Professional Documents
Culture Documents
Absjm+Thc fairness and throughputof TCP suffer when it that shorter TCP connections enjoy an unfair advantage in
i.lused in mob* ad hoc network This is a direct consequence throughput as compared with longer connections1. In [l] and
of T m ’ wrongly a m i u t i o g packet losses due to link failures [2], it was proposed that explicit notifications he sent back to
(a eonsqnenee of mobility) to c n n g d n . While this problem
causes an overall degradationofthroughput, it especiallyaffecb the source node when a link failure occurs on the path of that
counectionsnith a large number of bops, where link failnres are connection. The TCP source then freezes the connection un-
“e likely. Thus, short connections enjoy an unfair advantage til the route is restored. While this method can alleviate the
over long connections. Furthermore, if the MAC protwol de- problem to a certain extent, it does not overcome the unfair
fined iu the IEEE 802.11 standard is used, tho problems exacer- advantage that short sessions enjoy with respect to longer ses-
bate due to the capture effect indued by this protocol, leading
to a larger degree of uofaimess and further degradation of sions. Furthermore, this scheme does not allow the utilization
througbput of the other links on the path that have not failed. Long con-
Io tbis paper we develop a scheme which we call Split TCP. nections are much more likely to freeze because (a) they have
This scheme separates the fuuctionalitks of TCP congestion more links and are therefore are more susceptible to failure,
control and reliable packet delivery. For m y TCP connectiou, and @) since short connections can transmit faster (by adjust-
certain nodes along the route take up the role of being proxies
for that eonneetion. The proxiesbuffer packets upon receipt and ing their TCP window size more rapidly) they can dominate
administer rate control. The buffering enables dropped packets shared links.
to be m w e r e d from the most recent proxy. The rate control The MAC protocol commonly used in ad hoc networks ac-
helps in controlling congestion on inter-proxy segments. Thus, centuates the performance problems of TCP [ 3 ] . This MAC
by introducingpmxieswe emulate shorter TCP connectionsand
can thereby achieve befter parallelismin the network. As shown protocol is the one described in the IEEE 802.1 1 standard
by our simulations, the use of proxies abates the problems de- [4] and we will refer to this as the 802.11 MAC protocol for
scribed i.e., a) it improves the total throughput by as much as short. One specific problem that is induced by the exponen-
30% in typical scenarios and b) it reduces unfairness signifi- tial hackoff mechanism of the 802.1I MAC protocol, is the
cantly. lo terms of an unfairness metric that we introduce, the channel capture efect. Simply put, because of this effect, the
uufaimessdecrearsfromO.8 to0.2(1.0beingthcmarimum un-
most data-intense connection dominates the multiple-access
fairness). We conclude that iucolporatiug TCPprorieris benefi-
cial in termsofimprovingTCPperlormaneeinad hoc networks. wireless channel. If there are multiple data-intense connec-
tions, the first connection “captures” the channel until it has
transported all of its data to the destination. This m a t e s an
1. INTRODUCTION
unfaimess to the connections that begin later or are further
Mobile ad hoc networks (MANETs) have received a lot away from the point of contention. So as we see again, the
of attention recently and may he deployed in militaty oper- longer connections are in disadvantage.
ations, disaster rescue missions and electronic classrooms. In this paper, we examine the effect of splitting long TCP
Thus, the need for interfacing MANETs with the Internet has connections into shorter localized segmenfs to primarily im-
arisen. TCP, which is the de facto transport layer protocol prove the performance in terms of fairness. We substantiate
for the Internet, might be expected to be used for MANETs. this idea by developing a scheme that uses proxies as inter-
TCP, however was designed for wire-line networks and sig- facing agents between these localized segments. We call this
nificant degradations in its performance in terms of a signifi- scheme Splif-TCP or TCP with pmxies. Intuitively, the best
cant reduction in the achievable throughput and an increased way to think of inter-proxy segments is as ”zones”; once the
unfairness among connections are observed when it is used packet makes it to a proxy it has traversed the previous “zone”
in MANETs. In the following paragraphs we elucidate these and thus, we avoid having to go all the way back to the source
problems. if the packet needs to he retransmitted. More specifically, a
Several studies ([I], [Z]and [3]) have shown that TCP can- proxy intercepts TCP packets, buffers them, acknowledges
not handle mobility well. In ad hoc networks, links can break their receipt to the sauce (or previous proxy) by sending a
causing temporary packet losses (until the routing layer dis- local acknowledgement (LACK), and takes over the responsi-
covers a new route). Furthermore, as the number of hops on bility of delivering the packets further, at an appropriate rate,
a path increases, the probability of a link failure (and con- to the next local segment. Upon the receipt of a LACK (from
sequential packet losses) on the path increases. This implies the next proxy or from the final destination), a proxy will
This work was suppned in pan by granlp fromm the T m C m l t i n g So-
vim Ins.. the Digital Media h m l i o n s Lab ofthe Univclmiry ofcalifomis ’We usc the lm “long” to refer 10 comectiom that arc over long p h r .
and dw, by Ihe DARPA awqi FIN F306CZdl-24535 They do not referlo connections of longdurations.
Authorized licensed use limited to: VIT University. Downloaded on October 12,2021 at 17:37:27 UTC from IEEE Xplore. Restrictions apply.
purge the packet from its buffer. The forwarded packet could
possibly be intercepted again by another proxy and so onz. In
this scheme, we do not change the end-to-end acknowledg-
/w%
-.HluC.ID1.l-eh
ment system of TCP, meaning that the source will not clear *.d.q.bnmD
&
&3&
&
,%
I
see later, the overhead incurred in including infrequent end- um-fm'nlan ~-Umb"DrPl
139
Authorized licensed use limited to: VIT University. Downloaded on October 12,2021 at 17:37:27 UTC from IEEE Xplore. Restrictions apply.
the minimum of the local congestion levels at the proxies on
its path. We omit the details of this implementation due to
the lack of space and refer the reader to 171.
Proxies would be implemented by means of a distributed
algorithm. Each node would look at the number of hops that
a packet has traversed since the previous proxy (as seen in the
IP header) and ifa predetermined hop count is reached, it acts
as a proxy for that packet. Such an implementation would
make deployment of nodes with proxy capabilities both prac-
tical and scalable 6 .
111. EXPERIMENTAL RESULTS
In this section we quantify the performance enhancements
Fig. 2. The mthd by which TCP with p r i e s solves the channel capture
that Split-TCP provides in ad hoc networks by means of ex-
efkt
tensive simulations. We use the popular ns 2. I and the exten-
captures the entire region of transmission as its TCP window sions provided therein for supporting mobile ad hoc networks
size grows. The introduction of TCP proxies as described, 181. We have created a “TCP proxy agent” and a “TCP con-
alleviates this problem. Since, the streaming of data now oc- nection manager’’ module to support the operation for Split-
curs in shorter stage& only one stage is captured at a time TCP.
i.e., the size of the captured region is now reduced. This may To compare Split-TCP with simple TCP, we use the cu-
be explained with the help of Figure 2. We show two heav- mulative throughput which is defined as the ratio of the total
ily loaded connections and the first session begins earlier than number of data bytes transported to the destination over the
the seconds. In the absence of proxies the first connection en- duration of the session as one of the metrics. We use a second
joys a sustained streaming of data at the MAC layer. As long metric for quantifying the unfaimess, U, which stems from a
as the source SI, continues to have data, it captures the re- commonly used faimess metric 191. Let us assume that there
gion of transmission and thus, the second connection can get are k simultaneous connections at a given time (let these con-
virtually no throughput. If, for the first session, we introduce nections be enumerated from 1to k). Let us also suppose that
a proxy PI between the source SI and the destination D1 as the cumulative throughput, at this given time, for a connec-
shown in the figure, the TCP session is now broken up into tion iis t,. We also define T,to be the cumulative throughput
two segments; the first terminates at Pl and the second orig- that connection i would have enjoyed if it had been the only
inates at PI. This division causes streaming to occur in two connection that was active. We define the unfaimess to be
stages. During the first stage data is streamed from SI to PI
and during the second stage data is streamed from P1 to DI.
These two e v e n t s would be mutually exclusive since, when
node PI is streaming data l o DI, it will be unable to receive
packets from SI, and when P1 is receiving packets from SI,
it cannot stream data toD1. Thus, a second Split TCPsession
(like one from S2 to D2) can simultaneously stream packets
If all the 9
are between 0 and 1, then the value of U is also
between 0 and 1. Note that U = 1is the maximum unfair-
in the geographical vicinity of the segment from S1 to P1,
ness, while U = 0 is fair. The reason for taking the ratio of
(that is from S2 to P2), as PI is in the process of delivering
the throughputs during simultaneous and isolated operations
its packets to D1. Similarly, as SI streams packets to PI, P2
is to measure the unfairness that occurs due to the presence
can complete its delivery of packets to D2. Thus, by splitting
of other simultaneous connections’. For example, if k = 2,
TCP what we essentially ensure is that only small geographi-
thenU=I%-$\.
cal areas in the network are captured for MAC access and for
short times, and therefore, we improve fairness among the A proxy node upon receiving a data packet,frsr forwards
TCP sessions. The advantage is more pronounced for long the data packet to the next relay node and then generates a
TCP connections that contain multiple proxies. LACK message to be sent to the previous proxy (or source)’.
In our experiments,unless mentioned otherwise, we consider
We envision that proxies can be implemented with no per-
flow state. Every node would maintain a buffer that can store that the source of a TCP session is data-intensive, i.e., it al-
ways has packets to send. We conducted several experiments
the aggregated packets from every flow for which the node is
varying the inter-proxy distance and found that an inter-proxy
a proxy. It also maintains a local congesrion window, that is
a reflection the amount of space lee in this aggregate buffer. lo spacc comtrainfs we cannot provide funher dctails on possible
The source would then regulate its rate of flow based upon implmcntation methods: thcw are provided in (71
’We use this mainly IO dmonmdts ulat our method alleviates the unfair-
I A similar reasoning may be msdc if one of the connsctions is heavily ness that arises due to the capture cKmt of lhc IEEE 802. I I MAC protocol.
loaded as compared with the other. 8Revsrrhg thc ordn ofthcss W O-fS multsd in reduced prformansc.
140
Authorized licensed use limited to: VIT University. Downloaded on October 12,2021 at 17:37:27 UTC from IEEE Xplore. Restrictions apply.
connections is cut off,the other two connections hogged the
channel with their own data.
During the time that the connection I encountered a failed
link, the throughput achieved by this connection by using
TCP with no proxies, is zero. The two other connections,
....
on the other hand, enjoy an enhanced throughput at its ex-
e pense. By using our unfairness metric defined in Equation
1, we see that this causes an average unfairness of 0.24. On
the other hand, when Split-TCP was used, Connection I con-
0 10 2D m 40 % Bo 70 en 90rw tinued to get a fair share of the throughput in spite o f the
Tim
link failure. The value of the unfairness metric was now re-
Fig. 3. vanation oftotal packets received ofa wid c~nneeiimwith time duced to 0.13. Although we have shown results from one of
in a mobile ad hoc n c m r k our experiments, this improvement in throughput and fairness
was typical for all simulation NnS. These simulations were
run with the number of nodes varying from 50 to 100, and
distance of 3 or more is good for throughput and and inter- the maximum speed of each node varying from m/s to 2o
proxy distance of approximately 5 or less is good for the fair- mis. The average (over all simulations) increase in through.
ness. Hence, in the following experiments. we use an inter-
put was about 12%. The average (over all simulations) value
proxy distance Of 3 , 4 or 5 unless explicitly stated otherwise. of the metric observed for TCP (without proxies)
We consider a mobile network Of 50 nodes VIead uni- was 0.47, while the average (over all simulations) value of
fomly in a lkm x Ikm square region. Each node can move the metric for TCP with proxies (inter-proxy distance = 3 or
with a speed which is chosen according to a uniform distribu-
tion and varies from 0 to 10 m / s (the random waypoint model
is used). We arbitrarily choose source-destination pairs and
TCP sessions are set up between them. We run every scenario
for both TCP and Split-TCP. We run several experiments with
-
4 hops) was 0.17,
a m
ann.c(m4-
moneOonZ ~.....
141
Authorized licensed use limited to: VIT University. Downloaded on October 12,2021 at 17:37:27 UTC from IEEE Xplore. Restrictions apply.
for this experiment we had two TCP connections, connection time. Thus, the larger the number of hops, the higher the
1 and connection 2. Connection 2 began slightly later than contention, and hence, lower the throughput.
connection 1. We see that connection 2 is almost at a stand- Split-TCP is robust to proxy failures. We have also per-
still until connection I completed sending all its data. On the formed experiments in which proxies failed or became dis-
other hand, when Split TCP was used, as shown in Figure 5, connected from the network. In such cases, the end-to-end
the throughput of connection 2 was about the same as that of ACKs helped in end-to-end packet recovery. It was observed
connection 1. that even if proxies fail, the overall throughput is higher than
We recall our discussion of the effect of the IEEE 802.1 1 that of regular TCP (provided that the rate of proxy failure is
MAC protocol on TCP from section 11. Since connection 1 not too high i.e., occur only ahout 5 % ofthe time) 9 , while at
began earlier, it captured the channel to begin with. Con- the same time, the end-to-end reliability of TCP is preserved.
nection 2, continually experienced exponential hack-off at Iv. CONCLUSIONS
the MAC layer. As explained in section 11 (Figure 2), Split-
TCP helped alleviate this effect and improved the share of the In this paper, we propose a new promising approach to
channel access that was available to connection 2. improve the performance of TCP in terms of faimess and
throughput in MANETs. We propose to achieve this by intro-
ducing proxy agents that split TCP into localized segments.
Our new version ofTCP is called Split TCP. The proxy agents
facilitate the separation of the congestion control and the end-
to-end reliability semantics of TCP. When a link failure oc-
curs in one segment, sustained throughput is possible on the
other segments. Since, link failures are more probable in
longer connections than in shorter ones, the introduction of
proxy agents especially benefits longer connections. To sum-
marize, TCP proxies succeed in terms of achieving a higher
I TCP throughput and providing better faimess to longer TCP
0 50 100 150 200 connections with respect to shorter ones. In addition, the in-
0"ratiO"
troduction of proxies help alleviate the channel caphrre ef-
Fig. 6.Ef fccti ofduration (secs) and number of hops on throughput ( K B l s ) : fect that occurs if the IEEE 802.11 MAC protocol is used. If
TCP with proxies every t h e haps plain TCP is used, the channel capture occurs over the entire
region occupied by a heavily loaded TCP session whereas
with Split-TCP the effects are now localized. We show by
means of simulations that Split TCP can improve both the
faimess among TCP connections (by a factor of 60%) and
the throughput (by about 5% to 40%) of individual TCP con-
nections.
REF ER EN C ES
[I] G. HollandandN. Vaidya,"AnalyrisofTCPPsrformanccoverMohilo
t
Ad Hoc Networks; in lEEWACMMO8ICO~,Augllst 1999.
[2] K.Chandran et nl, "A Feedback based Scheme far Improving of TCP
25 Performancc in Ad hoc Wireless NetworLs; in IEEE Personol Com-
I munlcorionr Mqmlne, February 2001.
'50 100 150 ZOO [3] S. Xu and 1. S-i, "Dws thc IEEE 802.1 I .MAC Protocol W?*
Dvmllan
Well in Multihop Winless ad hoc nerwo*r," m IEEE Communlco-
lions. June 2001
141 :'Draft lntemalional Smdard lSO/lEC 8802.1 I IEEE P8.2.1 liDI0"
Fig. 7.Ef fcct Of Duration (sec) and Numbcr o f hops on Throughput (KB/r): inUNMANSrandanls Commifteeo/fheIEEEdompuierSoclely,Jd-
TCP Without Pmrics uary 1999.
[5] H. Bal+rishnan V. N.Padmanahhan S. Seshan and R. H. Kah, ,'A
comparison ofnkchanirms for impro;ing TCP ~Tfomanceoverw~rc-
Next, in Figures 6 and 7, we plot the throughput of a con- IFSS links,"IEEE/A CM Tlunracrionr on N e w r k n g , MI. 5 , no. 6, pp.
nection as a function ofthe connection duration and its length 1561769, 1991.
[a] A. Baloe and B.Badrinalh "I-TCP Indirecl TCP for Mobile HOBS"
for both TCP and Split-TCP. As expected, longer connec- m 15th Internatlono1 Conkmnenmce ob Disfribwted Computing Sy&s
tions benefit by using Split-TCP (for a connection that is 14
hops in length, Split-TCP provides a throughput gain of about
[,,Technical
$,Koppa;ty
ICOCS) 1995. spor.TcpforAd Hoc
Repon., 2002.
uc
16%). The connection duration to have little on [El ns 2.0 Network SimulatOr, ''hnp:lIwww.isi.=du~~ns.~'.
[91 Raj Jain, The arf ofcompufer systems onolysix, John W i l q and Sons,
the performance, regardless of whether TCP or Split-TCP is 1991.
[IO] Y.KoandN. Vaidya, "Using Laation lnformationin W i ~ l c s Ad s Ha:
used, Notice that a TCP connection of Shorter length always Networks," in IEEE khlnrlnr IchnalogV Confi~nce,1999.
outperforms a TCP connection that is longer. This is due to
the fact that there is always some contention among adjacent
links (whether proxies are used or not) for channel access m
9 ~ " e lack of spa- we do not present those results h e x .
I42
Authorized licensed use limited to: VIT University. Downloaded on October 12,2021 at 17:37:27 UTC from IEEE Xplore. Restrictions apply.