Computer Network Gate
Computer Network Gate
9
International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 13, December 2013
and increase it by one every time it meets a new node and (AWND) in the TCP header so that a fast sender does not
retransmit it to update other packets also. This process is overwhelm a slow receiver [5].
repeated until all the nodes in the network receives a copy of
the update packet with a corresponding metric. If any node 4.3 Connection control
receives multiple update packets for a same destination, the To manage the dropped packets due to full buffer, a
routes with more recent sequence numbers are always congestion window size is also maintained called CWND.
preferred. If the update packets have the same sequence The sending window is taken as being the minimum of the
number with the same node, the update packet with the AWND and the CWND.
smallest metric will be used.
4.4 Connection Establishment and
4. TCP Termination
Transport layer is made for process to process delivery, it TCP connection starts with a three way handshake protocol.
deliver packets from one process to another. Transmission Firstly the receiver sends the SYN seq=x message to receiver.
Control Protocol (TCP) is a connection oriented point-to-point When the receiver receives the message it responds with a
protocol. It creates a virtual connection between two TCPs to new sequence number y and acknowledgement message as
send data. It also uses flow and error control mechanism at SYN seq= y, ACK x+1. When the sender receives it, it
transport level. It is extensively used in the Internet. acknowledges receiver with the ACK y+1 stating that
acknowledgment is received. Thus sender and receiver
4.1 Reliability perform a three way communication between them. In the first
TCP is a reliable as it guarantees that all the packets that were step a connection is established between sender and receiver
send to the destination have reached and are in the order as then connection is maintained by the receiver until the sender
they were sent.TCP takes care of this by using receives the acknowledgement and releases the connection
acknowledgements. Whenever a packet is received a called as connection termination. This is also called as three
acknowledgement is sent to the sender that packet is received. way handshaking mechanism. This is done so that two nodes
If the acknowledgement is not received by the sender it which are attempting to communicate, can exchange the
retransmits the packets after a time period maintained by the parameters of the network TCP socket connection before
timer. transmitting data.
4.2 Flow control 4.5 Parameters that affect the performance
In this mechanism, a window of segments (certain number of
segments) is transmitted at once. Each segment has a of TCP in a hybrid environment
sequence number. The receiver can acknowledge more than The parameters are as follows:
one segment at a time by acknowledging the highest one 4.5.1 Bandwidth Limitation
received, meaning that all the previous segments were
Wireless wide area networks offer limited raw bit rates which
successfully transmitted. And the size of the TCP window is
informed to the sender by a field called the advertised window have to be shared between several users whereas wireless
LAN offers sufficient bandwidth [14].
Network Messages
Figure 1. Three way handshake between TCP sender and receiver [7].
10
International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 13, December 2013
4.5.2 Longer Latency Delay a need to stay connected to the internet all the time. Mobile IP
Wireless media exhibit longer latency delays than wired ones helps in tracking hosts without a need to change their IP
[13], this affects TCP throughput and increases the interactive address[1].
delays perceived by the user [14].
6.1 Working of Mobile IP
4.5.3 Vulnerable Transmission Losses Mobile IP can be demonstrated by its three major functions as
Transmission losses are more in wireless media, so there is a AGENT DISCOVERY, REGISTRATION, TUNNELING.
need to find a solution which aims at alleviating this
6.1.1 Agent Discovery
deficiency [14].
11
International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 13, December 2013
10
20
30
40
50
60
70
80
90
100
10, 20, 30, 40, 50,60, 70, 80, 90, 100
Pause time
sec
Terrain Area 100 m. x 100 m., 1000 m. x 1000 m.
Traffic type Constant Bit Rate, FTP Figure 3: Packet delivery ratio versus pause time
Packet size 512 bytes
This line graph illustrates the average packet delivery ratio
MAC type IEEE 802.11b over pause time by using TCP and UDP as the traffic modes.
Antenna type Omni-Antenna
Radio propagation 8.3 Total Packet Dropped
method Two Ray Ground The total number of packet dropped is calculated by
subtracting the number of packet send to number of packet
received.
8. SIMULATION RESULTS AND 50
ANALYSIS
8.1 Average end to end delay 40
It’s defined as time taken by a packet to reach from source to
destination that is the time the packet is received minus the
time it was generated at source. 30
tcp
35 20 udp
30 10
25
0
20 1 2 3 4 5 6 7 8 9 10
15
tcp Figure 4: Total Packet Dropped versus pause time
10
ud This line graph illustrates the total packet dropped during
5 p simulation over pause time by using TCP and UDP as the
traffic modes.
0
10 20 30 40 50 60 70 80 90 100 8.4 Throughput
Throughput is the average rate of successful packets delivered
over a communication channel. This data may be delivered
Figure 2: Average end to end delay versus pause time over a physical or logical link, or pass through a certain
network node.
This line graph illustrates the end to end delay over pause
time by using TCP and UDP as the traffic modes
12
International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 13, December 2013
30
40
50
60
70
80
90
100
IJCATM : www.ijcaonline.org 13