• Title/Summary/Keyword: Lossy Links

Search Result 18, Processing Time 0.022 seconds

A Framework of Rate Control and Power Allocation in Multipath Lossy Wireless Networks

  • Radwan, Amr;Kim, Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1404-1414
    • /
    • 2016
  • Cross-layer design is a concept, which captures the dependencies and interactions and enables information sharing among layers in order to improve the network performance and security. There are two key challenges in wireless networks, lossy features of links and power assumption of network nodes. Cross-layer design of congestion control and power allocation in wireless lossy networks has been studied in the existing literature; however, there has been no contribution proposed in the literature that exploits the path diversity. In this paper, we are motivated to develop a cross-layer design of congestion control and power allocation, which takes into account lossy features of wireless links and transmission powers of network nodes and can be implemented in a distributed manner. Numerical simulation is conducted to illustrate the performance of our proposed algorithm and the comparison with current alternative approaches.

Robust TCP Congestion Algorithm over Lossy Wireless Links (무선링크 에러에 강인한 TCP 혼잡 알고리즘)

  • 박홍성;전선국;윤건
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.427-434
    • /
    • 2003
  • This paper suggests an improved TCP congestion algorithm, which is more robust to lossy wireless environment than other algorithms such as TCP-Reno. The suggested algorithm decides on the size of a congestion window depending on both PER (Packet Error Rate) and its state, which is one of fast recovery state and slow start state. Some simulations are given to validate the suggested algorithm and the algorithm is compared with other TCP congestion algorithm from the point of view of performance measures such as a congestion window and throughput. The suggested algorithm has better throughput than other algorithm over wireless links with high PER and similar throughput to others over wireless links with low BER.

Opportunistic Routing for Bandwidth-Sensitive Traffic in Wireless Networks with Lossy Links

  • Zhao, Peng;Yang, Xinyu
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.806-817
    • /
    • 2016
  • Opportunistic routing (OR) has been proposed as a viable approach to improve the performance of wireless multihop networks with lossy links. However, the exponential growth of the bandwidth-sensitive mobile traffic (e.g., mobile video streaming and online gaming) poses a great challenge to the performance of OR in term of bandwidth guarantee. To solve this problem, a novel mechanism is proposed to opportunistically forwarding data packets and provide bandwidth guarantee for the bandwidth-sensitive traffic. The proposal exploits the broadcast characteristic of wireless transmission and reduces the negative effect of wireless lossy links. First, the expected available bandwidth (EAB) and the expected transmission cost (ETC) under OR are estimated based on the local available bandwidth, link delivery probability, forwarding candidates, and prioritization policy. Then, the policies for determining and prioritizing the forwarding candidates is devised by considering the bandwidth and transmission cost. Finally, bandwidth-aware routing algorithm is proposed to opportunistically delivery data packets; meanwhile, admission control is applied to admit or reject traffic flows for bandwidth guarantee. Extensive simulation results show that our proposal consistently outperforms other existing opportunistic routing schemes in providing performance guarantee.

An Analysis of Contention-Based Forwarding in Lossy Wireless Links (손실이 있는 무선 링크에서의 경쟁기반 전달방식 분석)

  • Na, Jong-Keun;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.56-66
    • /
    • 2008
  • Contention-based forwarding in wireless ad-hoc networks reduces transmission failure rate by selecting one receiver with good channel among multiple receivers. However, contention-based forwarding may increase transmission latency due to the collision problem caused by the simultaneous transmission among multiple receivers. In this paper, we present an analytic model that reflects the delay and collision rate of contention-based forwarding in lossy wireless links. Through the analytic model, we calculate the expected delay and progress in one-hop transmission under given wireless link model and delay model. Based on the analytic results, we observe that delay model should be adapted to wireless link model for optimal performance in contention-based forwarding.

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

An Extension to TCP HACK for Improving the Performance of TCP in Lossy Environments

  • Niu, Ying-Xia;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.217-219
    • /
    • 2002
  • TCP has been designed and tuned as a reliable transfer protocol far wired links. However, it incurs end-to-end performance degradation in wireless environments where packet loss is very high. TCP HACK(Header Checksum Option) is a novel mechanism proposed to improve original TCP in lossy link. It presents an extension to TCP that enables TCP to distinguish packet corruption from congestion in losssy environments. TCP HACK performs well when the sender receives the special ACKs correctly, hut if the ACKs are also lost much, the efficient of TCP HACK will net be prominent. In this paper we present an extension to TCP HACK, which can perform well even when the ACKs are much corrupted.

  • PDF

Globally Optimal Solutions for Cross-Layer Design in Fast-Fading Lossy Delay-Constrained MANETs

  • Pham, Quoc-Viet;Kim, Hoon;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.168-177
    • /
    • 2015
  • To increase the overall utility and decrease the link delay and power consumption, a joint optimal cross-layer design of congestion control at the transport layer, link delay at the data link layer and power allocation at the physical layer for mobile ad hoc networks is considered in this paper. As opposed to previous work, the rate outage probability in this work is based on exactly closed-form; therefore, the proposed method can guarantee the globally optimal solutions to the underlying problem. The non-convex formulated problem is transformed into a convex one, which is solved by exploiting the duality technique. Finally, simulation results verify that our proposal achieves considerable benefits over the existing method.

Analytic Throughput Model for Network Coded TCP in Wireless Mesh Networks

  • Zhang, Sanfeng;Lan, Xiang;Li, Shuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3110-3125
    • /
    • 2014
  • Network coding improves TCP's performance in lossy wireless networks. However, the complex congestion window evolution of network coded TCP (TCP-NC) makes the analysis of end-to-end throughput challenging. This paper analyzes the evolutionary process of TCP-NC against lossy links. An analytic model is established by applying a two-dimensional Markov chain. With maximum window size, end-to-end erasure rate and redundancy parameter as input parameters, the analytic model can reflect window evolution and calculate end-to-end throughput of TCP-NC precisely. The key point of our model is that by the novel definition of the states of Markov chain, both the number of related states and the computation complexity are substantially reduced. Our work helps to understand the factors that affect TCP-NC's performance and lay the foundation of its optimization. Extensive simulations on NS2 show that the analytic model features fairly high accuracy.

Robust Wireless Sensor and Actuator Network for Critical Control System (크리티컬한 제어 시스템용 고강건 무선 센서 액추에이터 네트워크)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1477-1483
    • /
    • 2020
  • The stability guarantee of wireless network based control systems is still challenging due to the lossy links and node failures. This paper proposes a hierarchical cluster-based network protocol called robust wireless sensor and actuator network (R-WSAN) by combining time, channel, and space resource diversity. R-WSAN includes a scheduling algorithm to support the network resource allocation and a control task sharing scheme to maintain the control stability of multiple plants. R-WSAN was implemented on a real test-bed using Zolertia RE-Mote embedded hardware platform running the Contiki-NG operating system. Our experimental results demonstrate that R-WSAN provides highly reliable and robust performance against lossy links and node failures. Furthermore, the proposed scheduling algorithm and the task sharing scheme meet the stability requirement of control systems, even if the controller fails to support the control task.

A Study on the High Performance TCP over Various Communication Links (다양한 통신 링크에서 고성능 TCP에 관한 연구)

  • Kim, Sang-Mi;Choe, Seon-Wan;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.197-212
    • /
    • 2002
  • Transmission Control Protocol (TCP) [1] has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG[2], by using Network Simulator 2 (NS-2).