SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
DOI: 10.5121/ijcnc.2016.8602 17
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION
SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM
Nayeema Islam and Mohammed Nasir Uddin
Department of Computer Science and Engineering, Jagannath University, Dhaka,
Bangladesh
ABSTRACT
With the proliferation of mobile and wireless computing devices, the demand for continuous network
connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol
(TCP) is the standard network protocol for communication on the Interne, any wireless network with
Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired
networks, where packet losses occur mostly because of congestion. However cellular wireless network
suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by
invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This
paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to
congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed
protocol significantly improves the performance of TCP over cellular wireless network in terms of
throughput and congestion window dynamics.
KEYWORDS
TCP, Cellular Wireless Network, Handoff, High Bit Error, Explicit Loss and Handoff Notification
1. INTRODUCTION
TCP is the most commonly used protocol at the transport layer of the network stack in the
Internet. It provides reliable data transfer for many popular Internet applications such as
electronic mail, file transfer, web browsing and remote network access. In this context, any
wireless network with Internet service needs to be compatible with the protocol used in the wired
network, i.e. the TCP/IP protocol.
Regular TCP was not designed with mobile hosts in mind. Thus we cannot expect regular TCP to
perform well in a mobile network. One reason for this is that wired links have low bit error rates
(BER), as opposed to wireless links that suffer from high bit error rates and mobile handoff [1].
Reference [2] indicates that BER of wireless can reach 10-5
. When a packet is lost, regular TCP
assumes that it is due to congestion. If regular TCP is used on a mobile network, it will encounter
packet losses that may be unrelated to congestion. Nonetheless, these losses will trigger
congestion control procedure at the fixed host. These procedures will result in significant
reductions in throughput and unacceptable inter-reactive delays for active connection, thus
severely degrading performance.
Generally, hand-offs are expected to introduce three major impacts on the transport protocol [3].
First, the packets will experience a much higher delay during a hand-off due to the turn-over
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
18
delay and packet rerouting. Especially in the future mobile IP network environment the handoff
delay is supposed to become significant. The second impact is multiple packet droppings. Packets
still travelling on the previous path between server and host or the ones which are stored at the
former wireless access point might either be dropped or re-routed. Since intersystem hand-offs
are not expected to support packet forwarding, the dropping of multiple sequenced packets is
most likely. Finally, if packet forwarding is supported, the transport protocol has to deal with
massive packet re-ordering. Packets travelling on the new path will be mixed with forwarded
packet coming from the wireless access point.
TCP performance has been extensively researched on wired networks that have high bandwidth
and throughput, and low latency and delays [4]. As expected, TCP performs very well on wired
networks. However if standard TCP is used without any modification in the mobile networks a
serious drop in throughput of the connection is experienced [5]. This is because TCP has been
tuned for traditional wired networks. It assumes congestion in the network to be the primary
cause for packet losses and unusual delays [6]. TCP performs well over such networks by
adapting to end-to-end delays and congestion losses. On the other hand, in cellular mobile
environment losses are more often caused by high Bit Error Rate (BER), handoff and frequent
disconnections [5]. If the losses are not due to congestion, then TCP unnecessarily reduces
throughput leading to poor performance.
2. RELATED WORKS
The degradation performance of TCP over wireless links is mostly due to mistaking wireless
losses for congestion. Many approaches have been proposed to improve TCP throughput in the
wireless cellular network.
Link layer schemes [7] [8] are the early approaches to improve the poor performance of TCP over
wireless links. These schemes attempt to hide the unreliable wireless links from the wired hosts
by using local retransmission or forward error correction (FEC) [7] over wireless links. Since the
transport layer has its own retransmission scheme, the interaction between data link and transport
layer would be complicated. Also link layer solutions cannot account for disconnections.
The fast retransmission approach [9] addresses the issue of TCP performance when
communications resumes after a handoff. The main drawback of this approach is that it deals only
with handoffs and not with the error characteristics of the wireless link. Also, the receiver shrinks
its window to the minimum and applies the slow-start algorithm [6].
Indirect –TCP (I-TCP) [10] is proposed to improve the TCP performance that involves splitting
each TCP connections between a sender and a receiver into two separate connections. Later
(Brown and Singh, 1997) proposed another similar protocol named TCP for mobile cellular
networks (M-TCP) based on split-connection approach. Split schemes violate end-to-end TCP
semantics, since acknowledgements may reach the sender before data packets reach their
destination [11]. Also, every needs to go through the TCP protocol stack and incur the associated
overhead four time, once at the sender, twice at the base station and once at the receiver [6].
Snoop TCP is [12][13] aimed to achieve the goal of improving TCP performance thereby
retaining end-to-end semantics. An agent, called Snoop Agent is introduced to cache the TCP
segments and retransmit the segments only on the wireless link. Snoop protocol is a good scheme
to improve the performance of TCP in wireless networks. The snoop scheme does not cover the
cases where the Mobile Terminal (MT) gets involved in handovers [13].Also Snoop protocol
retransmits the lost packet like other link layer solutions [14].
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
19
3. THE PROPOSED SYSTEM
The design goal of developing modified TCP for cellular mobile network can be outlined as
follows:
• Improves the TCP performance by proper mechanism with respect to high BER, handoff
and Congestion.
• Maintains end-to-end TCP semantics.
• Compatibility with standard TCP.
3.1. Acknowledgement Packet Modification
A modified form of acknowledgement packet is used in the proposed explicit loss notification
(ELN) system. For this purpose TCP acknowledgement packet has been extended with two more
bits named ELN flag and ELN bit. ELN flag indicates whether the ACK packet contains an error
notification or not. A ’1’ in ELN bit of ACK indicates that the packet is lost due to the wireless
error and a ‘0’ in ELN bit (elnb) of ACK is used to indicate the Handoff completion. Though the
handoff of mobile host in cellular system is not an error, since this causes considerable packet
losses the proposed system informs the sender about handoff completion. So that the sender can
distinguish packet losses due to handover from other and thus can initiate proper steps to reduce
the loss related to handoff.
3.2. Handoff Notification
To handle handover the sender stores previous congestion window (cwnd) size and slow start
threshold (ssthresh) whenever they are changed. The Mobile Node also stores the ACK for the
last data segment it received.
The base stations send advertisements at a regular interval to help the mobile station to detect link
changes. As soon as the mobile station receives the advertisement after hand-over, it sets the ELN
flag of the ACK, sets ELN bit to ‘0’ and sends ACK to the base station. This ACK also contains
the SN same as the ACK stored by mobile host. When such a handoff takes place, the routing
tables in both the mobile host and Base stations get appropriately updated [14]. This routing
mechanism is not being considered in this research since routing task is performed at network
layer and beyond the scope of this research.
3.3. Software Modification at the Base Station in Forward Direction
In this scheme an agent is introduced at the base station. The function of this agent is to cache the
SN of the packets transmitted from fixed host. Like ordinary wired network, some transmitted
packets may be lost due to congestion. In this scheme a small extra cache will be used to record
the SN of these discarded packets. The installation of such discard recording cache needs extra
cost. However, since a few miss of loss notifications can seriously degrades the performance of
TCP, the use of such small cache is assumed to be cost-effective.
The following algorithm shows the routine at the base station when the packets arrive from fixed
host to base station.
• When BS receives a packet
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
20
Check the input queue length
If BS discards the packet
Record SN of the packet at discard-recording Cache
Else
Record SN of the packet at Cache
3.4. Software Modification at the Mobile Host
When mobile host (MH) is a receiver and doesn’t receive a packet, it sets the ELN bit of the
duplicate ACK as ‘1’ and sends it to the base station. It also stores ACK for the last data segment
it received.
The following algorithm shows the routine at the MH
• When MH is a receiver
If MH does not receive a packet
Set ELN Flag of ACK
Set ELN bit of ACK ==1 and send
Else if MH completes handover
Set ELN Flag of ACK
Set ELN bit of ACK==0
Send ACK
Else
Send ACK
3.5. Software Modification at the Base Station in Reverse direction
The base station checks the ACK received from mobile host. If the ELN bit of the ACK is ‘1’,
the SN of the ACK at the cache of BS is checked. If SN of the ACK exists at the cache of BS, the
ACK is only passed toward the sender. If there is the ACK’s SN at discard-recording cache, BS
resets ELN flag.
The following algorithm shows the routine distinguishing transmission losses from packet losses.
• When BS receives a packet
If ELN Flag is set
If ELN bit==1
If there is the SN of ACK at cache of BS
Pass the ACK to the sender
Else if the ACK’s SN exists at discard-recording cache
Reset ELN flag
Pass the ACK to the sender
Else if ELN bit==0
Forward the ACK to the TCP sender
Else
Forward the ACK to the sender
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
21
3.6. Software Modification at TCP Sender
When the fixed host receives the ACK, it takes action with the information stored in the ELN bits.
If the flag is set then it checks the ELN bit. If ELN bit is ‘1’, the sender decides that the loss is
caused by transmission error and only retransmits the packet. If ELN flag is not set and the sender
meets timeout or three duplicate ACK’s, sender does congestion control mechanism. The
following routine shows the sender’s action.
To handle handoff the sender stores previous congestion window (cwnd) size and slow start
threshold (ssthresh) whenever they are changed. If the sender receives an ACK with ‘Handover
bit’ (i.e. ‘0’) it resets the retransmission timer, adjusts its send window in response to the
sequence number of the ACK and starts transmission. The sender does not reduce its congestion
window size since it can distinguish these hand-over losses from congestion losses if the
retransmission timer is not expired.
• When sender receives an ACK
If ELN Flag is set
If ELN bit==’1’
Only retransmit the loss packet without window reduction
Else If ELN bit==’0’
If retransmission timer is not expired
Reset transmission timer
Adjust send window in response to SN of ACK
Restart transmission without window reduction
Else
Restore cwnd and ssthresh to previous value stored by sender
Else (If the sender meets timeout or 3 duplicate ACK)
Perform Congestion Control mechanism
4. SIMULATION MODEL
The simulation model (network topology) of the proposed system is shown in figure 1. As shown
in figure, there are four nodes: a fixed host (FH), two base stations (BS), and a mobile host (MH).
Each base station includes a finite buffer drop-tail gateway. In this research we are only
concerned with bulk data transfer from a fixed host to a mobile host. Therefore a TCP source is
embedded in the fixed host and the TCP sink is embedded in the mobile host.
Although the proposed scheme can be applied to various network topologies, this topology is
used since similar topology has been adopted in many experiments of TCP performance over
wireless mobile links, for example [16] and [17]. So that it will be easy to compare the
performance of the proposed system with that of others.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
22
Figure 1: Network topology for simulation
The network simulator (NS2) from Lawrence Berkeley [18] is used to simulate the TCP packet
transmission in wired / wireless segments of the network. Table 1 shows the system parameters
that have been used in this simulation.
Table 1: Simulation Parameters
Wired link capacity 10 Mbp/s
Wired propagation delay 20 ms
Wireless link capacity 2 Mbp/s
Wireless delay 2 ms
TCP segment / packet size 1024 , NS2 default [18]
ACK size 40 byte NS2 default [18]
Wireless router buffer size 50 packets
Wireless packet loss rate 0.0001 to 0.1 per packet
5. SIMULATION RESULTS AND DISCUSSION
Simulation has been carried out to evaluate the performance of the proposed scheme i.e., Explicit
Error and Handoff Notification Scheme under high BER condition of wireless link and during
mobile handoff. This Scheme is then compared with TCP Tahoe [19], Reno [20][21], New Reno
[22], Sack [23] and Snoop Protocol [12].
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
23
The performance metrics of the interest in this study is throughput: This is the measure of how
soon an end user is able to receive data. It is determined as the ratio of the total data received by
the end user and the connection time. A higher throughput will directly impact the user’s
perception of the quality of service.
5.1. Performance of Explicit Error and handoff Notification during High BER
Figure 2 shows the throughput performance of TCP Tahoe, Reno, New Reno, Sack, TCP Snoop
and proposed Explicit Loss and handoff Notification Scheme.
Figure 2: Throughput Performance of TCP Tahoe, Reno, New Reno, Sack, Snoop and Proposed system
(Explicit loss notification)
It can be shown from simulation result that TCP Explicit Loss Notification is able to maintain
high throughput over the wireless link for a range of error rates because it does not reduce its
sending rate when the losses are due to wireless errors. The difference between TCP ELN and
Standard TCP is illustrated in Figure 2. In case of standard TCP the lost packets or
acknowledgment results in a timeout or retransmissions. In case of timeouts, the standard TCP
shrink their congestion window thus resulting in low throughput. In case of TCP ELN, it
distinguishes wireless losses from congestion related losses and then decide whether to shrink
congestion window. The difference in performance between standard TCP and TCP ELN can be
explained by the fact that the TCP invokes congestion control frequently during the experiment
because of loss packet or duplicate acknowledgements and uses slow start to increase its window.
Figure 3 shows the congestion window dynamics of Snoop TCP, TCP Sack and TCP ELN.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
24
Figure 3: Comparison of Congestion window dynamics between ELN, Snoop TCP and TCP Sack over
wireless network at PER 0.002 for a simulation of 200 seconds
In case of unmodified TCP, the lost packets or ACKs result in timeouts and retransmissions. In
case of timeouts, the unmodified TCP shrinks its congestion window thus resulting in low
throughput. Snoop TCP decreases the rate of window fluctuation significantly, through Snoop
agent. However, it cannot completely avoid shrinking its congestion window. On the other hand,
the congestion window of TCP ELN never really shrinks.
5.2. Performance during Mobile Handoff
Figure 4 compares the congestion window dynamics of modified TCP and compares it with
unmodified TCP. It can be shown that when a handoff occurs unmodified TCP reduces its
congestion window size, however the window size continues to increase in case of modified TCP.
Figure 4: Congestion window dynamics of Standard TCP i.e., TCP Sack and Modified TCP for wireless
network for mobile host speed 40 km/hour in presence of mobile handoff
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
25
Figure 5 plots the sequence number that mobile host receives versus time. From the figure it is
shown that since ELN does not invoke congestion control procedure during timeout it is able to
receive more packets for a given time.
Figure 5: Sequence number vs. time graph of Standard TCP i.e., TCP Sack and Modified TCP for wireless
network for mobile host speed 40 km/ hour in presence of mobile handoff
Figure 6 shows the throughput performance of TCP Explicit loss Notification compared to
unmodified TCP. Because of the advantage of the proposed scheme in enabling the TCP sender to
distinguish the packet losses due to handover it does not invoke unnecessary congestion control
procedure during mobile host handoff. Thereby, it maintains comparatively high throughput
under handoff condition. However the performance of the modified TCP decreases at higher
speed.
Figure 6: Speed of mobile host versus throughput graph to compare the performance of Standard TCP and
Modified TCP (Explicit Loss Notification)
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
26
6. CONCLUSIONS
In this research an explicit loss notification scheme is presented to improve the throughput
performance of TCP/IP over wireless networks. It is shown through simulation that the Explicit
Error Notification scheme is able to maintain high throughput over the wireless link for a range of
error rates because it does not reduce its sending rate when wireless losses or handoffs are
detected. According to the simulation results the algorithm achieves significant throughput
improvement.
This scheme maintains the end-to-end semantic of TCP and correctly informs the sender the
reason of packet loss. In this scheme extra cache is used at Base station to store sequence number
of packets. This cache at BS needs extra cost. However, because a few of miss loss notification
can seriously degrade performance, the use of a small extra cache is cost-effective. This protocol
improves the performance of TCP in case of high BER as well as in case of handoffs and does not
interfere with TCP’s congestion control behaviour.
This mechanism successfully differentiates congestion loss from corruption loss (high BER).
However, this scheme relies on intermediate nodes to provide sufficient information for
distinguishing corruption loss from congestion loss. Such mechanism is not very useful when the
IP traffic is encrypted or when incorporating TCP-awareness in intermediate node is not feasible.
Further research can be carried out to solve this problem.
This research mainly focused on quantifying improvements achievable using loss notifying
method and was therefore limited to long-lived TCP flows. Further research can be carried out to
isolate the effects of loss during the slow start phase and quantify the benefits of Explicit Loss
Notification Scheme for short-lived flows.
This scheme assumes that acknowledgement packets never get corrupted or lost due to high BER
characteristic of wireless medium. Further study can consider the situation when data packet as
well as acknowledgement packet get corrupted or lost in wireless medium.
The mechanism can be evaluated using real network topologies including other workloads, for
example Hypertext Transfer Protocol (HTTP) transaction. The effectiveness of this scheme can
also be evaluated under other error models such as channel fades and Gilbert model [24].
Further research can be carried out to extend or modify this algorithm so that this scheme can be
able to differentiate random packet loss from congestion loss.
REFERENCES
[1] Vaidya, V. and Jeyakumar, A., (2016) “A Review of Use of TCP over Wireless Cellular Networks”,
International Journal of Advanced Research in Computer and Communication Engineering”, Vol 5,
Issue 7, pp 44-48, ISSN (Online): 2278-1021, ISSN (Print): 2319-5940, July 2016.
[2] Bidwe, R. V., (2013), “Different Issues and Survey of Proposed Solutions in TCP over Wireless
Environments”, International Journal of Future Computer and Communication, Vol. 2, No. 6, pp 556-
561, December 2013.
[3] Paul, L. C., (2013), “Handoff/Handover Mechanism for Mobility Improvement in Wireless
Communication”, Volume 13, Issue 16, Publisher: Global Journals Inc (USA), Online ISSN: 2249-
4596 & Print ISSN: 0975-5861, 2013.
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
27
[4] Ahn, J., Danzig, P., Liu, Z. and Yan, L., (1995) “Evaluation with TCP Vegas: Emulation and
experiment,” ACM SIGCOMM Computer Communication Review, Vol. 25, pp. 185-195,
Cambridge, Massachusetts, USA, August 28 – September 1, 1995.
[5] Brown, K. and Singh, S., (1997), “M-TCP: TCP for Mobile Cellular Networks”, ACM Computer
Communications Review, Vol. 27, No. 5, pp. 19-43, July 1997.
[6] Chawla, R. and Nandi, S., (2002), “TCP FECN: a unified solution for wireless networks”,
Proceedings of The 8th
International Conference on Communication Systems (ICCS 2002), Vol. 2, pp.
815 -819, Singapore, November 25-28, 2002.
[7] Nanda, S., Ejzak, R. and Doshi, B., (1994), “A Retransmission Scheme for Circuit-Mode Data on
Wireless Links”, IEEE Journal on Selected Areas in Communications, Vol.12, No. 8, pp. 1338-1352,
October 1994.
[8] Ayanoglu, E., Paul, S., LaPorta, T., Sabnani, K. and Gitlin, R., (1995), “AIRMAIL: A link-layer
protocol for wireless networks”, ACM/Baltzer Wireless Networks Journal, Vol. 1, No.1, pp. 47-59,
February 1995.
[9] Caceres, R. and Iftode, L., (1995), “Improving the performance of reliable transport protocols in
mobile computing environments”, IEEE Journal on Selected Areas in Communications, Vol. 13, No.
5, pp. 850-857, June 1995.
[10] Bakre, A. and Badrinath, B., (1995), “I-TCP: Indirect TCP for Mobile Hosts”, Proceedings of
15th
IEEE International Conference on Distributed Computing Systems, pp. 136-143, Vancouver,
British Columbia, Canada, May 30 – June 2, 1995.
[11] Xylomenos, G., Polyzos, G., Mahonen, P. and Saaranen, M., (2001), “TCP Performance Issues over
Wireless Links”, IEEE Communications Magazine, Vol. 39, No. 4, pp. 52-58, April 2001.
[12] Balakrishnan, H., Seshan, S. and Katz, R., (1995), “Improving reliable transport and handoff
performance in cellular wireless networks”, ACM Journal of Wireless Networks, Vol. 1, No. 4, pp.
469-481, December 1995.
[13] Hadjiefthymiades, S., Papayiannis, S. and Merakos, L., (2001), “TCP Performance Enhancement in
Wireless / Mobile Communications”, Proceedings of 26th
Annual IEEE Conference on Local
Computer Networks, pp. 604-610, Tampa, Florida, November 14-16, 2001.
[14] Hadjiefthymiades, S., Papayiannis, S. and Merakos, L., (2001), “TCP Performance Enhancement
Wenqing, D and Jamalipour, A. (2001), “Delay performance of the new explicit loss notification TCP
technique for wireless networks”, Global Telecommunications Conference, GLOBECOM ‘01. IEEE,
Vol. 6, pp. 3483-3487, San Antonio, TX, November 25-29, 2001.
[15] Perkins, C. (1996), “IP Mobility Support”, Network Working Group, Editor Request for Comments:
2002, October 1996.
[16] Elaarag, H., (2002), “Improving TCP Performance over Mobile Networks”, Journal of ACM
Computing Surveys, Vol. 34, No. 3, pp. 357-374, September 2002.
[17] Balakrishnan, H., Seshan, S. and Katz, R., (1998), “Explicit loss notification and wireless web
performance”, Proceedings of IEEE Globecom Internet Mini-Conference, Sydney, Australia,
November 8-12, 1998.
[18] NS, The network simulator – ns-2. <URL:http://www.isi.edu/nsnan/ns>
[19] Jacobson, V., (1988), “Congestion avoidance and control”, Proceedings of the ACM Symposium on
Communications Architectures and Protocols, Vol. 18, No. 4, pp. 314-329, Stanford, CA, USA,
August 16-18, 1988.
[20] Stevens, W., (1997), “TCP Slow Start, Congestion Avoidance, Fast Retransmission and Fast
Recovery Algorithms”, Internet Engineering Task Force (IEFT), RFC-2001, January 1997.
[21] Jacobson, V., (1990), “Modified TCP Congestion Avoidance Algorithm”, end2end-interest mailing
list, April 30, 1990. <URL: ftp://ftp.isi.edu/end2end/end2end-interest-1990.mail.>
[22] Hoe, J. C., (1996), “Improving the Start-behavior of a Congestion Control Scheme for TCP”, Annual
conference of the Association for Computing Machinery’s Special Interest Group on Data
Communication (ACM SIGCOMM ’96), pp.270-280, California, USA, August 26-27, 1996.
[23] Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., (1996), “TCP Selective acknowledgement
options”, IEFT, RFC 2018 (Status Proposed Standard), 1996. <URL: www.rfc-
editor.org/rfc/rfc2018.txt>
[24] Gilbert, N., (1960), "Capacity of a burst-noise channel," Bell Systems Technical Journal, Vol. 39, pp.
1253--1265, September 1960
International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016
28
Authors
Nayeema Islam received her M.Sc. in Telecommunication Engineering from Asian
Institute of Technology, Thailand in 2005. Also she received her M.Sc. and B.Sc. in
Computer Science and Technology from Rajshahi University, Bangladesh in 1998 and
1997 respectively. She is presently working as a lecturer in the department of
Computer Science and Engineering in Jagannath University, Dhaka, Bangladesh. Her
research fields of interest include Cellular Mobile System, Ad-hoc and Sensor
Networks, Network Protocols, and QoS Routing.
Mohammed Nasir Uddin was born in 1974 in Bangladesh. He received his Ph.D.
degree from Moscow Power Engineering Institute, Russia in 2004. He also received
his M.Sc. and B.Sc. in Computer Engineering from State University of Lvivska
Polytechnica, Ukraine. He is presently working as an associate professor in the
department of Computer Science and Engineering in Jagannath University, Dhaka,
Bangladesh. His research fields of interest include Cellular Mobile System, Ad-hoc
and Sensor Networks, Cryptography and Network Security.

More Related Content

What's hot (20)

PDF
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
CSCJournals
 
PPTX
Mobile Transport layer
Pallepati Vasavi
 
PDF
Mobile computing : Indirect TCP
Sushant Kushwaha
 
PDF
An ecn approach to congestion control mechanisms in mobile ad hoc networks
Alexander Decker
 
DOCX
TCP RemoteFX and IPQ
IPeak Networks
 
PDF
TCP Fairness for Uplink and Downlink Flows in WLANs
ambitlick
 
PPT
Mk ppt chapter 5
Karthick Thangadhurai
 
PDF
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
ijwmn
 
PDF
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
PDF
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
PPT
Chapter4 Network
Diego Corrales
 
PDF
Cs8601 4
Kathirvel Ayyaswamy
 
PDF
Studying_the_TCP_Flow_and_Congestion_Con.pdf
IUA
 
PPTX
Network Layer
Dr Shashikant Athawale
 
PDF
20CS2007 Computer Communication Networks
Kathirvel Ayyaswamy
 
PPT
Connection( less & oriented)
ymghorpade
 
PDF
The Transport Layer
adil raja
 
PDF
Iaetsd an effective approach to eliminate tcp incast
Iaetsd Iaetsd
 
PDF
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
IUA
 
PPTX
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
A Cross-Layer Packet Loss Identification Scheme to Improve TCP Veno Performance
CSCJournals
 
Mobile Transport layer
Pallepati Vasavi
 
Mobile computing : Indirect TCP
Sushant Kushwaha
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
Alexander Decker
 
TCP RemoteFX and IPQ
IPeak Networks
 
TCP Fairness for Uplink and Downlink Flows in WLANs
ambitlick
 
Mk ppt chapter 5
Karthick Thangadhurai
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
ijwmn
 
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Chapter4 Network
Diego Corrales
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
IUA
 
Network Layer
Dr Shashikant Athawale
 
20CS2007 Computer Communication Networks
Kathirvel Ayyaswamy
 
Connection( less & oriented)
ymghorpade
 
The Transport Layer
adil raja
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd Iaetsd
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
IUA
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 

Viewers also liked (20)

PPT
Juguetes2011
saludand
 
PPTX
Capability Document Experiential Recursive Simulation
karthikeyan j
 
PDF
201401021152550.cuaderno 6basico modulo1_lenguaje
Paulina Galleguillos
 
PPTX
Agricultura familiar, cambio climático y desarrollo rural para la seguridad y...
FAO
 
PDF
Portfolio
Courtney Stevens
 
DOCX
Canasta basika familiar stadistik
Javier Cardoza Saucedo
 
DOCX
El comportamiento agresivo 1
Zenayde Olmos Salvatierra
 
DOCX
Dimensiones de la práctica docente 1 a_ (2)
amanda haro colores
 
PDF
Good Quality Housing for Very Vulnerable People: The Domus Project
FEANTSA
 
PDF
Teoh jun xiang tutorial 29 nov
JunXiang97
 
PPTX
Bloque0 pacie, Estructuracion de Evas
Javier Rovira
 
PPTX
Visual resume
Texas Tech University
 
DOC
CV Arief Yulianto
Arif Yulianto
 
PPTX
Rohan avriti | Apartments in bangalore | residential project in bangalore
Rohan Builders
 
PDF
November 2016 Torrance Real Estate Market Trends Update
HHC South Bay Real Estate Agents
 
PPTX
Plandevida diana arroyo
diana0187
 
PDF
Reflexion
Darwin Escobar
 
PPTX
Corporate Strategy_WEB Aruba NV_Utilities_Sept 2013_JFE with high qualit...
Oslin Boekhoudt
 
PPTX
Australia
Shriyaa Mahajan
 
PDF
ADP03 Home Security
Chad Landman
 
Juguetes2011
saludand
 
Capability Document Experiential Recursive Simulation
karthikeyan j
 
201401021152550.cuaderno 6basico modulo1_lenguaje
Paulina Galleguillos
 
Agricultura familiar, cambio climático y desarrollo rural para la seguridad y...
FAO
 
Portfolio
Courtney Stevens
 
Canasta basika familiar stadistik
Javier Cardoza Saucedo
 
El comportamiento agresivo 1
Zenayde Olmos Salvatierra
 
Dimensiones de la práctica docente 1 a_ (2)
amanda haro colores
 
Good Quality Housing for Very Vulnerable People: The Domus Project
FEANTSA
 
Teoh jun xiang tutorial 29 nov
JunXiang97
 
Bloque0 pacie, Estructuracion de Evas
Javier Rovira
 
Visual resume
Texas Tech University
 
CV Arief Yulianto
Arif Yulianto
 
Rohan avriti | Apartments in bangalore | residential project in bangalore
Rohan Builders
 
November 2016 Torrance Real Estate Market Trends Update
HHC South Bay Real Estate Agents
 
Plandevida diana arroyo
diana0187
 
Reflexion
Darwin Escobar
 
Corporate Strategy_WEB Aruba NV_Utilities_Sept 2013_JFE with high qualit...
Oslin Boekhoudt
 
Australia
Shriyaa Mahajan
 
ADP03 Home Security
Chad Landman
 
Ad

Similar to AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM (20)

PDF
A throughput analysis of tcp in adhoc networks
csandit
 
PDF
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
csandit
 
PDF
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ijwmn
 
PDF
TCP for Wireless Environments
INFOGAIN PUBLICATION
 
PDF
Improving Performance of TCP in Wireless Environment using TCP-P
IDES Editor
 
PDF
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Ranjeet Bidwe
 
PDF
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
cscpconf
 
PDF
TCP Congestion Control
Michail Grigoropoulos
 
DOCX
Sky x technology
Hafsa Hayath
 
PDF
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
PDF
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET Journal
 
PPT
Ch7-Transport_Protocols.ppt
RituParna42
 
PDF
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
babuece
 
PPT
transport protocols
Dr.K.Sreenivas Rao
 
PDF
Ez33917920
IJERA Editor
 
PDF
Ez33917920
IJERA Editor
 
PPTX
Mobile transport layer .
junnubabu
 
PPT
Wireless Networks: Transport Protocols Lecture
DrAdeelAkram2
 
PPTX
Improving tcp performance over mobile ad hoc networks
Arpita Naskar
 
PDF
Unit 4
SwamiKankipati
 
A throughput analysis of tcp in adhoc networks
csandit
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
csandit
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ijwmn
 
TCP for Wireless Environments
INFOGAIN PUBLICATION
 
Improving Performance of TCP in Wireless Environment using TCP-P
IDES Editor
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Ranjeet Bidwe
 
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...
cscpconf
 
TCP Congestion Control
Michail Grigoropoulos
 
Sky x technology
Hafsa Hayath
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET Journal
 
Ch7-Transport_Protocols.ppt
RituParna42
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
babuece
 
transport protocols
Dr.K.Sreenivas Rao
 
Ez33917920
IJERA Editor
 
Ez33917920
IJERA Editor
 
Mobile transport layer .
junnubabu
 
Wireless Networks: Transport Protocols Lecture
DrAdeelAkram2
 
Improving tcp performance over mobile ad hoc networks
Arpita Naskar
 
Ad

More from IJCNCJournal (20)

PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
PDF
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
PDF
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
PDF
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
PDF
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 

Recently uploaded (20)

PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
community health nursing question paper 2.pdf
Prince kumar
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
People & Earth's Ecosystem -Lesson 2: People & Population
marvinnbustamante1
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 DOI: 10.5121/ijcnc.2016.8602 17 AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM Nayeema Islam and Mohammed Nasir Uddin Department of Computer Science and Engineering, Jagannath University, Dhaka, Bangladesh ABSTRACT With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired networks, where packet losses occur mostly because of congestion. However cellular wireless network suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics. KEYWORDS TCP, Cellular Wireless Network, Handoff, High Bit Error, Explicit Loss and Handoff Notification 1. INTRODUCTION TCP is the most commonly used protocol at the transport layer of the network stack in the Internet. It provides reliable data transfer for many popular Internet applications such as electronic mail, file transfer, web browsing and remote network access. In this context, any wireless network with Internet service needs to be compatible with the protocol used in the wired network, i.e. the TCP/IP protocol. Regular TCP was not designed with mobile hosts in mind. Thus we cannot expect regular TCP to perform well in a mobile network. One reason for this is that wired links have low bit error rates (BER), as opposed to wireless links that suffer from high bit error rates and mobile handoff [1]. Reference [2] indicates that BER of wireless can reach 10-5 . When a packet is lost, regular TCP assumes that it is due to congestion. If regular TCP is used on a mobile network, it will encounter packet losses that may be unrelated to congestion. Nonetheless, these losses will trigger congestion control procedure at the fixed host. These procedures will result in significant reductions in throughput and unacceptable inter-reactive delays for active connection, thus severely degrading performance. Generally, hand-offs are expected to introduce three major impacts on the transport protocol [3]. First, the packets will experience a much higher delay during a hand-off due to the turn-over
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 18 delay and packet rerouting. Especially in the future mobile IP network environment the handoff delay is supposed to become significant. The second impact is multiple packet droppings. Packets still travelling on the previous path between server and host or the ones which are stored at the former wireless access point might either be dropped or re-routed. Since intersystem hand-offs are not expected to support packet forwarding, the dropping of multiple sequenced packets is most likely. Finally, if packet forwarding is supported, the transport protocol has to deal with massive packet re-ordering. Packets travelling on the new path will be mixed with forwarded packet coming from the wireless access point. TCP performance has been extensively researched on wired networks that have high bandwidth and throughput, and low latency and delays [4]. As expected, TCP performs very well on wired networks. However if standard TCP is used without any modification in the mobile networks a serious drop in throughput of the connection is experienced [5]. This is because TCP has been tuned for traditional wired networks. It assumes congestion in the network to be the primary cause for packet losses and unusual delays [6]. TCP performs well over such networks by adapting to end-to-end delays and congestion losses. On the other hand, in cellular mobile environment losses are more often caused by high Bit Error Rate (BER), handoff and frequent disconnections [5]. If the losses are not due to congestion, then TCP unnecessarily reduces throughput leading to poor performance. 2. RELATED WORKS The degradation performance of TCP over wireless links is mostly due to mistaking wireless losses for congestion. Many approaches have been proposed to improve TCP throughput in the wireless cellular network. Link layer schemes [7] [8] are the early approaches to improve the poor performance of TCP over wireless links. These schemes attempt to hide the unreliable wireless links from the wired hosts by using local retransmission or forward error correction (FEC) [7] over wireless links. Since the transport layer has its own retransmission scheme, the interaction between data link and transport layer would be complicated. Also link layer solutions cannot account for disconnections. The fast retransmission approach [9] addresses the issue of TCP performance when communications resumes after a handoff. The main drawback of this approach is that it deals only with handoffs and not with the error characteristics of the wireless link. Also, the receiver shrinks its window to the minimum and applies the slow-start algorithm [6]. Indirect –TCP (I-TCP) [10] is proposed to improve the TCP performance that involves splitting each TCP connections between a sender and a receiver into two separate connections. Later (Brown and Singh, 1997) proposed another similar protocol named TCP for mobile cellular networks (M-TCP) based on split-connection approach. Split schemes violate end-to-end TCP semantics, since acknowledgements may reach the sender before data packets reach their destination [11]. Also, every needs to go through the TCP protocol stack and incur the associated overhead four time, once at the sender, twice at the base station and once at the receiver [6]. Snoop TCP is [12][13] aimed to achieve the goal of improving TCP performance thereby retaining end-to-end semantics. An agent, called Snoop Agent is introduced to cache the TCP segments and retransmit the segments only on the wireless link. Snoop protocol is a good scheme to improve the performance of TCP in wireless networks. The snoop scheme does not cover the cases where the Mobile Terminal (MT) gets involved in handovers [13].Also Snoop protocol retransmits the lost packet like other link layer solutions [14].
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 19 3. THE PROPOSED SYSTEM The design goal of developing modified TCP for cellular mobile network can be outlined as follows: • Improves the TCP performance by proper mechanism with respect to high BER, handoff and Congestion. • Maintains end-to-end TCP semantics. • Compatibility with standard TCP. 3.1. Acknowledgement Packet Modification A modified form of acknowledgement packet is used in the proposed explicit loss notification (ELN) system. For this purpose TCP acknowledgement packet has been extended with two more bits named ELN flag and ELN bit. ELN flag indicates whether the ACK packet contains an error notification or not. A ’1’ in ELN bit of ACK indicates that the packet is lost due to the wireless error and a ‘0’ in ELN bit (elnb) of ACK is used to indicate the Handoff completion. Though the handoff of mobile host in cellular system is not an error, since this causes considerable packet losses the proposed system informs the sender about handoff completion. So that the sender can distinguish packet losses due to handover from other and thus can initiate proper steps to reduce the loss related to handoff. 3.2. Handoff Notification To handle handover the sender stores previous congestion window (cwnd) size and slow start threshold (ssthresh) whenever they are changed. The Mobile Node also stores the ACK for the last data segment it received. The base stations send advertisements at a regular interval to help the mobile station to detect link changes. As soon as the mobile station receives the advertisement after hand-over, it sets the ELN flag of the ACK, sets ELN bit to ‘0’ and sends ACK to the base station. This ACK also contains the SN same as the ACK stored by mobile host. When such a handoff takes place, the routing tables in both the mobile host and Base stations get appropriately updated [14]. This routing mechanism is not being considered in this research since routing task is performed at network layer and beyond the scope of this research. 3.3. Software Modification at the Base Station in Forward Direction In this scheme an agent is introduced at the base station. The function of this agent is to cache the SN of the packets transmitted from fixed host. Like ordinary wired network, some transmitted packets may be lost due to congestion. In this scheme a small extra cache will be used to record the SN of these discarded packets. The installation of such discard recording cache needs extra cost. However, since a few miss of loss notifications can seriously degrades the performance of TCP, the use of such small cache is assumed to be cost-effective. The following algorithm shows the routine at the base station when the packets arrive from fixed host to base station. • When BS receives a packet
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 20 Check the input queue length If BS discards the packet Record SN of the packet at discard-recording Cache Else Record SN of the packet at Cache 3.4. Software Modification at the Mobile Host When mobile host (MH) is a receiver and doesn’t receive a packet, it sets the ELN bit of the duplicate ACK as ‘1’ and sends it to the base station. It also stores ACK for the last data segment it received. The following algorithm shows the routine at the MH • When MH is a receiver If MH does not receive a packet Set ELN Flag of ACK Set ELN bit of ACK ==1 and send Else if MH completes handover Set ELN Flag of ACK Set ELN bit of ACK==0 Send ACK Else Send ACK 3.5. Software Modification at the Base Station in Reverse direction The base station checks the ACK received from mobile host. If the ELN bit of the ACK is ‘1’, the SN of the ACK at the cache of BS is checked. If SN of the ACK exists at the cache of BS, the ACK is only passed toward the sender. If there is the ACK’s SN at discard-recording cache, BS resets ELN flag. The following algorithm shows the routine distinguishing transmission losses from packet losses. • When BS receives a packet If ELN Flag is set If ELN bit==1 If there is the SN of ACK at cache of BS Pass the ACK to the sender Else if the ACK’s SN exists at discard-recording cache Reset ELN flag Pass the ACK to the sender Else if ELN bit==0 Forward the ACK to the TCP sender Else Forward the ACK to the sender
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 21 3.6. Software Modification at TCP Sender When the fixed host receives the ACK, it takes action with the information stored in the ELN bits. If the flag is set then it checks the ELN bit. If ELN bit is ‘1’, the sender decides that the loss is caused by transmission error and only retransmits the packet. If ELN flag is not set and the sender meets timeout or three duplicate ACK’s, sender does congestion control mechanism. The following routine shows the sender’s action. To handle handoff the sender stores previous congestion window (cwnd) size and slow start threshold (ssthresh) whenever they are changed. If the sender receives an ACK with ‘Handover bit’ (i.e. ‘0’) it resets the retransmission timer, adjusts its send window in response to the sequence number of the ACK and starts transmission. The sender does not reduce its congestion window size since it can distinguish these hand-over losses from congestion losses if the retransmission timer is not expired. • When sender receives an ACK If ELN Flag is set If ELN bit==’1’ Only retransmit the loss packet without window reduction Else If ELN bit==’0’ If retransmission timer is not expired Reset transmission timer Adjust send window in response to SN of ACK Restart transmission without window reduction Else Restore cwnd and ssthresh to previous value stored by sender Else (If the sender meets timeout or 3 duplicate ACK) Perform Congestion Control mechanism 4. SIMULATION MODEL The simulation model (network topology) of the proposed system is shown in figure 1. As shown in figure, there are four nodes: a fixed host (FH), two base stations (BS), and a mobile host (MH). Each base station includes a finite buffer drop-tail gateway. In this research we are only concerned with bulk data transfer from a fixed host to a mobile host. Therefore a TCP source is embedded in the fixed host and the TCP sink is embedded in the mobile host. Although the proposed scheme can be applied to various network topologies, this topology is used since similar topology has been adopted in many experiments of TCP performance over wireless mobile links, for example [16] and [17]. So that it will be easy to compare the performance of the proposed system with that of others.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 22 Figure 1: Network topology for simulation The network simulator (NS2) from Lawrence Berkeley [18] is used to simulate the TCP packet transmission in wired / wireless segments of the network. Table 1 shows the system parameters that have been used in this simulation. Table 1: Simulation Parameters Wired link capacity 10 Mbp/s Wired propagation delay 20 ms Wireless link capacity 2 Mbp/s Wireless delay 2 ms TCP segment / packet size 1024 , NS2 default [18] ACK size 40 byte NS2 default [18] Wireless router buffer size 50 packets Wireless packet loss rate 0.0001 to 0.1 per packet 5. SIMULATION RESULTS AND DISCUSSION Simulation has been carried out to evaluate the performance of the proposed scheme i.e., Explicit Error and Handoff Notification Scheme under high BER condition of wireless link and during mobile handoff. This Scheme is then compared with TCP Tahoe [19], Reno [20][21], New Reno [22], Sack [23] and Snoop Protocol [12].
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 23 The performance metrics of the interest in this study is throughput: This is the measure of how soon an end user is able to receive data. It is determined as the ratio of the total data received by the end user and the connection time. A higher throughput will directly impact the user’s perception of the quality of service. 5.1. Performance of Explicit Error and handoff Notification during High BER Figure 2 shows the throughput performance of TCP Tahoe, Reno, New Reno, Sack, TCP Snoop and proposed Explicit Loss and handoff Notification Scheme. Figure 2: Throughput Performance of TCP Tahoe, Reno, New Reno, Sack, Snoop and Proposed system (Explicit loss notification) It can be shown from simulation result that TCP Explicit Loss Notification is able to maintain high throughput over the wireless link for a range of error rates because it does not reduce its sending rate when the losses are due to wireless errors. The difference between TCP ELN and Standard TCP is illustrated in Figure 2. In case of standard TCP the lost packets or acknowledgment results in a timeout or retransmissions. In case of timeouts, the standard TCP shrink their congestion window thus resulting in low throughput. In case of TCP ELN, it distinguishes wireless losses from congestion related losses and then decide whether to shrink congestion window. The difference in performance between standard TCP and TCP ELN can be explained by the fact that the TCP invokes congestion control frequently during the experiment because of loss packet or duplicate acknowledgements and uses slow start to increase its window. Figure 3 shows the congestion window dynamics of Snoop TCP, TCP Sack and TCP ELN.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 24 Figure 3: Comparison of Congestion window dynamics between ELN, Snoop TCP and TCP Sack over wireless network at PER 0.002 for a simulation of 200 seconds In case of unmodified TCP, the lost packets or ACKs result in timeouts and retransmissions. In case of timeouts, the unmodified TCP shrinks its congestion window thus resulting in low throughput. Snoop TCP decreases the rate of window fluctuation significantly, through Snoop agent. However, it cannot completely avoid shrinking its congestion window. On the other hand, the congestion window of TCP ELN never really shrinks. 5.2. Performance during Mobile Handoff Figure 4 compares the congestion window dynamics of modified TCP and compares it with unmodified TCP. It can be shown that when a handoff occurs unmodified TCP reduces its congestion window size, however the window size continues to increase in case of modified TCP. Figure 4: Congestion window dynamics of Standard TCP i.e., TCP Sack and Modified TCP for wireless network for mobile host speed 40 km/hour in presence of mobile handoff
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 25 Figure 5 plots the sequence number that mobile host receives versus time. From the figure it is shown that since ELN does not invoke congestion control procedure during timeout it is able to receive more packets for a given time. Figure 5: Sequence number vs. time graph of Standard TCP i.e., TCP Sack and Modified TCP for wireless network for mobile host speed 40 km/ hour in presence of mobile handoff Figure 6 shows the throughput performance of TCP Explicit loss Notification compared to unmodified TCP. Because of the advantage of the proposed scheme in enabling the TCP sender to distinguish the packet losses due to handover it does not invoke unnecessary congestion control procedure during mobile host handoff. Thereby, it maintains comparatively high throughput under handoff condition. However the performance of the modified TCP decreases at higher speed. Figure 6: Speed of mobile host versus throughput graph to compare the performance of Standard TCP and Modified TCP (Explicit Loss Notification)
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 26 6. CONCLUSIONS In this research an explicit loss notification scheme is presented to improve the throughput performance of TCP/IP over wireless networks. It is shown through simulation that the Explicit Error Notification scheme is able to maintain high throughput over the wireless link for a range of error rates because it does not reduce its sending rate when wireless losses or handoffs are detected. According to the simulation results the algorithm achieves significant throughput improvement. This scheme maintains the end-to-end semantic of TCP and correctly informs the sender the reason of packet loss. In this scheme extra cache is used at Base station to store sequence number of packets. This cache at BS needs extra cost. However, because a few of miss loss notification can seriously degrade performance, the use of a small extra cache is cost-effective. This protocol improves the performance of TCP in case of high BER as well as in case of handoffs and does not interfere with TCP’s congestion control behaviour. This mechanism successfully differentiates congestion loss from corruption loss (high BER). However, this scheme relies on intermediate nodes to provide sufficient information for distinguishing corruption loss from congestion loss. Such mechanism is not very useful when the IP traffic is encrypted or when incorporating TCP-awareness in intermediate node is not feasible. Further research can be carried out to solve this problem. This research mainly focused on quantifying improvements achievable using loss notifying method and was therefore limited to long-lived TCP flows. Further research can be carried out to isolate the effects of loss during the slow start phase and quantify the benefits of Explicit Loss Notification Scheme for short-lived flows. This scheme assumes that acknowledgement packets never get corrupted or lost due to high BER characteristic of wireless medium. Further study can consider the situation when data packet as well as acknowledgement packet get corrupted or lost in wireless medium. The mechanism can be evaluated using real network topologies including other workloads, for example Hypertext Transfer Protocol (HTTP) transaction. The effectiveness of this scheme can also be evaluated under other error models such as channel fades and Gilbert model [24]. Further research can be carried out to extend or modify this algorithm so that this scheme can be able to differentiate random packet loss from congestion loss. REFERENCES [1] Vaidya, V. and Jeyakumar, A., (2016) “A Review of Use of TCP over Wireless Cellular Networks”, International Journal of Advanced Research in Computer and Communication Engineering”, Vol 5, Issue 7, pp 44-48, ISSN (Online): 2278-1021, ISSN (Print): 2319-5940, July 2016. [2] Bidwe, R. V., (2013), “Different Issues and Survey of Proposed Solutions in TCP over Wireless Environments”, International Journal of Future Computer and Communication, Vol. 2, No. 6, pp 556- 561, December 2013. [3] Paul, L. C., (2013), “Handoff/Handover Mechanism for Mobility Improvement in Wireless Communication”, Volume 13, Issue 16, Publisher: Global Journals Inc (USA), Online ISSN: 2249- 4596 & Print ISSN: 0975-5861, 2013.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 27 [4] Ahn, J., Danzig, P., Liu, Z. and Yan, L., (1995) “Evaluation with TCP Vegas: Emulation and experiment,” ACM SIGCOMM Computer Communication Review, Vol. 25, pp. 185-195, Cambridge, Massachusetts, USA, August 28 – September 1, 1995. [5] Brown, K. and Singh, S., (1997), “M-TCP: TCP for Mobile Cellular Networks”, ACM Computer Communications Review, Vol. 27, No. 5, pp. 19-43, July 1997. [6] Chawla, R. and Nandi, S., (2002), “TCP FECN: a unified solution for wireless networks”, Proceedings of The 8th International Conference on Communication Systems (ICCS 2002), Vol. 2, pp. 815 -819, Singapore, November 25-28, 2002. [7] Nanda, S., Ejzak, R. and Doshi, B., (1994), “A Retransmission Scheme for Circuit-Mode Data on Wireless Links”, IEEE Journal on Selected Areas in Communications, Vol.12, No. 8, pp. 1338-1352, October 1994. [8] Ayanoglu, E., Paul, S., LaPorta, T., Sabnani, K. and Gitlin, R., (1995), “AIRMAIL: A link-layer protocol for wireless networks”, ACM/Baltzer Wireless Networks Journal, Vol. 1, No.1, pp. 47-59, February 1995. [9] Caceres, R. and Iftode, L., (1995), “Improving the performance of reliable transport protocols in mobile computing environments”, IEEE Journal on Selected Areas in Communications, Vol. 13, No. 5, pp. 850-857, June 1995. [10] Bakre, A. and Badrinath, B., (1995), “I-TCP: Indirect TCP for Mobile Hosts”, Proceedings of 15th IEEE International Conference on Distributed Computing Systems, pp. 136-143, Vancouver, British Columbia, Canada, May 30 – June 2, 1995. [11] Xylomenos, G., Polyzos, G., Mahonen, P. and Saaranen, M., (2001), “TCP Performance Issues over Wireless Links”, IEEE Communications Magazine, Vol. 39, No. 4, pp. 52-58, April 2001. [12] Balakrishnan, H., Seshan, S. and Katz, R., (1995), “Improving reliable transport and handoff performance in cellular wireless networks”, ACM Journal of Wireless Networks, Vol. 1, No. 4, pp. 469-481, December 1995. [13] Hadjiefthymiades, S., Papayiannis, S. and Merakos, L., (2001), “TCP Performance Enhancement in Wireless / Mobile Communications”, Proceedings of 26th Annual IEEE Conference on Local Computer Networks, pp. 604-610, Tampa, Florida, November 14-16, 2001. [14] Hadjiefthymiades, S., Papayiannis, S. and Merakos, L., (2001), “TCP Performance Enhancement Wenqing, D and Jamalipour, A. (2001), “Delay performance of the new explicit loss notification TCP technique for wireless networks”, Global Telecommunications Conference, GLOBECOM ‘01. IEEE, Vol. 6, pp. 3483-3487, San Antonio, TX, November 25-29, 2001. [15] Perkins, C. (1996), “IP Mobility Support”, Network Working Group, Editor Request for Comments: 2002, October 1996. [16] Elaarag, H., (2002), “Improving TCP Performance over Mobile Networks”, Journal of ACM Computing Surveys, Vol. 34, No. 3, pp. 357-374, September 2002. [17] Balakrishnan, H., Seshan, S. and Katz, R., (1998), “Explicit loss notification and wireless web performance”, Proceedings of IEEE Globecom Internet Mini-Conference, Sydney, Australia, November 8-12, 1998. [18] NS, The network simulator – ns-2. <URL:http://www.isi.edu/nsnan/ns> [19] Jacobson, V., (1988), “Congestion avoidance and control”, Proceedings of the ACM Symposium on Communications Architectures and Protocols, Vol. 18, No. 4, pp. 314-329, Stanford, CA, USA, August 16-18, 1988. [20] Stevens, W., (1997), “TCP Slow Start, Congestion Avoidance, Fast Retransmission and Fast Recovery Algorithms”, Internet Engineering Task Force (IEFT), RFC-2001, January 1997. [21] Jacobson, V., (1990), “Modified TCP Congestion Avoidance Algorithm”, end2end-interest mailing list, April 30, 1990. <URL: ftp://ftp.isi.edu/end2end/end2end-interest-1990.mail.> [22] Hoe, J. C., (1996), “Improving the Start-behavior of a Congestion Control Scheme for TCP”, Annual conference of the Association for Computing Machinery’s Special Interest Group on Data Communication (ACM SIGCOMM ’96), pp.270-280, California, USA, August 26-27, 1996. [23] Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., (1996), “TCP Selective acknowledgement options”, IEFT, RFC 2018 (Status Proposed Standard), 1996. <URL: www.rfc- editor.org/rfc/rfc2018.txt> [24] Gilbert, N., (1960), "Capacity of a burst-noise channel," Bell Systems Technical Journal, Vol. 39, pp. 1253--1265, September 1960
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.6, November 2016 28 Authors Nayeema Islam received her M.Sc. in Telecommunication Engineering from Asian Institute of Technology, Thailand in 2005. Also she received her M.Sc. and B.Sc. in Computer Science and Technology from Rajshahi University, Bangladesh in 1998 and 1997 respectively. She is presently working as a lecturer in the department of Computer Science and Engineering in Jagannath University, Dhaka, Bangladesh. Her research fields of interest include Cellular Mobile System, Ad-hoc and Sensor Networks, Network Protocols, and QoS Routing. Mohammed Nasir Uddin was born in 1974 in Bangladesh. He received his Ph.D. degree from Moscow Power Engineering Institute, Russia in 2004. He also received his M.Sc. and B.Sc. in Computer Engineering from State University of Lvivska Polytechnica, Ukraine. He is presently working as an associate professor in the department of Computer Science and Engineering in Jagannath University, Dhaka, Bangladesh. His research fields of interest include Cellular Mobile System, Ad-hoc and Sensor Networks, Cryptography and Network Security.