International Journal of Computer Applications (0975 – 8887)
                                                                                                   Volume 52– No.13, August 2012


        Comparative Analysis of Different TCP Variants in
                    Mobile Ad-Hoc Network
     Hrituparna Paul                  Anish Kumar Saha               Partha Pratim Deb                   Partha Sarathi
     Research Scholar                    Asstt. Professor               M.Tech CSE                       Bhattacharjee
     Dept. of Comp. Sc.             Dept. of Comp Sc & Engg.         Netaji Subhash Engg              Research Scholar
      Assam University                    N.I.T Agartala                    College                  Dept. of Comp. Sc.
                                                                     West Bengal, India             Assam University, Silchar


ABSTRACT                                                              This protocol is a standard networking protocol on the internet
Mobile Ad-Hoc Network is an autonomous group of mobile                and is the most widely used transport protocol for data
users that communicate using wireless links with no support           services like file transfer, e-mail and WWW browser. It is
from any pre-existing infrastructure network and used as a            primarily designed for wire-line networks, faces performance
highly reliable end-to-end protocol for transporting                  degradation when applied to the ad hoc scenario. In addition,
applications. But in wireless networks suffers from significant       various routing protocols behave differently over the variants
throughput degradation and delays. It uses Congestion Control         of TCP. It is essential to understand the performance of
and Avoidance algorithms which degrades end-to-end                    different MANET routing protocols under TCP variants. In
performance in wireless system. In this paper we have                 this paper, we have done a performance analysis of MANET
analyzed the performance of tcp algorithms with AODV, DSR             Routing Protocols over different TCP Variants.
and TORA for throughput. The effect of throughput on the              The paper is organised as follows. Section 1 provides
TCP variants New Reno, Reno and Tahoe with different node             Introduction. Section 2 describes the Standard TCP
scenarios was studied.                                                congestion control algorithms. Section 3 describes the various
                                                                      TCP variants. Section 4 presents the simulation setup of our
Keyword                                                               work. Finally Section 5 gives the future scope of our work
TCP Variants, Throughput.                                             concludes the paper.

1. INTRODUCTION                                                       2. TCP CONGESTION CONTROL
Mobile Ad Hoc Networks (MANETs) are wireless mobile                   ALGORITHMS
nodes or an autonomous group of mobile users that                     The four algorithms, Slow Start, Congestion Avoidance, Fast
cooperatively form a network without infrastructure. This             Retransmit and Fast Recovery [4][5] are described below:
network allows devices to create a network on demand
without prior coordination or configuration and nodes within a        2.1. Slow Start [9]
MANET are involved in routing and forwarding information              Slow Start, a requirement for TCP software implementations
between neighbors.                                                    is a mechanism used by the sender to control the transmission
There is a direct communication among neighboring devices             rate, and also known as sender based flow control. This is
in MANETs but communication between non-neighboring                   accomplished through the return rate of acknowledgements
devices requires a routing algorithm. A lot of work has been          from the receiver. In other words, the rate of
done on routing protocols since they are critical to the              acknowledgements returned by the receiver determines the
functioning of ad-hoc networks [1], [2], [3] Within the two           rate at which the sender can transmit data.
categories of routing protocols described in literature:              When a TCP connection first begins, the Slow Start algorithm
Proactive and Reactive, it is more suited for highly mobile ad        initializes a congestion window to one segment, which is the
hoc networks due to its ability to cope with rapidly changing         maximum segment size (MSS) initialized by the receiver
network topologies. Because there is no coordination or               during the connection establishment phase and when
configuration prior to setup of a MANET, there are several            acknowledgements are returned by the receiver, the
challenges and these challenges include routing packets in an         congestion window increases by one segment for each
environment where the topology is changing frequently and             acknowledgement returned. In this way, the sender can
the task of locating a node and maintain a path to it becomes         transmit the minimum of the congestion window and the
increasingly in the face of node mobility.                            advertised window of the receiver, which is simply called the
Transport Control Protocol /Internet Protocol (TCP/IP) is a           transmission window.
connection oriented protocol of the transport layer. It provides      At some point the congestion window may become too large
features like flow control, reliability and congestion control. It    for the network or network conditions may change such that
has been very effective in data transmission delivery and have        packets may be dropped. Packets lost will trigger a timeout at
also developed variants to possess the possibility to increase        the sender and when this happens, the sender goes into
performance and multiple packet loss recovery.                        congestion avoidance mode.
Today, the TCP is extensively tuned to provide high-quality
performance in the conventional wired network. In fact, the           2.2. Congestion Avoidance [9]
TCP is responsible for providing reliable data transport in the       During data transfer phase of a TCP connection the Slow Start
Internet. However, it cannot offer reliable service while using       algorithm is used. There may be a point during Slow Start that
e-mail, internet search and file transmission in a MANET.             the network is forced to drop one or more packets due to



                                                                                                                                  19
International Journal of Computer Applications (0975 – 8887)
                                                                                                      Volume 52– No.13, August 2012

overload or congestion. When this happens, Congestion                    based on a principle of conservation of packets, i.e. if the
Avoidance is used to slow the transmission rate and Slow                 connection is running at the available bandwidth capacity then
Start is used in conjunction with Congestion Avoidance as the            a packet is not injected into the network unless a packet is
means to get the data transfer going again so it doesn’t slow            taken out as well. It implements this principle by using the
down and stay slow.                                                      acknowledgements to clock outgoing packets because an
In the Congestion Avoidance [9] algorithm a retransmission               acknowledgement means that a packet was taken off the wire
timer expiring or the reception of duplicate ACKs can                    by the receiver. It also maintains a congestion window CWD
implicitly signal the sender that a network congestion                   to reflect the network capacity. It suggests that whenever a
situation is occurring. The sender immediately sets its                  TCP connection starts or re-starts after a packet loss it should
transmission window to one half of the current window size               go through a procedure called slow-start. Reason for this
(the minimum of the congestion window and the receiver’s                 procedure is that an initial burst might overwhelm the network
advertised window size), but to at least two segments. If                and the connection might never get started.
congestion was indicated by a timeout, the congestion                    The congestion window size is multiplicatively increased that
window is reset to one segment, which automatically puts the             is it becomes double for each transmission until it encounters
sender into Slow Start mode. If congestion was indicated by              congestion. Slow start suggests that the sender set the
duplicate ACKs, the Fast Retransmit and Fast Recovery                    congestion window to 1 and then for each ACK received it
algorithms are invoked.                                                  increase the CWD by 1. So in the first round trip time (RTT)
As data is received during Congestion Avoidance, the                     we send 1 packet, in the second we send 2 and in the third we
congestion window is increased. However, Slow Start is only              send 4. Thus we increase exponentially until we lose a packet
used up to the halfway point where congestion originally                 which is a sign of congestion. When we encounter congestion
occurred. This halfway point was recorded earlier as the new             we decreases our sending rate and we reduce congestion
transmission window. After this halfway point, the congestion            window to one. And start over again. The important thing is
window is increased by one segment for all segments in the               that Tahoe detects packet losses by timeouts. Sender is
transmission window that are acknowledged. This mechanism                notified that congestion has occurred based on the packet loss.
will force the sender to more slowly grow its transmission
rate, as it will approach the point where congestion had                 3.2. TCP Reno
previously been detected.                                                This RENO retains the basic principle of Tahoe, such as slow
                                                                         starts and the coarse grain retransmit timer [8]. However it
2.3. Fast Retransmit and Fast Recovery [9]                               adds some intelligence over it so that lost packets are detected
Whenever a packet segment is transmitted, TCP sets a timer               earlier and the pipeline is not emptied every time a packet is
each time and thus it ensures the reliability. TCP retransmits           lost. Reno requires that we receive immediate
the packet, if it does not obtain any acknowledgement within             acknowledgement whenever a segment is received. The logic
the fixed time-out interval and the reason for not getting any           behind this is that whenever we receive a duplicate
ACKs within a specific duration is due to either the packet              acknowledgment, then his duplicate acknowledgment could
loss or the network congestion. Therefore the TCP sender                 have been received if the next segment in sequence expected,
implements the fast retransmit algorithm for identifying and             has been delayed in the network and the segments reached
also repairing the loss. This fast retransmit phase is applied           there out of order or else that the packet is lost. If we receive a
mainly based on the incoming duplicate ACKs and as TCP is                number of duplicate acknowledgements then that means that
not able to understand whether a packet loss or an out-of-               sufficient time have passed and even if the segment had taken
order segment causes the generation of the duplicate ACK, it             a longer path, it should have gotten to the receiver by now.
waits for more duplicate ACKs to be received. Because in                 There is a very high probability that it was lost. So Reno
case of out-of order segment, one or two duplicate ACKs will             suggests Fast Re- Transmit. Whenever we receive 3 duplicate
be received before the reordered segment is processed and on             ACK‘s we take it as a sign that the segment was lost, so we
the other hand, if there are at least three duplicate ACKs in a          re-transmit the segment without waiting for timeout.
row, it can be assumed that a segment has been lost. In that             Thus we manage to re-transmit the segment with the pipe
case, the sender will retransmit the missing data packets for a          almost full. Another modification that RENO makes is in that
retransmission timer to expire without waiting.                          after a packet loss, it does not reduce the congestion window
                                                                         to 1. Since this empties the pipe. It enters into an algorithm
After the missing segment is retransmitted, the TCP will                 which we call Fast-Recovery.
initiate the fast recovery mechanism until a non-duplicate
ACK arrives. The fast recovery algorithm is an improvement               3.3. TCP New Reno
of congestion control mechanism that ensures higher
                                                                         New RENO is a slight modification over TCP-RENO. It is
throughput even during moderate congestion and the receiver
                                                                         able to detect multiple packet losses and thus is much more
yields the duplicate ACK only when another segment is
                                                                         efficient that RENO in the event of multiple packet losses.
reached to it. Therefore this segment is kept in the receiver's
                                                                         Like RENO, New-RENO [7] also enters into fast retransmit
buffer and does not consume any network resources. This
                                                                         when it receives multiple duplicate packets, however it differs
means that data flow is still running in the network, and TCP is
reluctant to reduce the flow immediately by moving into the slow
                                                                         from RENO in that it doesn‘t exit fast recovery until all the
start phase. Thus, in that case in fast recovery algorithm, congestion   data which was out standing at the time it entered fast
avoidance phase is again invoked instead of slow start phase as soon     recovery is acknowledged. The fast recovery phase proceeds
as the fast retransmission mechanism is completed                        as in Reno, however when a fresh ACK is received then there
3. TCP VARIANTS                                                          are two cases

3.1. TCP Tahoe                                                                    If it ACK‘s all the segments which were outstanding
                                                                                   when we entered fast recovery then it exits fast
Tahoe [5] refers to the TCP congestion control algorithm
                                                                                   recovery and sets CWD to threshold value and
which was suggested by Van Jacobson in his paper. TCP is
                                                                                   continues congestion avoidance like Tahoe.



                                                                                                                                         20
International Journal of Computer Applications (0975 – 8887)
                                                                                                 Volume 52– No.13, August 2012

        If the ACK is a partial ACK then it deduces that the       Total time consumed by each protocol for sending the data
         next segment in line was lost and it re-transmits that     through New Reno, Reno and Tahoe is relatively smaller for
         segment and sets the number of duplicate ACKS              AODV followed by DSR and than TORA. That is TORA has
         received to zero. It exits Fast recovery when all the      worst throughput performance in each of the three cases for
         data in the window is acknowledged.                        MANET in 3 nodes. The cause behind the TORA less
                                                                    performance is considered as the reality of TORA working for
4. SIMULATION                                                       route recreation, maintenance and erasure, if dropping of the
We have evaluated the performance of different variants of          route occurs, that requires more time and have bad impact in
TCP using OPNET simulator. Here AODV, DSR and TORA                  the data performance.
are simulated with different TCP algorithms with different
scenarios (three, five node scenarios).                             In five nodes scenario five nodes working as clients to
                                                                    establish connection with a fixed node working as source, and
 In three node scenarios the throughput performance between         to transfer a file of the same size over each connection.
AODV and DSR at approximately 25 seconds, AODV has
better throughput performance over DSR and comparing                Comparing all the three graphs with each other we observe
AODV with TORA at the approximation of 95 sec, AODV                 that as the number of the nodes are increased approximately
provides better throughput performance, in all the three            75% (3 to 5), throughput has been decreased for every TCP
graphs.                                                             variant and each desired protocols.




                                      Fig:1 Throughput comparison in three nodes scenario




                                       Fig:2 Throughput comparison in five nodes scenario

5. CONCLUSION                                                       MANET. However simulation results for AODV with respect
It has been concluded that throughput performance of DSR            to New Reno, Reno and Tahoe depict that throughput is the
and TORA are minutely affected with increase in the number          same in all the cases, so our proposed solution in this case will
of nodes and due to mobility. In general, MANET could have          be New Reno as it offers multiple packet loss recovery.
dynamic number of nodes connectivity in mobility, so it’s
                                                                    For future work we propose to study the performance of these
important to realize that when the number of nodes is higher,
                                                                    TCP variants for different routing protocols such as OLSR,
DSR and TORA would be avoided. AODV has better
                                                                    DSDV. We would also like to expand the range of analysis by
throughput performance shown in all three figures as
                                                                    considering other new TCP's like HSTCP, TCP Westwood,
compared to DSR and TORA and is the best solution for
                                                                    TCP Veno, TCP Vegas etc.



                                                                                                                                  21
International Journal of Computer Applications (0975 – 8887)
                                                                                           Volume 52– No.13, August 2012


6. REFERENCES                                                 [5] JACOBSON, V. Congestion avoidance and control. In
[1] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand                 Proceedings of SIGCOMM ’88 (Stanford, CA, Aug.
    distance vector routing”, Proceedings of the 2nd IEEE          1988), ACM.
    Workshop on Mobile Computing Systems and                  [6] Laxmi Subedi, Mohamadreza Najiminaini, and Ljiljana
    Applications, New Orleans, LA, pp. 90-100, February            Trajkovi Performance Evaluation of TCP Tahoe, Reno,
    1999.                                                          Reno with SACK, and NewReno using OPNET Modeler.
[2] D. Johnson, D. Maltz and Y. Hu., “The dynamic source      [7] S.Floyd, T.Henderson “The New- Reno Modification to
     routing protocol for mobile ad hoc networks”, IETF            TCP’s Fast Recovery Algorithm” RFC 2582, Apr 1999.
     MANET Working Group, Internet Draft, 2003.
                                                              [8] O. Ait-Hellal, E.Altman “Analysis of TCP Reno and TCP
[3] M.K.J. Kumar and R.S. Rajesh, “Performance analysis of         Vegas”.
     MANET routing protocols in different mobility models”,
     IJCSNS International Journal of Computer Science and     [9]    Suhas Waghmare et. al “Comparative Analysis of
     Network Security, vol. 9 No.2, pp 22-29, Feb 2009              different TCP variants in a wireless environment”, 978-
                                                                    1-4244-8679-3/11 ©2011 IEEE

[4] K.Kathiravan, Dr. S. Thamarai Selvi, A.Selvam “Tcp
    Performance Analysis For Mobile Ad Hoc Network
    Using Ondemand Routing Protocols.




                                                                                                                        22

Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network

  • 1.
    International Journal ofComputer Applications (0975 – 8887) Volume 52– No.13, August 2012 Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Hrituparna Paul Anish Kumar Saha Partha Pratim Deb Partha Sarathi Research Scholar Asstt. Professor M.Tech CSE Bhattacharjee Dept. of Comp. Sc. Dept. of Comp Sc & Engg. Netaji Subhash Engg Research Scholar Assam University N.I.T Agartala College Dept. of Comp. Sc. West Bengal, India Assam University, Silchar ABSTRACT This protocol is a standard networking protocol on the internet Mobile Ad-Hoc Network is an autonomous group of mobile and is the most widely used transport protocol for data users that communicate using wireless links with no support services like file transfer, e-mail and WWW browser. It is from any pre-existing infrastructure network and used as a primarily designed for wire-line networks, faces performance highly reliable end-to-end protocol for transporting degradation when applied to the ad hoc scenario. In addition, applications. But in wireless networks suffers from significant various routing protocols behave differently over the variants throughput degradation and delays. It uses Congestion Control of TCP. It is essential to understand the performance of and Avoidance algorithms which degrades end-to-end different MANET routing protocols under TCP variants. In performance in wireless system. In this paper we have this paper, we have done a performance analysis of MANET analyzed the performance of tcp algorithms with AODV, DSR Routing Protocols over different TCP Variants. and TORA for throughput. The effect of throughput on the The paper is organised as follows. Section 1 provides TCP variants New Reno, Reno and Tahoe with different node Introduction. Section 2 describes the Standard TCP scenarios was studied. congestion control algorithms. Section 3 describes the various TCP variants. Section 4 presents the simulation setup of our Keyword work. Finally Section 5 gives the future scope of our work TCP Variants, Throughput. concludes the paper. 1. INTRODUCTION 2. TCP CONGESTION CONTROL Mobile Ad Hoc Networks (MANETs) are wireless mobile ALGORITHMS nodes or an autonomous group of mobile users that The four algorithms, Slow Start, Congestion Avoidance, Fast cooperatively form a network without infrastructure. This Retransmit and Fast Recovery [4][5] are described below: network allows devices to create a network on demand without prior coordination or configuration and nodes within a 2.1. Slow Start [9] MANET are involved in routing and forwarding information Slow Start, a requirement for TCP software implementations between neighbors. is a mechanism used by the sender to control the transmission There is a direct communication among neighboring devices rate, and also known as sender based flow control. This is in MANETs but communication between non-neighboring accomplished through the return rate of acknowledgements devices requires a routing algorithm. A lot of work has been from the receiver. In other words, the rate of done on routing protocols since they are critical to the acknowledgements returned by the receiver determines the functioning of ad-hoc networks [1], [2], [3] Within the two rate at which the sender can transmit data. categories of routing protocols described in literature: When a TCP connection first begins, the Slow Start algorithm Proactive and Reactive, it is more suited for highly mobile ad initializes a congestion window to one segment, which is the hoc networks due to its ability to cope with rapidly changing maximum segment size (MSS) initialized by the receiver network topologies. Because there is no coordination or during the connection establishment phase and when configuration prior to setup of a MANET, there are several acknowledgements are returned by the receiver, the challenges and these challenges include routing packets in an congestion window increases by one segment for each environment where the topology is changing frequently and acknowledgement returned. In this way, the sender can the task of locating a node and maintain a path to it becomes transmit the minimum of the congestion window and the increasingly in the face of node mobility. advertised window of the receiver, which is simply called the Transport Control Protocol /Internet Protocol (TCP/IP) is a transmission window. connection oriented protocol of the transport layer. It provides At some point the congestion window may become too large features like flow control, reliability and congestion control. It for the network or network conditions may change such that has been very effective in data transmission delivery and have packets may be dropped. Packets lost will trigger a timeout at also developed variants to possess the possibility to increase the sender and when this happens, the sender goes into performance and multiple packet loss recovery. congestion avoidance mode. Today, the TCP is extensively tuned to provide high-quality performance in the conventional wired network. In fact, the 2.2. Congestion Avoidance [9] TCP is responsible for providing reliable data transport in the During data transfer phase of a TCP connection the Slow Start Internet. However, it cannot offer reliable service while using algorithm is used. There may be a point during Slow Start that e-mail, internet search and file transmission in a MANET. the network is forced to drop one or more packets due to 19
  • 2.
    International Journal ofComputer Applications (0975 – 8887) Volume 52– No.13, August 2012 overload or congestion. When this happens, Congestion based on a principle of conservation of packets, i.e. if the Avoidance is used to slow the transmission rate and Slow connection is running at the available bandwidth capacity then Start is used in conjunction with Congestion Avoidance as the a packet is not injected into the network unless a packet is means to get the data transfer going again so it doesn’t slow taken out as well. It implements this principle by using the down and stay slow. acknowledgements to clock outgoing packets because an In the Congestion Avoidance [9] algorithm a retransmission acknowledgement means that a packet was taken off the wire timer expiring or the reception of duplicate ACKs can by the receiver. It also maintains a congestion window CWD implicitly signal the sender that a network congestion to reflect the network capacity. It suggests that whenever a situation is occurring. The sender immediately sets its TCP connection starts or re-starts after a packet loss it should transmission window to one half of the current window size go through a procedure called slow-start. Reason for this (the minimum of the congestion window and the receiver’s procedure is that an initial burst might overwhelm the network advertised window size), but to at least two segments. If and the connection might never get started. congestion was indicated by a timeout, the congestion The congestion window size is multiplicatively increased that window is reset to one segment, which automatically puts the is it becomes double for each transmission until it encounters sender into Slow Start mode. If congestion was indicated by congestion. Slow start suggests that the sender set the duplicate ACKs, the Fast Retransmit and Fast Recovery congestion window to 1 and then for each ACK received it algorithms are invoked. increase the CWD by 1. So in the first round trip time (RTT) As data is received during Congestion Avoidance, the we send 1 packet, in the second we send 2 and in the third we congestion window is increased. However, Slow Start is only send 4. Thus we increase exponentially until we lose a packet used up to the halfway point where congestion originally which is a sign of congestion. When we encounter congestion occurred. This halfway point was recorded earlier as the new we decreases our sending rate and we reduce congestion transmission window. After this halfway point, the congestion window to one. And start over again. The important thing is window is increased by one segment for all segments in the that Tahoe detects packet losses by timeouts. Sender is transmission window that are acknowledged. This mechanism notified that congestion has occurred based on the packet loss. will force the sender to more slowly grow its transmission rate, as it will approach the point where congestion had 3.2. TCP Reno previously been detected. This RENO retains the basic principle of Tahoe, such as slow starts and the coarse grain retransmit timer [8]. However it 2.3. Fast Retransmit and Fast Recovery [9] adds some intelligence over it so that lost packets are detected Whenever a packet segment is transmitted, TCP sets a timer earlier and the pipeline is not emptied every time a packet is each time and thus it ensures the reliability. TCP retransmits lost. Reno requires that we receive immediate the packet, if it does not obtain any acknowledgement within acknowledgement whenever a segment is received. The logic the fixed time-out interval and the reason for not getting any behind this is that whenever we receive a duplicate ACKs within a specific duration is due to either the packet acknowledgment, then his duplicate acknowledgment could loss or the network congestion. Therefore the TCP sender have been received if the next segment in sequence expected, implements the fast retransmit algorithm for identifying and has been delayed in the network and the segments reached also repairing the loss. This fast retransmit phase is applied there out of order or else that the packet is lost. If we receive a mainly based on the incoming duplicate ACKs and as TCP is number of duplicate acknowledgements then that means that not able to understand whether a packet loss or an out-of- sufficient time have passed and even if the segment had taken order segment causes the generation of the duplicate ACK, it a longer path, it should have gotten to the receiver by now. waits for more duplicate ACKs to be received. Because in There is a very high probability that it was lost. So Reno case of out-of order segment, one or two duplicate ACKs will suggests Fast Re- Transmit. Whenever we receive 3 duplicate be received before the reordered segment is processed and on ACK‘s we take it as a sign that the segment was lost, so we the other hand, if there are at least three duplicate ACKs in a re-transmit the segment without waiting for timeout. row, it can be assumed that a segment has been lost. In that Thus we manage to re-transmit the segment with the pipe case, the sender will retransmit the missing data packets for a almost full. Another modification that RENO makes is in that retransmission timer to expire without waiting. after a packet loss, it does not reduce the congestion window to 1. Since this empties the pipe. It enters into an algorithm After the missing segment is retransmitted, the TCP will which we call Fast-Recovery. initiate the fast recovery mechanism until a non-duplicate ACK arrives. The fast recovery algorithm is an improvement 3.3. TCP New Reno of congestion control mechanism that ensures higher New RENO is a slight modification over TCP-RENO. It is throughput even during moderate congestion and the receiver able to detect multiple packet losses and thus is much more yields the duplicate ACK only when another segment is efficient that RENO in the event of multiple packet losses. reached to it. Therefore this segment is kept in the receiver's Like RENO, New-RENO [7] also enters into fast retransmit buffer and does not consume any network resources. This when it receives multiple duplicate packets, however it differs means that data flow is still running in the network, and TCP is reluctant to reduce the flow immediately by moving into the slow from RENO in that it doesn‘t exit fast recovery until all the start phase. Thus, in that case in fast recovery algorithm, congestion data which was out standing at the time it entered fast avoidance phase is again invoked instead of slow start phase as soon recovery is acknowledged. The fast recovery phase proceeds as the fast retransmission mechanism is completed as in Reno, however when a fresh ACK is received then there 3. TCP VARIANTS are two cases 3.1. TCP Tahoe  If it ACK‘s all the segments which were outstanding when we entered fast recovery then it exits fast Tahoe [5] refers to the TCP congestion control algorithm recovery and sets CWD to threshold value and which was suggested by Van Jacobson in his paper. TCP is continues congestion avoidance like Tahoe. 20
  • 3.
    International Journal ofComputer Applications (0975 – 8887) Volume 52– No.13, August 2012  If the ACK is a partial ACK then it deduces that the Total time consumed by each protocol for sending the data next segment in line was lost and it re-transmits that through New Reno, Reno and Tahoe is relatively smaller for segment and sets the number of duplicate ACKS AODV followed by DSR and than TORA. That is TORA has received to zero. It exits Fast recovery when all the worst throughput performance in each of the three cases for data in the window is acknowledged. MANET in 3 nodes. The cause behind the TORA less performance is considered as the reality of TORA working for 4. SIMULATION route recreation, maintenance and erasure, if dropping of the We have evaluated the performance of different variants of route occurs, that requires more time and have bad impact in TCP using OPNET simulator. Here AODV, DSR and TORA the data performance. are simulated with different TCP algorithms with different scenarios (three, five node scenarios). In five nodes scenario five nodes working as clients to establish connection with a fixed node working as source, and In three node scenarios the throughput performance between to transfer a file of the same size over each connection. AODV and DSR at approximately 25 seconds, AODV has better throughput performance over DSR and comparing Comparing all the three graphs with each other we observe AODV with TORA at the approximation of 95 sec, AODV that as the number of the nodes are increased approximately provides better throughput performance, in all the three 75% (3 to 5), throughput has been decreased for every TCP graphs. variant and each desired protocols. Fig:1 Throughput comparison in three nodes scenario Fig:2 Throughput comparison in five nodes scenario 5. CONCLUSION MANET. However simulation results for AODV with respect It has been concluded that throughput performance of DSR to New Reno, Reno and Tahoe depict that throughput is the and TORA are minutely affected with increase in the number same in all the cases, so our proposed solution in this case will of nodes and due to mobility. In general, MANET could have be New Reno as it offers multiple packet loss recovery. dynamic number of nodes connectivity in mobility, so it’s For future work we propose to study the performance of these important to realize that when the number of nodes is higher, TCP variants for different routing protocols such as OLSR, DSR and TORA would be avoided. AODV has better DSDV. We would also like to expand the range of analysis by throughput performance shown in all three figures as considering other new TCP's like HSTCP, TCP Westwood, compared to DSR and TORA and is the best solution for TCP Veno, TCP Vegas etc. 21
  • 4.
    International Journal ofComputer Applications (0975 – 8887) Volume 52– No.13, August 2012 6. REFERENCES [5] JACOBSON, V. Congestion avoidance and control. In [1] C.E. Perkins and E.M. Royer, “Ad-hoc On-Demand Proceedings of SIGCOMM ’88 (Stanford, CA, Aug. distance vector routing”, Proceedings of the 2nd IEEE 1988), ACM. Workshop on Mobile Computing Systems and [6] Laxmi Subedi, Mohamadreza Najiminaini, and Ljiljana Applications, New Orleans, LA, pp. 90-100, February Trajkovi Performance Evaluation of TCP Tahoe, Reno, 1999. Reno with SACK, and NewReno using OPNET Modeler. [2] D. Johnson, D. Maltz and Y. Hu., “The dynamic source [7] S.Floyd, T.Henderson “The New- Reno Modification to routing protocol for mobile ad hoc networks”, IETF TCP’s Fast Recovery Algorithm” RFC 2582, Apr 1999. MANET Working Group, Internet Draft, 2003. [8] O. Ait-Hellal, E.Altman “Analysis of TCP Reno and TCP [3] M.K.J. Kumar and R.S. Rajesh, “Performance analysis of Vegas”. MANET routing protocols in different mobility models”, IJCSNS International Journal of Computer Science and [9] Suhas Waghmare et. al “Comparative Analysis of Network Security, vol. 9 No.2, pp 22-29, Feb 2009 different TCP variants in a wireless environment”, 978- 1-4244-8679-3/11 ©2011 IEEE [4] K.Kathiravan, Dr. S. Thamarai Selvi, A.Selvam “Tcp Performance Analysis For Mobile Ad Hoc Network Using Ondemand Routing Protocols. 22