TCP I-Vegas in Mobile-IP Network
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 2
Abstract
Mobile Internet Protocol (Mobile-IP or MIP) provides hosts with the ability to change their point of attachment to the network without compromising their ability to communicate. However, when TCP Vegas is used over a MIP network, its performance degrades because it may respond to a handoff by invoking its congestion control algorithm. TCP Vegas is sensitive to the change of Round-Trip Time (RTT) and it may recognize the increased RTT as a result of network congestion. This is because TCP Vegas could not differentiate whether the increased RTT is due to route change or network congestion. This paper presents a new and improved version of conventional TCP Vegas, which we named as TCP I-Vegas (where āIā, stands for Improved). Vegas performs well when compared to Reno but when sharing bandwidth with Reno its performance degrades. I-Vegas has been designed keeping in mind that whenever TCP variants like Reno has to share the bandwidth with Vegas then instead of using Vegas, if we use I-Vegas then the loss which Vegas would have to bear will not be more. We compared the performance of I-Vegas with Vegas in MIP environment using Network Simulator (NS-2). Simulation results show that I-Vegas performs better than Vegas in terms of providing better throughput and congestion window behavior.
Authors and Affiliations
Nitin Jain, Dr. Neelam Srivastava
A Memetic Algorithm for the Capacitated Location-Routing Problem
In this paper, a hybrid genetic algorithm is proposed to solve a Capacitated Location-Routing Problem. The objective is to minimize the total cost of the distribution in a network composed of depots and customers, both d...
Performance Improvement of Threshold based Audio Steganography using Parallel Computation
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate secur...
Performance Evaluation of K-Mean and Fuzzy C-Mean Image Segmentation Based Clustering Classifier
This paper presents Evaluation K-mean and Fuzzy c-mean image segmentation based Clustering classifier. It was followed by thresholding and level set segmentation stages to provide accurate region segment. The proposed st...
Steganography Performance over AWGN Channel
Steganography can be performed using frequency domain or spatial domain. In spatial domain method, the least significant bits (LSB) is the mostly used method where the least significant bits of the image's pixels binary...
Determinants Impacting the Adoption of E-Government Information Systems and Suggesting Cloud Computing Migration Framework
This research intends to investigate underlying elements that effect the adoption of E-Government Information Systems in Board of Intermediate and Secondary Education (BISE), Pakistan. The study is grounded on the theory...