Performing Network Simulators of TCP with E2E Network Model over UMTS Networks

Abstract

Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become more popular for a reliable end-to-end (e2e) data delivery. However, TCP was initially designed for wired networks and therefore it suffers performance degradation due to the radio signal getting affected by fading, shadowing and interference. There are many strategies proposed by the research community on how to improve the performance of TCP over wireless links such as introducing link-layer re transmission, explicitly notifying the sender of network conditions or using new variants of TCP. As UMTS network coverage and availability are currently experiencing rapid growth, optimization of various internal components of its wireless network is very important. One of the optimization is the introduction of High Speed Down link Packet Access (HSDPA). This architecture not only allows higher data rates but also more reliable data transfer by the introduction of Hybrid ARQ (HARQ). With this enhancement to the UMTS network, it becomes vital to see the performance of TCP in such a network. Therefore in this thesis, we try to evaluate two aspects of UMTS networks: first, the impact of HSDPA parameters like scheduling algorithm and RLC/MAC-hs buffer size on overall performance of TCP and second, to study the behaviour of two categories of TCP rate and flow control: loss based and delay based. Our simulation shows that delay based TCP tends to perform better than loss based TCP in our selected scenarios. The simulations are performed using the network simulator NS-2 with an e2e network model for enhanced UMTS (EURANE).

Authors and Affiliations

Thejovathi M.

Keywords

Related Articles

A SECURE SCHEME FOR MONITORING SAFETY IN VEHICULAR ADHOC NETWORK

Vehicle ad-hoc networks has significantly used in automobiles for an effective communication with one another. The decentralized nature of this network provides an extensive range of applications which makes passenger sa...

Information Security Policy Development: A Literature Review

Information security policy is one of the most important security controls, and considered as the foundation of any security regime in an organization. In fact, failure to formulate an information security policy is said...

Performing Network Simulators of TCP with E2E Network Model over UMTS Networks

Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become...

The Analysis of the Distribution Mode of Rookie Network

With online shopping spreading quickly, China ' s e-commerce market is rapidly expanding; the e-commerce distribution bottlenecks gradual emerge. Logistics distribution has restricted the development of Taobao. It is pro...

Frequency Domain Approach of Image Steganography

Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein me...

Download PDF file
  • EP ID EP183784
  • DOI -
  • Views 161
  • Downloads 0

How To Cite

Thejovathi M. (2016). Performing Network Simulators of TCP with E2E Network Model over UMTS Networks. International Journal of Innovative Research in Information Security, 0(0), 1-8. https://europub.co.uk/articles/-A-183784