Experimental assessment of RED in wired/wireless networks
نویسندگان
چکیده
The Internet is a heterogeneous environment comprising wired and wireless components, and transport protocols with different error recovery strategies. We use simulations to study the behaviour of random early detection (RED) gateways in such heterogeneous environments. We investigate two issues: (i) the performance trade-offs of the dropping policy of RED over Drop-Tail’s, and (ii) the impact of RED’s active queue management on more sophisticated protocols such as TCP-SACK. Some of our results indicate that RED does not deal adequately with heterogeneity. In particular, it may happen that RED applies congestion avoidance techniques even when wireless errors force some senders to back off prior to actual congestion. Our scenarios involve a non-monotonic transmission behaviour of transport protocols within one and the same congestion epoch; RED may escalate further bandwidth under-utilization by applying false congestion avoidance tactics. Furthermore, our results indicate that RED’s dropping policy of ‘proportional’ fairness, which is realized through a Send-more/Drop-more scheme, can also penalize sophisticated protocols like TCP-SACK, which attempt to recover more aggressively from wireless losses. In summary, our results call for further investigation of RED’s efficiency in heterogeneous networks and naturally raise the concern of RED’s compliance with the end-to-end argument. Copyright # 2004 John Wiley & Sons, Ltd.
منابع مشابه
Assessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملVehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملA Routing-Aware Simulated Annealing-based Placement Method in Wireless Network on Chips
Wireless network on chip (WiNoC) is one of the promising on-chip interconnection networks for on-chip system architectures. In addition to wired links, these architectures also use wireless links. Using these wireless links makes packets reach destination nodes faster and with less power consumption. These wireless links are provided by wireless interfaces in wireless routers. The WiNoC archite...
متن کاملA novel self-tuning feedback controller for active queue management supporting TCP flows
Wireless access points act as bridges between wireless and wired networks. Since the actually available bandwidth in wireless networks is much smaller than that in wired networks, there is a bandwidth disparity in channel capacity which makes the access point a significant network congestion point. The recently proposed active queue management (AQM) is an effective method used in wired network ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Int. J. Communication Systems
دوره 17 شماره
صفحات -
تاریخ انتشار 2004