogeneous
networks that has to be taken care of.
Third issue is Mobility. As world is moving towards wireless
environment, large addition of mobile devices are done. So it
introduces huge amount of indeterminate mobility in rather a
stationary network. This tends to introduce some amount of
instability in existing network topology. When wireless host is
moving in a particular network, its base station is sending data
to it. But when it moves to another station during handoff, the
data sent by old base station is lost as it moved out of range.
Similarly data it is sending to old base station is lost.
Next issue is Round Trip Time (RTT). The wireless media
exhibits longer latencies than wired media in the case of
satellite networks. It is almost the same as in wired networks
since Radio waves travel at the speed of light which is same as
Page | 1905
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
the transmission speeds in wired media. Since the bandwidth
is lower in wireless networks a packet takes longer to get
transmitted in wireless networks. This affects overall
throughput and increases interactive delays.
Last issue is Power consumption. Normally mobile hosts have
limited power and processing speed compared to base stations,
which forms inefficiency in network. Solutions that Take
power consumption into account have a clear-cut advantage
over the otherwise designed solutions.
TCP works reliably well on wired networks and fixed
topologies, so it operates on assumption that packet lost is due
to congestion. But this assumption is not true in case of
wireless networks. There are many reasons of packet loss like
disconnection, corruption by underlying physical medium,
handoffs, but TCP assumes it as due to congestion in network.
So it cannot find actual reason behind loss of data. But this
wrong assumption degrades the TCP performance. For
example, let data is lost due to temporary or short
disconnection, but TCP assumes it is due to congestion and
decrease the window size to minimum size, and starting the
slow start mechanism [2] which means that sender
unnecessarily holds back, slowly growing the transmission
rate. Even though receiver recovers quickly from temporary or
short disconnection. This is illustrated in following Fig.1
where it is seen that the network capacity can remain
unutilized for a while even after a reconnection.
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
Snoop [3],[4]protocol is classified as a TCP Aware link-level
protocol. In this protocol a network layer software is updated
at Base station (BS) by adding module called snoop. Snoop
module checks every packet travelling on the connection in
both directions. It maintains cache of TCP packets which are
sent by fixed host (FH) to mobile host (MH) but not
acknowledged by MH. When packet is sent from FH, snoop
adds it to cache and forwards it according to its routing
information. It also checks acknowledgment coming from
MH, if any packet gets lost or snoop got any duplicate
acknowledgment about packet, and then it resends that packet
if it is cached. It maintains its own timers for retransmission of
buffered packets, implements selective transmission etc. by
this way snoop hides loss of packets from FH, by not
propagating duplicate acknowledgments, and thereby it
prevents further invocations of congestion control mechanism
[5].
Main disadvantage of this scheme is that, it relies on
intermediaries i.e.. BS, so it does not satisfies true end to end
semantic proposed by TCP. This protocol does not completely
shield the sender from wireless losses as the sender may
timeout due to repeated losses or bit errors caused by the
wireless link.
An extension proposed to random delay detection (RED) is
Explicit Congestion Notification (ECN) [5]. RED is an active
queue management mechanism in routers, it detects
congestion before the queue overflows and provides an
indication of this congestion to the end nodes. A RED router
signals incipient congestion to TCP by dropping packets
before the queue runs out of buffer space. RED router operates
by maintaining two levels of thresholds minimum ( min th )
Fig.1: TCP SLOW START [10]
and maximum ( max th ). If the average queue size lies
between the min th and max th , then It drops packets. ECN
The fundamental problem is the underestimation of bandwidth
by the network endpoints which results in reduced application
layer performance, reductions in throughput and unacceptable
delays. When this happens the applications don’t get their fair
share of the bottleneck link’s bandwidth.
Another problem may happen during handoff, there are three
major impacts on TCP during the handoff scenario. The
packets will experience a higher delay during handoff due to
packet re-routing. Secondly the packets already in transit for
the old access point are generally dropped during the handoffs.
Lastly TCP has to deal with massive packet re-ordering after a
handoff. Same issues are discussed in various papers. [21]
III. DIFFERENT APPROACHES IN WIRELESS
NETWORKS
In this section, we are discussing some approaches proposed
by taking problems under consideration to improve the
performance of TCP over wireless environment.
www.ijaems.com
is extension to RED, which marks a packet instead of
dropping in when the average queue size lies between min th
and max th . Upon receipt of congestion marked packet, the
TCP receiver informs the sender (by subsequent
acknowledgement) about happening congestion, which starts
the congestion avoidance algorithm at the sender. ECN
requires support from both the router as well as the end hosts,
there is need of modification at the end host of TCP stack. If
the ECN support is provided then the packets are referred as
ECN capable packets. RED droops packets that are not ECN
capable.
Explicit Bad State Notification (ESBN) [6] proposes a
mechanism to update the TCP timer at the source to prevent
source from decreasing its congestion window, if there is
congestion occurring. EBSN’s are sent to the source, when
base station is trying to send a packet over wireless link and
fails to send. EBSN would cause the previous timeouts to be
Page | 1906
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
cancelled and new timeouts put in place, based on existing
estimate of round trip time and variance. Thus, the new
timeout value is identical to the previous one. The EBSN
approach does not interfere with actual round trip time or
variance estimates and at the same time prevents unnecessary
timeouts from occurring. This prevents timeouts for packets
that had already been put on the network before the wireless
link encountered the bad state.
Explicit Loss Notification (ELN) [7] adds an ELN option to
TCP acknowledgment. When a packet is dropped on the
wireless networks, future cumulative acknowledgements
corresponding to the lost packet are marked to identify that a
non-congestion related loss has occurred. Upon receiving this
information along with duplicate acknowledgements, then
sender may retransmit data instead of congestion control
algorithms.
Holland and Vaidya proposed a feedback based technique
called TCP-ELFN [8][9]. ELFN stands for Explicit Link
Failure Notification. The goal is to inform TCP sender of link
and route failures so it can avoid responding to the failures as
if congestion occurs. ELFN is based on DSR[10] routing
protocol. To implement ELFN message, the route failure
message of DSR is modify to carry payload, it is similar to
“host unreachable” ICMP message. Upon receiving ELFN
message, TCP sender disables congestion control mechanism
and enters in stand-by mode, it sends a small packet to probe
the network to see if route has been established. If new route
has been established, then it leaves stand-by mode, restores its
retransmission timer (RTO) and continues as normal. Though
explicit route failure notification, TCP-EFLN allows sender to
instantly enter in stand-by mode to avoid unnecessary
transmission and congestion control, which wastes precious
MH battery power and scarce bandwidth. With explicit route
reestablishment notification from intermediate nodes or active
route probing initiated at the sender, these two schemes enable
the sender to resume fast transmission as soon as possible. But
neither of these two considers the effects of congestion, outof-order packets, or bit errors, which are quite common in
wireless ad hoc networks.
Next approach I-TCP [11] splits connection between FH and
MH in two parts. First part is FH to BS and from BS to MH.
Firstly FH sends data to BS, BS acknowledged that data, then
it is responsibility of BS to forward that data to MH. This
indirection helps shield the wired network from the
uncertainties of the wireless network and the TCP/IP at the
fixed host side need not be changed. On the link between BS
and MH, it is not necessary to use TCP. One can use any other
protocol optimized for wireless links.
Using indirection in this method tends to number of benefits.
It separates flow control and congestion control functionality
on the wireless link from that on the fixed network. Also
Indirection allows the BS to manage much of the
www.ijaems.com
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
communication overhead for a mobile host. I-TCP also
optimizes the handoff by shrinking the receive window size at
the MSR which forces the FH to stop sending data when the
MSR buffers are full. Drawback to this protocol is again it is
not following true end-to-end semantics of TCP. In case of
transferring data, copying data from the incoming connection
from the FH to the outgoing connection to the MH is also
needed. In case of frequent handoffs, the overhead related to
the connection state transfer between the base stations may be
large and add delays. And also the base stations have to be
complex and with large buffers in case of heavy traffic.
Working of I-TCP is case of handoff to transfer connection is
shown in Fig.2
Next approach is MTCP [11]. MTCP is similar to I-TCP and
also splits a TCP connection into two: one from MH to BS and
the other from BS to FH. The MH to BS connection passes
through a
Fig.2: I-TCP Connection Transfer during Handoff [11]
Session layer protocol which can employ a selective repeat
protocol (SRP) over the wireless link.Most of the schemes
proposed for optimizing Transport Layer (TCP) over wireless
networks needs intermediaries, due to which the end to end
semantics of TCP are not maintained and problems like
degradation in throughput are resulting. So next proposed
protocol i.e. Freeze-TCP [13] satisfies true end to end
semantics of TCP, which does not require any intermediaries;
neither change in TCP code is required on the sender side or
the intermediate routers. Change is limited to the mobile client
side, and hence is interoperable with the existing networks.
In Freeze-TCP, receiver identifies an impending disconnection
because of potential handoff, fading signal strength, or any
other problem arising due to wireless media and notifies the
sender of any impending disconnection by advertising a zero
window size (ZWA- zero window advertisement) and prevents
Page | 1907
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
the sender from entering into congestion avoidance phase.
Upon getting the advertised window as zero, the sender enters
the persist mode and freezes all the timers related to the
session. And periodically sends the ZWP (Zero Window
Probes) until the receiver’s window opens up. Since the ZWPs
are exponentially backed off, there is a possibility of having a
long idle time after the reestablishment of connection. To
avoid this, the receiver employs “TR-ACKs” (Triplicate
Reconnection ACKs). As soon as the connection is
reestablished, the receiver sends 3 copies of the ACK for the
last data segment successfully received prior to disconnection
to enable the fast transmit.
Fig.3: Increased throughput due to Freeze-TCP [13]
But main dis-advantage of Freeze-TCP is that, Freeze-TCP is
only useful, if a disconnection occurs while the data is being
transferred. It is not useful, in case of a disconnection when no
data is being transferred between sender and receiver.
Another approach where we preserve end to end semantics is
WTCP [14]. It was developed for Wireless Wide Area
Networks (WWAN) where the TCP algorithms failed because
it falsely assumes packet losses are due to congestion. This
protocol distinguishes congestion losses and random losses. It
uses packet departure time and packet arrival time for that.
WTCP shapes traffic since it uses rate based transmission
control, it never allows burst of packet transmission. This is
useful when different connections have different Round Trip
Times (RTT). The basic idea behind this protocol is that TCP
should not half its transmission rate for just a packet loss
which happens more frequently in wireless Networks. This is
more like an algorithm where the receiver takes the
responsibility of receiving all packets. The sender does not
decide which packets have to be transmitted because some of
the ACKs have failed but they probe the receiver to find out if
a packet has to be resent. WTCP uses the ratio of the interpacket separation at the receiver and the inter-packet
separation at the sender as a metric for rate control rather than
using packet losses and retransmit timeouts. WTCP reuses the
standard TCP mechanism for flow control and connection
management. It uses inter packet delay as a metric for
congestion control, using this it performs the rate adaptation
computation at receivers end. Also it provides fairly accurate
measure of the available channel rate for low bandwidth
channels.
However just accepting small losses as random may cause it to
disregard incipient congestion. WTCP thus maintains a history
of losses and reduces transmission rates more aggressively if
www.ijaems.com
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
they happened quickly. Since it does not use ACKs as a metric
even Startup transmission is measured by inter-packet delay.
Thus at startup WTCP sends a packet pair and uses that to
adjust to the network behavior.
Next proposed approach is TCP Santa Cruz [15]. This
protocol also uses same approach as WTCP. TCP Santa Cruz
monitors the queue developing over a bottleneck link and this
determines whether congestion is increasing in the network.
Using this it identifies the type of loss, may be congestion or
random and it responds it appropriately. It is able to find out
direction of congestion with initial stage of congestion.
Congestion is determined by calculating the relative delay that
one packet experiences with respect to another as it traverses
the network.
It is observed that losses due to congestion are followed by an
increase in the network bottleneck queue. A wireless loss on
the other hand, can be identified as a random loss that is not
followed by a build-up in the bottleneck queue. TCP-SC
monitors changes in the bottleneck queue over an interval
equal to the amount of time it takes to transmit one window of
data and receive acknowledgements corresponding to all the
packets transmitted in the window. When these losses are
discovered, then we expect the protocol to simply retransmit
most losses without affecting the transmission window. This
can be implemented as a TCP option by utilizing the extra 40
bytes available in the options field of the TCP header.
Next approach M-TCP [16] works well in frequent
disconnection and low bit rate wireless links. The spurious
time out as shown in the Fig.4 below proves to be very
harmful to overall throughput than losses due to but errors or
small congestion windows.
Fig.4: Serial timeouts at TCP sender [12]
In M-TCP, every TCP connection is split in two parts at the
Supervisory Host (SH) . TCP connection from fixed host (FH)
to the SH uses the standard, unmodified version of TCP. And
connection between SH and mobile host (MH) uses the
modified version of TCP. Wireless bandwidth is important
resource here, and it should be keenly used. In heterogeneous
systems, there is variation in available bandwidth. But SH
takes care of it.
Firstly FH sends segment, then it is taken by SH. Then SH
forwards that segment to MH. Then MH gives
acknowledgment for that segment.SH, upon getting acks,
Page | 1908
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
acknowledges back to FH. Unlike other split connection
techniques, it saves the ack of the last byte, in order to prevent
loss of outstanding packets. Now in case, if the MH is
disconnected from nowhere, then the SH stops getting the acks
and assumes that MH has been temporarily disconnected and
sends the ack of the last byte that it saved previously. This ack
will contain the advertised window of the MH as “zero”, then
sender enters the persist mode and freezes all the timers
related to the session, and starts sending the exponentially
backed off persist packets to the SH. The SH responds with
the zero window size at the receiver, to each persist packet,
until it receives some nonzero window size indication from the
receiver. When it receives, then SH immediately replies to the
persist packet as the appropriate window size and resumes all
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
its freezed timers. Thus the sender can resume transmitting at
full-speed. The FH again starts transmitting from the next byte
that is unacknowledged.
The state transition diagram for ATCP at the sender is shown
in Fig. 6. Upon receiving a “Destination Unreachable”
message, the sender enters the persist state. The TCP at the
sender is frozen and no packets are sent until a new route is
found, so the sender does not invoke congestion control. Upon
receipt of an ECN, congestion control is invoked without
waiting for a timeout event. If a packet loss happens and the
ECN flag is not set, ATCP assumes the loss is due to bit errors
and simply retransmits the lost packet. In case of Multi-path
routing, upon receipt of duplicate ACKs,
Fig.5 Architecture for M-TCP[12]
TCP sender does not invoke congestion control, because multi-path routing shuffles the order in which segments are received.
So ATCP works well when the multi-path routing is applied.
Fig.6: State transition diagram of ATCP at sender[17]
Next approach is TCP Westwood[18]. It is a sender-side
modification of the TCP congestion window algorithm that
improves upon the performance of TCP Reno in wired as well
as wireless networks. General idea used here is to use
www.ijaems.com
bandwidth estimate (BWE) to set the congestion window
(cwin) and slow start threshold (ssthresh) after congestion
episode. The main difference between TCP Reno and TCP
Westwood is, TCP Reno halves the congestion window after
Page | 1909
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
three acknowledgments where as TCP Westwood attempts to
select a slow start threshold and a congestion window which
are consistent with the effective bandwidth used at the time
congestion is experience.
The source performs end-to-end estimate of the bandwidth
available along a TCP connection by measuring and averaging
the rate of returning ACKs. Whenever a sender perceives a
packet loss (i.e. a timeout occurs or 3 duplicate ACKs are
received), the sender uses the bandwidth estimate to properly
set the congestion window (cwin) and the low start threshold
(ssthresh). This way TCP Westwood avoids overly
conservative reduction of cwin and ssthresh; and thus it
ensures faster recovery.
TCP Westwood satisfies true end to end semantic of TCP.
Also it works well in mixed wired and wireless networks.
Better throughput, goodput and delay performance, fairness as
well as friendliness when coexisting with TCP Reno were
observed in experimental studies. TCP Westwood does not
require inspection and/or interception of TCP packets at
intermediate (proxy) nodes and complies with the end-to-end
TCP design principles. Only disadvantage is that it performs
poorly when random packet loss rate exceeds a few percent.
TCP-F[19] is specially designed for Ad-hoc networks. All
previously proposed schemes depend on the base station and
so cannot be applied to the multihop wireless networks, since
there are no base stations in such a network. At a time of large
data transfer from one MH to another MH through number of
MH’s, if an intermediate MH detects a route failure, due to
which it cannot send the data any further, then it sends a route
failure notification (RFN) to the source. Each intermediate
router that receives the RFN, invalidates all packets traveling
through that failed route and prevents more incoming packets.
The intermediate node than tries to find an alternate route for
the destination. If any alternate path exists, then packets are
routed through that path, otherwise RFN is forwarded towards
the source. Upon receiving RFN, source goes into the snooze
state and remains until it is notified of any updates. That time
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
source stops all packet sending, Marks all existing timers as
invalid, Freezes the send window of packets, Freezes value of
other state variables such as retransmission timer value and
window size and
Starts a route failure timer which
corresponds to a worst case route reestablishment time. If any
intermediate router knows about a new route to the
destination, then it sends a route reestablishment notification
(RRN) packet to the source, whose identity was previously
stored. As soon as the source receives the RRN, it comes to an
active state from the snooze state. Since almost all packets in
transit would have been affected by the failure, the source
flushes out all unacked packets in its current window.
Communication would then resume at the same rate prior to
the route failure.
The TCP-Bus algorithm [20] is very similar to the TCP-F
algorithm. The basic idea is to use buffering capacity of
mobile nodes. It uses a source-initiated on-demand routing
protocol for the underlying layer. It uses two control messages
(ERDN and ERSN) related to route maintenance to notify the
source of route failures and route re-establishments. These
indicators are used to distinguish between network congestion
and route failure as a result of node-movement.
ERDN (Explicit Route Disconnection Notification) message is
generated at an intermediate node upon detection of a route
disconnection. When the sender receives the ERDN message it
stops transmitting. Similarly after discovering a new path from
the node that initiated the ERDN message the sender is
informed by using a ERSN message (Explicit Route
Successful Notification). On receiving the ERSN message the
source starts retransmission. However the retransmission of
lost packets due to congestion relies on timeout mechanism.
Since it increases the timeout to avoid retransmission during a
disconnection it must also request the lost packets as they will
be retransmitted only late. The packets from the node that
initiated the ERDN message, to the point where the node
previously existed are flushed after receiving the ERSN
message.
Fig.7: The TCP-F State Machine [19]
www.ijaems.com
Page | 1910
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
Hence to avoid further packet flows to the mobile node all
nodes that received the ERDN message for a particular
destination must stop forwarding those packets. Also to ensure
that an ERSN message is successfully delivered to the source,
all intermediate nodes must time out and retransmit the ERSN
message if they do not hear the upstream nodes forwarding the
ERSN message.
TCP-P [22] stands for TCP-Performance. Talking about basic
TCP functionalities, then yes, TCP-P satisfies true End to-End
semantics of TCP since no intermediaries involved. It provides
reliable, connection oriented service for mobile nodes. TCP-P
uses the standard TCP mechanisms for flow control and
connection management. Mainly TCP-P tries to solve three
important issues of TCP that are Congestion. So, TCP-P
Disconnection and Random Packet Losses mainly having
three functionalities. Working with these three functionalities
TCP-P is able to detect packet losses due to congestion in
network, disconnection in network links and random lost
packets. TCP-P is more successful than other TCP versions
since it is having more Packet Delivery Ratio as well as able
to solve more issues [23].
First function of TCP-P deals with issues like mobility and
handoff, Disconnections. It is a receiver modifying stage, here
receiver senses wireless medium continuously for detecting
fading signals which in turn detects happening disconnection.
In certain cases, it might even be able to predict a temporary
disconnection (signal strength is fading for instance). In such a
case, it advertises a zero window size, then it forces sender
into the ZWP mode and prevent it from dropping its
congestion window. When the receiver senses an impending
disconnection, first it advertises its window size as zero and a
zero window acknowledgement (called as ZWA) to sender
prior to disconnection to inform sender about disconnection.
This period is called as “warning period” (provided that
warning period should be long enough than time required for
one ZWA to get across sender). If warning period is any
longer, then sender is forced into ZWP mode. If warning
period is small then receiver will not have enough time to
inform sender, and sender have to drop its congestion window.
When connection is established again then receiver sends
three ACKs for last received packet and sender starts sending
data again. To check connection is established or not sender
sends zero window probes to receiver after an interval of time.
When data sending is going on at the same time, sender is
continuously computing the connection Bandwidth Estimate
(BWE) which is equal to the rate at which data is delivered to
the TCP receiver. The BWE value is computed by performing
end-to-end estimate of the bandwidth available along with the
TCP connection by measuring and averaging the rate of
returning ACKs. This estimated BWE value is used to set
congestion window (cwin) and slow start threshold (ssthresh)
before congestion episode. Whenever sender perceives a
www.ijaems.com
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
packet loss (i.e. a timeout occurs or 3 duplicate ACKs are
received), the sender uses the BWE to properly set the
congestion window (cwin) and the slow start threshold
(ssthresh) and sends data accordingly. This mechanism very
little bit different from slow start mechanism. In slow start
mechanism, packet sending rate is increased exponentially i.e.
if 2 packets delivered successfully, then it will try for 4
packets, then try for 8 and so on. But in this approach packet
sending rate is not increased exponentially i.e. if 2 packets
delivered successfully, but it is not able to delivered 4 packets,
can only delivered 3 packets then it will try for sending 3
packets only, not 4 packets. It will prevent system from loss of
packets.
Initially TCP was designed with the notion in mind that wired
networks are generally reliable and any segment loss in a
transmission is due to congestion in the network rather than an
unreliable medium (The assumptions is that the packet loss
caused by damage is much less than 1%) . This notion doesn’t
hold in wireless parts of the network. Wireless links are highly
unreliable and they lose segments all the time due to a number
of factors. According to [24], noise in network is main reason
behind randomly lost packets. Up to 30% of messages can be
lost because of noise. For randomly lost packets TCP-P also
provides the solution. TCP-P just modifies the header part of
the packet. When packet is lost, i.e. its lifetime exceeds TTL
value of packet, and then lost packet itself sends loss
notification message to sender. To gain this functionality we
can modify TTL field in TCP header to send a ICMP message
to sender. This message can use value from sender IP address
from header part of TCP to send ICMP message. By this way
sender can detect lost packet and resends same packet again to
receiver.
IV. DISSCUSION
By studying above approaches, we observe that an ideal
solution should have following characteristics.
It should maintain true end to end approach without involving
any intermediaries. When we are coming towards network
security, encryption is adopted widely. whereby the whole IP
payload is encrypted, and the intermediate may not know
about the transport layer protocol used. In briefly, it should be
able to handle encryption.
Any scheme proposed must be interoperable with the existing
network infrastructure. There should be no change required in
the sender or the intermediate routers.
If at all there is any intermediate node involved in any scheme,
care should be taken of its 100% efficiency, since the
processing overheads involved with those nodes may add to
the original problem. The processing overheads may include
extra buffer space or transfer of complete state information of
a mobile node from one base station to another.
In ideal solution code at the sender should be affected. Means
Page | 1911
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com)
we should have a static code at sender.
Also the solution should be robust against high BER. It should
be robust against frequent disconnections. And its
performance should not degrade with long disconnections.
V. CONCLUSION
In this paper, we present a comprehensive survey of the
various schemes proposed in the literature that try to solve this
problem, classified them according to their characteristics and
mentioned their limitations.
We conclude that different schemes have their own
advantages and disadvantages. But it seems that a combination
of pure link level and end to end scheme is a good
combination to alleviate the problem. Further research is
needed to investigate other approaches to help TCP
discriminate between host mobility and network congestion.
Although most schemes would yield improvement in
throughput, the key factor will be the ease with which the
modification can be incorporated in the existing infrastructure.
REFERENCES
[1] W. Richards Stevens, “TCP/IP illustrated, Volume I; The
protocols.” AWL 1994.
[2] V, Jacobson, “congestion avoidance & control”, ACM
proceedings. SIGCOMM 88.
[3] H. Balakrishan, V. N. Padmanabhan and R. Katz
“Improving reliable transport and handoff performance in
cellular wireless networks.”, wireless networks, vol.1 ,
no.4 Dec 1995.
[4] H.Balakrishan, V. N. Padmanabhan and R. Katz,”A
comparison of mechanisms for improving TCP
performance over wireless links”, in proceedings of ACM
SIGCOMM’96, palo alto, CA, Aug 1996,pp 256-269.
[5] Sarama Vangala, Miguel A. Labrodor,” Performance of
TCP over wireless Network with snoop protocol”
[6] Bikram Bakshi and N.H. Vaidya,”Improving performance
of TCP/IP over wireless networks”.
[7] R. Ramani, A. Karandikar, “Explicit congestion
notification in TC over wireless networks”.
[8] G. Holland and N. H. Vaidya, “Analysis of TCP
Performance over Mobile Ad Hoc Networks,”.
[9] J. P. Monks, P. Sinha and V. Bharghavan, "Limitations of
TCP-ELFN for Ad Hoc Networks,".
[10] D. B. Johnson, D A. Maltz, Y. Hu, “The dynamic souce
routing protocol for mobile ad hoc networks,”.
[11] Ajay bakre & B. R. Badrinath, “I-TCP: indirect TCP for
mobile hosts”.
[12] Raj Yavatkar & Namrata Bhagvat,”Improving end-to-end
performance of TCP over mobile envioronment”.
[13] Tom goff, James Moronski, D. S. Phatak, Vipul Gupta,
“Freeze-TCP: A true end to end TCP enhancement
mechanisms for mobile environment”
www.ijaems.com
[Vol-2, Issue-11, Nov- 2016]
ISSN : 2454-1311
[14] P. Sinha,N. Venkitaraman,R Sivakumaran & V.
Bharghavan,”WTCP: realible transport protocol for wide
area network”.
[15] C. Parsa & J.J. Garcia-Luna-Aceves, “Improving TCP
congestion control over internets with heterogeneous
transmission media”.
[16] K. Brown & S. Singh, “M-TCP: TCP for mobile cellular
networks”.
[17] J. Liu, S. Singh, “ATCP: TCP for Mobile Ad Hoc
Networks”.
[18] Severio
Moscola,
Claudio
casetti,
Mario
Gerla,M.Y.Sanadidi
&
Ren
Wang,
“TCP
WESTWOOD:Bandwidth estimation for enhanced
transport over wireless links”.
[19] K. Chandran, R. Prakash, “Feedback based scheme for
improving TCP performance in Ad-hoc networks”.
[20] Dongkyun Kim, C-K Toh & Yanghee Choi “TCP-BusImproving TCP performance in wireless Ad-Hoc
Networks”.
[21] Ranjeet V. Bidwe, “Different Issues and survey of
proposed solutions in TCP over Wireless Environment.”,
International Journal of Future Computer and
Communication, 2012.
[22] Ranjeet V. Bidwe, Amar R. Buchade, “TCP-P: A new
approach in wireless environment to solve issues
currently TCP facing” Second International Conference
on Computational Intelligence and information
Technology – CIIT 2012, Elsevier, 2012.
[23] Ranjeet V. Bidwe, Amar R. Buchade, “Improving
Performance of TCP in Wireless Environment using TCPP”, International Journal on Communication, Vol. 4, No.
1, 2013.
[24] Shamimul Qamar, Kumar Manoj, “Impact of Random
Loss on TCP Performance in Mobile Ad-hoc Networks
(IEEE 802.11): A Simulation-Based Analysis”, Arxiv
preprint arXiv9:1002.2403,arxiv.org, 2010.
Page | 1912