Understanding TCP fairness over Wireless LAN  班級:碩士在職專班(一)  學號: 492515045  姓名:呂國銓  日期: 92.11.18.

Slides:



Advertisements
Similar presentations
Transportation Layer (2). TCP full duplex data: – bi-directional data flow in same connection – MSS: maximum segment size connection-oriented: – handshaking.
Advertisements

Transportation Layer. Very similar to the data link layer. – two hosts connected by a link or two hosts connected by a network differences: – When two.
Transport Layer3-1 TCP. Transport Layer3-2 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data flow in same connection.
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
3-1 TCP Protocol r point-to-point: m one sender, one receiver r reliable, in-order byte steam: m no “message boundaries” r pipelined: m TCP congestion.
TCP 與 UDP 協定分析 第 22 組 b 陳贊羽 b 馬家驤 b 林怡賢 b 王奕棠.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 16 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
1 Transport Layer Lecture 9 Imran Ahmed University of Management & Technology.
CS 471/571 Transport Layer 5 Slides from Kurose and Ross.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
1 Comnet 2010 Communication Networks Recitation 9 Fairness & TCP Congestion Control.
1 TCP Congestion Control. 2 TCP Segment Structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement.
TCP segment structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number rcvr window size ptr.
Chapter 3 outline 3.1 transport-layer services
EEC-484/584 Computer Networks Lecture 15 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
The Transport Layer. 2 Announcements Project 4 is due next Monday, April 9th Homework 5 available later today, due next Wednesday, April 11th Prelim II.
The Transport Layer. 2 Purpose of this layer Interface end-to-end applications and protocols –Turn best-effort IP into a usable interface Data transfer.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Transport Layer Transport Layer: TCP. Transport Layer 3-2 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
CSE 124 Networked Services Fall 2009 B. S. Manoj, Ph.D 10/20/20091CSE 124 Networked Services Fall 2009 Some.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Announcement Project 2 out –Much harder than project 1, start early! Homework 2 due next Tu.
Transport Layer3-1 Data Communication and Networks Lecture 7 Transport Protocols: TCP October 21, 2004.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Gursharan Singh Tatla Transport Layer 16-May
Network LayerII-1 RSC Part III: Transport Layer 3. TCP Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part.
Transport Layer1 Reliable Transfer Ram Dantu (compiled from various text books)
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
3: Transport Layer3b-1 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data flow in same connection m MSS: maximum.
2: Transport Layer 21 Transport Layer 2. 2: Transport Layer 22 TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 r full duplex data: m bi-directional data.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_b Transport Protocols - TCP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 6 The Transport Layer.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
CSE679: Computer Network Review r Review of the uncounted quiz r Computer network review.
1 End-to-End Protocols (UDP, TCP, Connection Management)
1 CSE 5346 Spring Network Simulator Project.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
A network primer (or refresher) Henning Schulzrinne (based on slides from Kurose/Ross)
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Transport Layer3-1 Transport Layer If you are going through Hell Keep going.
CIS679: TCP and Multimedia r Review of last lecture r TCP and Multimedia.
CSEN 404 Transport Layer II Amr El Mougy Lamia AlBadrawy.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Computer Networks 1000-Transport layer, TCP Gergely Windisch v spring.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
DMET 602: Networks and Media Lab Amr El Mougy Yasmeen EssamAlaa Tarek.
09-Transport Layer: TCP Transport Layer.
Chapter 3 outline 3.1 Transport-layer services
DMET 602: Networks and Media Lab
TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581 full duplex data:
Introduction to Networks
© 2003, Cisco Systems, Inc. All rights reserved.
Review: UDP demultiplexing TCP demultiplexing Multiplexing?
Chapter 5 Transport Layer Introduction
Transportation Layer.
Chapter 5 Transport Layer Introduction
Chapter 3 Transport Layer
Review of Internet Protocols Transport Layer
Transport Layer 9/22/2019.
Chapter 3 Transport Layer
Presentation transcript:

Understanding TCP fairness over Wireless LAN  班級:碩士在職專班(一)  學號:  姓名:呂國銓  日期:

- 2 - O UTLINE Introduction Experiment Simulation Mathematical Analysis Solution Conclusion

- 3 - I NTRODUCTION WLAN 盛行- IEEE standard Private Area : homes and offices Public Area : airports, hotels, cafes,…

- 4 - W LAN M ODEL 對等式無線網路 (Ad-Hoc) 【點對點模式】 主從式無線網路 (Infrastructure) 【共用模式】 Ad-Hoc Infrastructure

- 5 - U NFAIRNESS OF If the mobile hosts are all senders or all receivers, then they each have equal share of the total available bandwidth. === There is one mobile sender and the rest are all mobile receivers. This mobile sender, therefore gets half of the channel bandwidth and the remaining half is equally shared by all the mobile receivers. = ==

- 6 - E XPERIMENT In order to illustrate the subtle interactions of TCP with an unfair MAC protocol. We conducted a series of performance tests on a commercial b network consisting of one base station and three mobile users. The ratios presented in the table are the average of 5-10 runs. In order to test the sensitivity of this ratio to the base station buffer size, use background UDP traffic. Install sniffers on the wireless interface.

- 7 - T ABLE OF E XPERIMENT Ru : The average TCP uplink throughput R d : The average TCP downlink throughput SD : Standard Deviation

- 8 - C ONCLUSION F ROM T ABLE  Ru / Rd > 1 => upstream > downstream Number of flows ↑ => Ru / Rd ↑ Use background UDP traffic => Ru / Rd ↑ MTU ↓ => Ru / Rd ↑↑

- 9 - I LLUSTRATION OF E XPERIMENT Upstream flow finished its upload and terminated Packets lost Congestion avoidance region : 9K – 18K First 150 sec throughput is very low

S IMULATION Factors impact the throughput ratio in a test-bed  Wireless link interface  Base station buffer size  Implementation details of the MAC layer  …… Simulation study using the NS2 simulator  One upstream and one downstream flow  Multiple flows

S IMULATION : up/down ratio Total throughput is stable Region I : 84 < buffer Up/down = 1 Region II : 42 < buffer < 84 Up/down = 10 → 1 Region III : 6 < buffer < 42 Up/down = {9,12} Region IV : buffer < 6 very noisy

S IMULATION : RTT  RTT increases monotonically with the base station buffer size without any significant rate changes  The RTT of downstream is almost equal to the upstream’s.  One upstream and one downstream flow  5 simulation runs  Each simulating 100 seconds

S IMULATION : D ata & A CK L oss  Data packet loss rate is always higher than the ACK loss rate  The dependency on the buffer size is not liner.  One upstream and one downstream flow  5 simulation runs  Each simulating 100 seconds

S IMULATION : Multiple Flows  The ratio is almost linear  All the downstream flows share the same resources while the total throughput remains stable.  One upstream and multiple downstream flows  buffer size = 100 packets  5 runs for each data point  Lasting for 100 seconds

S IMULATION : Multiple Flows  The ratio is high (up to 800)  Total throughput is low  ACKs of the upstream flows clutter the base station buffer and downstream packets are dropped.  Equal number of multiple upstream and downstream flows  buffer size = 100 packets  5 runs for each data point  Lasting for 100 seconds

B : buffer size of the base station ω: TCP receiver window size α: ACK packet / Data packet window size between and Average window size A NALYSIS : 1 U P & 1 D OWN (?)

A NALYSIS : 1 U P & 1 D OWN ρ: arrival rate / service rate p : drop rate [6] [7] 6 < B < < B [7]

A NALYSIS vs. S IMULATION

A NALYSIS : M ULTIPLE F LOWS n2n2

S OLUTION Modify the receiver window field of the ACK packets flowing through the base station.  The 16-bit receive window field is used for flow control.  n flows, buffer = B → receiver window = B/n »Assume 1 upstream, n-1 downstream upstream = B/n,and every downstream = B/n »Assume m upstream, n-m downstream every upstream = B/n,and every downstream = B/n

T CP S EGMENT S TRUCTURE source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number Receive window Urg data pnter checksum F SR PAU head len not used Options (variable length) URG: urgent data (generally not used) ACK: ACK # valid PSH: push data now (generally not used) RST, SYN, FIN: connection estab (setup, teardown commands) # bytes rcvr willing to accept counting by bytes of data (not segments!) Internet checksum (as in UDP)

S IMULATION F OR S OLUTION  Throughput ratio of upstream and downstream = 1 => resulting in fair allocation of bandwidth  Without the solution,the ratio up to 800. (P.15 Fig.7)  Set receiver window = 100/n  Buffer size = 100 packets  5 simulation runs for each n  Each simulating 100 seconds

E XPERIMENT F OR S OLUTION Receiver windowRatio of up/downStandard deviation bytes ( default ) bytes ( modified by solution )  2 upstream flows  2 downstream flows  MTU = 500 bytes  450 / 1ms UDP background

C ONCLUSION & D ISCUSSION CONCLUSION  The buffer size at the base station plays a key role.  Modifying the receiver window size can provide fair TCP throughput for any buffer size or number of flows. The other ways of research  Channel losses  TCP flows with different RTT  Interaction with IPSec

R EFERENCES