skip to main content
10.1145/3372938.3372952acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdiotConference Proceedingsconference-collections
research-article

Analysis of TCP congestion management algorithms for Wireless Mesh Network

Authors Info & Claims
Published:07 January 2020Publication History

ABSTRACT

The Wireless Mesh Networks WMNs are considered among the most innovative technologies in the world of computer networks. They provide Internet access to a large number of users, wide bandwidth and high mobility. However, congestion remains one of the major problems of these networks due to the fast growth in internet, large number of users, and the increasing use of broadband links. TCP (Transmission Control Protocol)is the most famous transport layer protocol for the Internet, it makes it possible to transfer and control end-to-end information between two hosts, whether for wired or wireless networks. It uses virtual ports to establish the connection (connection-oriented) and monitors the transmission of information by ensuring reliable data transport. In fact, thanks to it the applications can communicate in a safe way thanks to the system of acknowledgment. Another particularity of TCP is to be able to regulate its data rate thanks to its capacity to emit segments of variable sizes. Therefore, against congestion TCP must be able to ensure a fair and efficient bandwidth allocation for all competing flows, which has made congestion the concern and the center of interest of the network community. For this, different mechanisms of congestion management have emerged. In this paper, we try to evoke the main mechanisms developed to solve this problem (Additive Increase Multiplicative Decrease, Slow Start, ...), as well as the main algorithms integrated in TCP's implementations for better congestion management (Tahoe, Reno, New Reno, Vegas ...).

We make also a simulation including these different algorithms to decide, via real network measurements, their effectiveness. At the end, we conclude that each algorithm has its own characteristics, and the choice of one depends on the circumstances of the network (congested or not) and the criteria that each application requires (latency, packets lost, flow...).

References

  1. F. Akyildiz, X. Wang, and W. Wang, Mar. 2005, "Wireless mesh networks: a survey," Computer Networks and ISDN Systems, 47, 445--487Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Joseph D. Camp, Edward W. Knightly, 12 August 2008, "The IEEE 802.11s Extended Service Set Mesh Networking Standard", IEE Communications Magazine, 46, 120--126Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Guido R. Hiertz; Sebastian Max; Rui Zhao; Dee Denteneer; Lars Berlemann, Aug. 2007, "Principles of IEEE 802.11s," in proceedings of 16th International Conference on Computer Communications and Networks (ICCCN), Honolulu, Hawaii, USA. https://ieeexplore.ieee.org/abstract/document/4317949Google ScholarGoogle Scholar
  4. . Xudong Wang a, Azman O. Lim, August 2008, "IEEE 802.11s wireless mesh networks: Framework and challenges," Ad Hoc Networks, 6, 970--984 https://www.sciencedirect.com/science/article/abs/pii/S157087050001370Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Nassereddine, A. Maach, S. Bennani, "The Scalability of The Hybrid Protocol in Wireless Mesh Network 802.11s", 2009Google ScholarGoogle Scholar
  6. V. Jacobson and M. J. Karels, "Congestion avoidance and control", In ACM Computer Communication Review; Proceedings of the Sigcomm'88 Symposium, volume 18, pages 314--329, Stanford, CA, USA, August 1988.Google ScholarGoogle Scholar
  7. Hanaa A. Torkey, Gamal M. Attiya and I. Z. Morsi, "Performance Evaluation of End-to-End Congestion Control Protocols", Menoufia journal of Electronic Engineering Research (MJEER), Vol. 18, no. 2, pp. 99--118, July 2008.Google ScholarGoogle Scholar
  8. https://tools.ietf.org/html/rfc5681Google ScholarGoogle Scholar
  9. https://tools.ietf.org/html/rfc2581Google ScholarGoogle Scholar
  10. Biplab Sikdar, Shivkumar Kalyanaraman and Kenneth S. Vastola, January 2004, "Analytic Models for the Latency and Steady-State Throughput of TCP Tahoe, Reno, and SACK", IEEE/ACM TRANSACTIONS ON NETWORKING, 11, 959--971Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Feng, W., & Vanichpun, 28 February 2003, "Enabling compatibility between TCP Reno and TCP Vegas", 2003 Symposium on Applications and the Internet, 2003. Proceedings, Orlando, FL, USA, USAGoogle ScholarGoogle Scholar
  12. Luigi A. Grieco and Saverio Mascolo, April 2004, "Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control", 34, Department of Electrical Engineering and Electronics, Polytechnic University of Bari, ItalyGoogle ScholarGoogle Scholar
  13. STEVEN H. LOW, LARRY L. PETERSON AND LIMIN WANG, March 2002, "Understanding TCP Vegas: A Duality Model", Journal of the ACM, 49, Computer Science, Princeton University, USAGoogle ScholarGoogle Scholar
  14. Fahad Khan, "A Comparative Analysis of TCP Tahoe, Reno, New Reno, SACK and Vegas", www.academia.edu/5989428Google ScholarGoogle Scholar
  15. Dirceu Cavendish, Kazumi Kumazoe, Masato Tsuru, Yuji Oie, and Mario Gerla, "CapStart: An Adaptive TCP Slow Start for High Speed Networks", In Proceedings of the 2009 First International Conference on Evolving Internet (INTERNET '09). IEEE Computer Society, Washington, DC, USA, 15--20. DOI=10.1109/INTERNET. 2009.10 http://dx.doi.org/10.1109/INTERNET.2009.10Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Wanxiang, S. Peixin, and L. Zhenming, "Network- assisted congestion control", Info-tech&Info-net International Conferences, vol.2, JUN 2001, pp:28--32.Google ScholarGoogle ScholarCross RefCross Ref
  17. N. Parvez, A. Mahanti, and C. Williamson, "TCP NewReno: Slowbut- Steady or Impatient?", IEEE International Communications Conference, ICC '06, vol. 2, June 2006, pp: 716--722Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Analysis of TCP congestion management algorithms for Wireless Mesh Network

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                BDIoT '19: Proceedings of the 4th International Conference on Big Data and Internet of Things
                October 2019
                476 pages
                ISBN:9781450372404
                DOI:10.1145/3372938

                Copyright © 2019 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 7 January 2020

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed limited

                Acceptance Rates

                BDIoT '19 Paper Acceptance Rate75of136submissions,55%Overall Acceptance Rate75of136submissions,55%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader