Preview

Performance Analysis of TCP Variants

Powerful Essays
Open Document
Open Document
4012 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Performance Analysis of TCP Variants
Performance Analysis of TCP Variants
Sanjay Rajashekhar (91sanjay@ccs.neu.edu)
Tiantong Deng (dtt@ccs.neu.edu)
Ganesh Aithal Parampalli Narayana (ganeshpn@ccs.neu.edu)
Abstract— TCP is the main and most widely used transport protocol for reliable communication. Because of its widespread need, researchers have been studying and proposing new TCP variants trying to improve its behavior towards queuing and congestion to make it use the most available bandwidth while preserving a logical level of fairness towards other protocols. This paper aims at evaluating and comparing the performance of the
TCP variants (Tahoe, Reno, NewReno and Vegas) based on congestion, queuing and fairness. We carefully choose scenarios to investigate the throughput, intra- and inter-protocol fairness of these TCP variants. We argue through analysis that TCP Vegas, with its better bandwidth estimation scheme, uses the network resources more efficiently and fairly than other TCP variants.
Simulation results are given that support the results of the analysis. Key Words — TCP Tahoe, Reno, NewReno, Vegas, Constant Bit rate (CBR), Congestion, NS-2, TTL, SACK, RTT, SACK, RED,
UDP and DropTail.

I. INTRODUCTION
In networking, data and information are most important in real life scenario. The clear comparative ideas in different perspectives of congestion windowing mechanism plays a big role. To have a correct comparison between different mechanisms of congestion windowing, simulation of data transfer and drop with different protocols & variants and the correct mathematical analysis of data transfer are must.
Transmission Control Protocol is a widely used connection oriented transport layer protocol that provides a reliable packet delivery over an unreliable network. Several different variants have been developed in order to refine congestion control.
In this paper we analyze the performance of various TCP variants (TCP Tahoe, TCP Reno, TCP NewReno, and TCP
Vegas).



References: [1] Sally Floyd and Van Jacobson, "Random early detection gateways for congestion avoidance," IEEE/ACM Transactions on Networking, vol.1, pp. 397-413, August 1993. [2] W. Richard Stevens, TCP/IP Illustrated, Volume 1: The Protocols. Reading, Massachusetts: Addison-Wesley, 1994. [3] Kevin Fall and Sally Floyd, “Simulation-based Comparisons of Tahoe, Reno, and SACK TCP” [4] http://www.iaeng.org/publication/IMECS2009/IMECS200 9_pp351-353.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The simulation results of this thesis can allow to conclude that using the multipath with quality of service is the best method to get less jitter and more throughput as compare with another published paper and this algorithm gets less jitter without using multipath as in the first experiment, but the throughput is reduced in big network as in the sixth experiment because the transfer packet from client to server not fixed ,the packet take one path in first transfer but in second transfer may take another path to send to server and this can reduce the network throughput in random network .…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. This question was answer in my previous answer but the way to minimize Layer 2 loops is to have Spanning Tree Protocol (STP), Trunking (ISL/802.1q), Unidirectional Link Detection (UDLD), and…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and functions of each of these.…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw310 Week6

    • 372 Words
    • 2 Pages

    Based on the graph I believe that the congestion on the server starts around 5,000 bytes and continues to increase for the next 11 seconds of the transmission. The flight size starts around 1m42s and reach the higest point when the the transmission is around 32,000 bytes.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Your OS will use the hard drive as a "swap file" or virtual memory, if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are slower than RAM. You must have enough memory, adding more does not help if you are not doing anything that needs more memory. Today, a modern PC and a modern OS need about 4 gigs to achieve this for most standard users. You want enough RAM so the OS doesn't start using the hard drive as memory.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    Transmission Control Protocol / Internet Protocol (TCP/IP) TCP is the protocol used in networking that provides a connection-oriented, reliable way for applications to communicate large amount of data at one time over a network. IP is a connectionless protocol responsible for addressing network devices, and routing packets between…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Stallings, W. (1998). High speed networks. TCP/IP and ATM Design Principles, Upper SaddleRiver, NJ, PrenticeHall, Inc.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Vint Cerf and Bob Kahn developed TCP/IP, ’A Protocol for Packet Network Interconnection’ (in 1974), to connect different networks. The…

    • 1857 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    ABSTRACT This paper presents a new mechanism for delivering Qual- ity of Service (QoS) guarantees for web-based applications in the face of Distributed Denial of Service (DDoS) attacks. It accomplishes this by scheduling incoming requests based on a valuation/cost analysis to prioritize and service these requests in a more e±cient manner. This research di®ers from previous works by collaborating with the web server 's Operating System (OS) through the use of probes, which provide active feedback of application resource state. Other heuristics that have proven successful in DDoS detection and prevention are also employed in an extensible framework to facilitate site-speci¯c customization.…

    • 1460 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    © Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not constitute a commitment from Decipher Information Systems of any features or functions discussed and is subject to change without notice. Decipher Information Systems assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Last revised: June 2006…

    • 2567 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    NETWORK BANDWIDTH

    • 2338 Words
    • 14 Pages

    Network Bandwidth Predictor (NBP): A System for Online Network performance Forecasting Alaknantha Eswaradass, Xian-He Sun, Ming Wu Department of Computer Science Illinois Institute of Technology Chicago, Illinois 60616, USA {eswaala, sun, wuming}@iit.edu Abstract The applicability of network-based computing depends on the availability of the underlying network bandwidth. However, network resources are shared and the available network bandwidth varies with time.…

    • 2338 Words
    • 14 Pages
    Powerful Essays