Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks

Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks

M. Chandrasekaran (Directorate of Technical Education, India) and R. S.D. Wahida Banu (Government College of Engineering, India)
DOI: 10.4018/978-1-60566-148-3.ch006
OnDemand PDF Download:


This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These generalize the Additive Increase and Multiplicative Decrease (AIMD) algorithms used for the TCP connections. These algorithms provide additive increase using a polynomial of the inverse of the current window size and provide multiplicative decrease using the polynomial of the current window size. There are infinite numbers of TCP-compatible polynomial algorithms by assuming polynomial of different order. This chapter analyses the interaction between the two models (named as MIMD-Poly and PIPD-Poly) of these generalized algorithms, for the wired (with unicast and multicast) and wireless TCP networks. TCP compatibility of these algorithms is evaluated using the simulations of the implementations of the proposed two models. Simulations are done using ns2, a discrete event simulator. The model MIMD-Poly is proved to be TCP-compatible. The results of simulation are compared with that of the TCP variants such as TCP/Tahoe, TCP/Reno, TCP/New Reno, and TCP/Vegas. The Comparison shows that both algorithms perform better in terms of throughput.
Chapter Preview


During the last decade, computer networks have been growing very tremendously. Large number of computers gets connected to both private and public networks. In most of these networks the protocol stack used is TCP/IP. In spite of the rapid growth and explosive increase in traffic demand computer networks in general, Internet in particular is still working without collapse.

Also the growth of the Internet has sparked the demand of several applications, which require the stability of the Internet. For achieving such a success and to have the stability of Internet, mechanisms are developed to reduce transmission errors, to provide better bandwidth sharing of sources that use common bottleneck links, to reduce the Round Trip Time (RTT) and mainly to provide the congestion control by the transport layer protocol i.e. TCP (Transmission Control Protocol). TCP’s end-to-end congestion control mechanism reacts to packet loss by adjusting the number of outstanding unacknowledged data segments allowed in the network (Jacobson, 1988; Widmer et al., 2001). Such algorithms are implemented in its protocol, TCP. (Comer, 1991; Stevens, 1994; Allman & Paxson, 1999). In the existing algorithms, increasing the congestion window linearly with time increases the bandwidth of the TCP connection and when the congestion is detected, the window size is multiplicatively reduced by a factor of two (Yang & Lam, 2000).

TCP is not well suited for several emerging applications including streaming and real time audio and video because it increases end-to-end delay and delay variations (Jin et al., 2001).

This paper analyzes a new class of nonlinear congestion control algorithms for Internet Transport Protocols and applications. It seeks to develop a family of algorithms for applications such as Internet audio and video that does not react well to rate reductions, because the rate reduction technique used for these applications will result into the degradation in user-perceived quality (Allman & Paxson, 1999; Floyd & Fall, 1999). This analysis results into get good understanding of TCP-compatible congestion control algorithms by generalizing the Additive Increase and Multiplicative Decrease (AIMD) algorithms. The authors analyze the proposed algorithms in a simulated wired TCP network.

One of the current challenges of the Internet is to allow universal access to multimedia transmissions, even for receivers located within networks of different bandwidth and other characteristics. Multicast allows one single transmission to be delivered to a large number of receivers over a network (Seada et al., 2002). Congestion control is a major requirement for multicast to be deployed in the current Internet. This paper analyses the performance of the proposed congestion control algorithms in a wired network that employ multicast routing strategies.

With the proliferation of mobile computing devices, the demand for continuous network connectivity regardless of physical location has created greater interest in the use of mobile ad hoc networks (Sundaresan et al., 2003; Holland & Vaidya, 1999). This paper also analyze the performance of the proposed algorithms in Mobile Ad hoc Networks that uses TCP and compares the performance of the two proposed models with the standard AIMD algorithms implemented for TCP networks.

In all the simulations, the proposed two models are named as MIMD-Poly and PIPD-Poly. They are compared with the TCP variants such as TCP/Tahoe (called as TCP), TCP/Reno, TCP/NewReno, TCP/Vegas and the comparisons are simulated in ns2, the discrete event driven simulator that is used by most of the network researchers.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors