Next Article in Journal
Electrochemical Flow-ELISA for Rapid and Sensitive Determination of Microcystin-LR Using Automated Sequential Injection System
Previous Article in Journal
Development of Three-Dimensional Dental Scanning Apparatus Using Structured Illumination
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks

1
School of Electronic and Information Engineering, South China University of Technology, Guangzhou 510641, China
2
School of Computer and Electronic Information, Guangxi University, Nanning 530004, China
3
Guangxi Key Laboratory of Multimedia Communications and Network Technology (Cultivating Base), Guangxi University, Nanning 530004, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2017, 17(7), 1637; https://doi.org/10.3390/s17071637
Submission received: 26 April 2017 / Revised: 1 July 2017 / Accepted: 11 July 2017 / Published: 15 July 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

1. Introduction

Wireless ad hoc networks are widely used in military and civil mobile communication, where fixed communications infrastructures (i.e., base station) are not available. Different from WLAN (Wireless Local Area Network), the ad hoc network is a multi-hop wireless network without a centralized coordinator. Each node works as a router to forward the packets from other nodes. In this special wireless network, TCP (Transmission Control Protocol) flows traverse multiple hops before reaching the destination node or sink node. To provide reliable communications in wireless ad hoc networks, it is critical to design an efficient TCP congestion control mechanism [1].
However, the performance of the wireless ad hoc network will be degraded if the traditional TCP protocol is utilized. The reason is that TCP congestion control has an implicit assumption that any packet loss is due to the buffer overflow. In fact, as long as the buffer size at each wireless node is reasonably large, most packet losses are due to wireless channel contention, namely, MAC (Media Access Control) layer competition [2,3,4].
Therefore, several cross-layer schemes are proposed to alleviate congestion in the wireless channel [5,6,7,8]. For example, a cross-layer ECN (Explicit Congestion Notification) scheme was proposed to perceive the link congestion according to the retransmission counter at the MAC layer. In this scheme, the retransmission counter at the MAC layer is used as the congestion metric to trigger the ECN mechanism. ECN is the explicit congestion notification mechanism of the IP layer. When network congestion occurs, the sender can adjust the congestion window and reduce the sending rate by the ECN mark from the receiver. Differently from [9], Yue Peng et al. utilized the frame service delay at the MAC layer as the congestion metric to mark or drop packets [10,11,12]. WCCP (Wireless Congestion Control Protocol) was proposed to dynamically adjust the congestion window of TCP according to the channel business ratio, which presents the extent of channel congestion in a more accurate way [13]. These cross-layer methods improve the efficiency and fairness of wireless ad hoc networks [14,15]. However, the retransmission counter and the frame service delay are not precise enough to detect congestion from the MAC layer, while WCCP is too complex to implement in existing transport protocols.
Therefore, this paper proposes an MAC congestion metric called frame transmission efficiency, describing channel congestion in a more precise manner. Furthermore, combining this congestion metric with ECN, we propose a cross-layer ECN mechanism, RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), which is based on frame transmission efficiency and adjusts the transport sending rate through a standard ECN signaling method, without any modification to transport protocols.
The remainder of this paper is structured as follows. Section 2 describes several congestion metrics at the MAC layer and proposes a congestion notification scheme RECN. Section 3 gives the definition and analysis of the frame transmission efficiency to demonstrate the relationship between the frame transmission efficiency and the link layer congestion. Section 4 gives the protocol design of RECN. In Section 5, the simulation results show that our proposed congestion notification mechanism significantly outperforms traditional TCP in wireless multi-hop ad hoc networks. Section 6 is our conclusion.

2. Wireless Channel Congestion Detection

How to detect wireless channel congestion is important for congestion control design in wireless networks. Recent works have proposed several congestion metrics at the MAC layer.
(1)
Retransmission counter: There exists a correlation between the number of RTS (Request to Send) retransmissions and channel congestion extent at the MAC layer [16,17]. In [4], when the number of RTS retransmissions is greater than two, the wireless channel will be deemed as congested, and the TCP sender will decrease its sending rate. Though this method is very easy to deploy, the number of RTS retransmissions is not able to describe the congestion state accurately.
(2)
Frame Service Delay (FSD): The frame service delay is the interval from the time that the MAC layer begins to sense the channel for data transmission to the time that the acknowledgment is received successfully, which includes collision time and transmission time [18]. The greater the service delay is, the higher the probability of network congestion is. However, the hops that the flows are traveling through and the frame size greatly affect the service delay. Subsequently, the threshold value of the service delay is difficult to determine, resulting in the inaccuracy of congestion estimation.
(3)
Channel business ratio: The channel business ratio is defined as the ratio of link layer busy time (including collision time and data successful transmission time) to the total time [19,20,21,22]. It can be shown in Equation (1).
R b = 1 p i σ p i σ + p s T s u c + p c T c o l
where σ is the length of the backoff time slot, p i is the probability that the observed backoff time slot is idle, p s is the probability that there is one successful transmission, p c is the collision probability that there are at least two concurrent transmission at the same time slot, T s u c is the average time period associated with one successful transmission and T c o l is the average time period associated with collisions.
As shown in Equation (1), the channel business ratio accurately reflects the contention and collision at the MAC layer. When the channel business ratio R b increases, the channel utilization and network throughput will become higher. However, the channel business ratio is too complex to be deployed on the TCP protocol. Specifically, the key problem lies in the time interval involved in calculating R b being difficult to set. The ideal situation appears only when the time interval is exactly equal to the transmission cycle of a frame. However, the transmission cycle of a frame will change with many factors, such as frame length, flow concurrency and channel status.
Compared with the above solutions, this paper proposes a congestion notification scheme RECN, which uses the frame transmission efficiency as the congestion metric. With only a very small modification at the MAC layer, frame transmission efficiency characterizes the channel congestion status more accurately and can be deployed on the TCP protocol using the standard ECN signal method, improving the efficiency and fairness of the resource distribution in wireless ad hoc networks.

3. Definition and Theory Analysis

RECN is the cross-layer congestion notification scheme, based on the frame transmission efficiency R F T E and using the standard ECN mechanism. RECN works at the MAC layer and adjusts the sending rate of the transport protocol automatically and transparently. In this scheme, the frame transmission efficiency is the key point, being put as the new congestion metric. Thus, in this section, we give the definition and analysis of the frame transmission efficiency to demonstrate the relationship between the frame transmission efficiency and the link layer congestion.

3.1. Definition

IEEE (Institute of Electrical and Electronics Engineers) 802.11 is the standard MAC protocol of wireless networks. It includes RTS/CTS (Request To Send/Clear To Send) and basic access mechanisms for data transmission in DCF mode [23].
In the RTS/CTS scheme, the RTS frame is sent to the reserve channel when the TCP source wants to transmit the data packet. If the receiver successfully receives the RTS frame, it returns a CTS (Clear To Send) frame. After that, the data and the ACK (Acknowledgment) frame will be transmitted respectively. Only the RTS frame may have a collision in this mechanism. Since the RTS frame has no data and is a short frame, it avoids long data frame collision and the hidden terminal problem; while in the basic access scheme, the data will be sent directly once nodes access the channel instead of sending RTS.
In the DCF (Distributed Coordination Function) mode, each node uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism to compete for wireless channel. Firstly, the sender will detect the channel. If the idle time lasts for the DIFS (Distributed Inter-frame Spacing) time interval and a random backoff time, RTS or the data frame will be sent. If no CTS or ACK is received within a specified period, this frame is considered lost. Then, the transmitter will double the size of the contention window and choose a new backoff timer.
The model of MAC layer service delay is shown in Figure 1 and Figure 2. No matter which way it works, we define the frame transmission efficiency R F T E as the ratio of successful transmission delay to the frame service delay in the MAC layer, that is
R F T E = T S L T F S D
where T S L is the delay of data successful transmission, which refers to the interval from the start of sending data to the time ACK is received. T F S D is the total frame service delay from listening on the channel for transmitting this frame to this frame being transmitted successfully.
From the above definition, R F T E can reflect the state of channel congestion. When the channel is in a congested state, R F T E is smaller. On the contrary, R F T E is larger when the network communication is in good condition.

3.2. Theory Analysis

We derive frame transmission efficiency:
R F T E = T S L T F S D = E ( T S L ) E ( T F S D ) ,
where E ( T S L ) is the mathematic expectation of T S L . E ( T F S D ) is the mathematic expectation of T F S D .
(1)
The numerical value of T S L : As we can see in Figure 1 and Figure 2, the time that a frame is successfully transmitted with the RTS/CTS mechanism is:
T S L = T R T S + T C T S + T F + T A C K + 3 T S I F S ,
where T F is the time of the data frame transmission. The time that a frame is successfully transmitted while using the basic access mechanism is:
T S L = T F + T S I F S + T A C K .
According to the system parameters, T S I F S is 10 μ s. The lengths of RTS, CTS and ACK are 160 bits, 112 bits and 112 bits, respectively. Thus, T S L is determined by the size of the data frame and is independent of the number of collisions, that is E ( T S L ) = T S L . If the size of the data frame is determined, T S L will be a constant value.
(2)
The numerical value of T F S D : The numerical value of T F S D is:
T F S D = T C L + T S L ,
where:
T C L = T D I F S + j = 0 N ( T C j + T C W j ) + T C W N + 1 ,
where T C L is the total time of congestion. T C j is the time of each congestion. T C W j is the time of congestion waiting. N is the number of collisions, and the range of N is period [1, m], where m is the maximum number of collisions.
Next, we will calculate the mathematic expectation of T F S D .
E ( T F S D | N = k ) = E ( T C L ) + E ( T S L ) = T D I F S + E ( j = 0 k ( T C j + T C W j ) ) + E ( T C W k + 1 ) + E ( T S L ) ,
that is
E ( T F S D | N = k ) = k = 0 m ( T D I F S + E ( j = 0 k ( T C j + T C W j ) ) + E ( T C W k + 1 ) + E ( T S L ) ) × P ( N = k )
where P ( N = k ) is the function of the collision numbers k.
We have E ( T S L ) = T S L ; thus:
E ( T F S D | N = k ) = k = 0 m ( T D I F S + E ( j = 0 k ( T C j + T C W j ) ) + T C W k + 1 + T S L ) × P ( N = k )
With the RTS/CTS mechanism, there is:
T C j = 0 j = 0 T R T S + T S I F S + T C T S 0 < j m .
With the basic access mechanism, there is:
T C j = 0 j = 0 T C F + T S I F S + T A C K 0 < j m ,
where T C F is the time of collision data frame transmission.
According to the default value of the system parameters, T S I F S is 10 μ s. The lengths of RTS, CTS and ACK are 160, 112 and 112 bits, respectively. Thus, T C j is determined by the size of the collision data frame. If the packet size is fixed, there is T F = T C F . Thus, j = 0 k T C j is a constant, named G.
According to the IEEE 802.11 standard, the node uses the binary backoff algorithm to reserve the channel and send data. In the binary backoff algorithm, an integer is selected as the backoff time slot number W j randomly from the uniformly-distributed period [0, C W ]. The backoff window C W will be exponential increased with the number of retransmissions j, that is C W j = 2 j × C W m i n , j [ 0 , M ] , where C W m i n is the constant and M is the maximum backoff stage. When the node performs the backoff algorithm in the first time, C W will be C W m i n . The following backoff time slot will be C W j = 2 j 1 × C W m i n . When the number of collisions exceeds M, there is W j = 2 M 1 × C W m i n . Hence the average backoff time is:
E ( T C W j + 1 ) = 2 j 1 C W m i n E ( T s l o t ) 0 < j m 2 M 1 C W m i n E ( T s l o t ) j > M
where E ( T s l o t ) is the equivalent time slot length.
It is presumed that there are n saturated sites, and each of them always has packets in the queue and is contending for the channel. The transmission probability of each site is τ . Then, the probability that the MAC layer is in an idle time slot is defined as:
p i = ( 1 τ ) n
We denote p s as the successful transmission probability. That is to say, there is only one site transmitting data without collision from the other n 1 sites in the current slot. It can be expressed as:
p s = C n 1 τ ( 1 τ ) n 1 = n τ ( 1 τ ) n 1
The collision probability p c is:
p c = 1 p i p s
In a time slot, the channel may be in an idle time slot, or in a collision, or transmitting the data successfully. Hence, there is:
E ( T s l o t ) = p i σ + p s T S L + p c G
where σ is the length of the backoff time slot, and it is a constant.
From the above formulas, p s and p i can be replaced by τ and n, and T S L and G can be used as constants when the packet size is fixed. Thus, E ( T s l o t ) is determined by τ , n and p c .
P ( N = n ) obeys a geometric distribution [10]. That is:
P ( N = k ) = p c k × ( 1 p c ) 0 k < m p c k k = m
Combining Equations (10) and (18), we get:
E ( T F S D ) = C W m i n × E ( T s l o t ) × ( 1 2 M p c M + 1 . . . 2 m 1 p c m ) 2 ( 1 2 p c ) + ( T D I F S + T S L ) × ( 1 p c m ) + G × p c p c m + 1 1 p c m < M ( T D I F S + T S L ) × ( 1 p c m ) + C W m i n × E ( T s l o t ) × ( 1 2 m p c m ) 2 ( 1 2 p c ) + G × p c p c m + 1 1 p c m > M
As shown in Equation (19), E ( T F S D ) is determined by τ , n and p c , when the packet size is fixed, that is T F = T C F .
Hence, R F T E can be:
R F T E = T S L T F S D = E ( T S L ) E ( T F S D ) = T S L E ( T F S D )
R F T E is determined by τ , n and p c , if the size of the packet is fixed.
In [24], the collision probability p c is:
p c = 1 ( 1 τ ) n 1
Thus, the frame transmission efficiency R F T E is only related with each nodes’ transmission probability τ , the number of neighbor nodes n, data length T F and collision data length T C F . For simplicity, the data length is fixed to be 1000 bytes. The correlation of frame transmission efficiency, transmission probability τ and the number of neighbor nodes n is shown in Figure 3.
It is indicated from Figure 3 that the frame transmission efficiency decreases with the increasing of transmission probability. Especially, when τ is close to a certain threshold, if τ increases, the value of R F T E drops rapidly. It is also indicated from Figure 3 that increasing the number of neighbor nodes n, the value of R F T E drops when τ is certain.
The analysis above demonstrates that R F T E is sensitive to the channel congestion at the link layer. This conclusion motivated us to investigate a novel approach by using R F T E in congestion control in wireless ad hoc networks.

4. Protocol Design

Specifically, in the RECN scheme, when the value of R F T E is smaller than a given threshold, wireless routers will explicitly mark packets with a CE (Congestion Explicitness) bit in the IP (Internet Protocol) header. By this cross-layer ECN mechanism, the sender will adjust its sending rate on receiving congestion notification. RECN works at the MAC layer and uses the standard ECN mechanism. Thus, in the RECN scheme, there is only very small modification at the MAC layer. We note that RECN is a supporting design that is compatible with a wide range of TCP protocols.
The pseudo-code of RECN implementation is described as:
M a c 802 _ 11 : : c h e c k _ p k t T x ( )
{
// calculating total transmission time (including data packet, ACK delay and propagation delay)
T T r a n s = t x t i m e ( p k t T x ) + t x t i m e ( A C K ) + T p r o p ;
// recording the current time
bt = now;
T S L = T T r a n s + T R T S + T C T S + 3 T S I F S ;
T F S D = b t s t + T T r a n s ; //st is the beginning time for transmitting.
R F T E = T S L T F S D
if R F T E < t h r e s h o l d // threshold is a given value.
set CE bit to 1; // mark ECN bit
}
Since the RTS/CTS mechanism is widely used in multi-hop wireless networks, we only take the RTS/CTS mechanism into consideration. However, our method is also suitable for the basic access mechanism.

5. Performance Evaluation

In this section, we conduct simulations in NS2.27 (Network Simulator 2.27) [24,25]. The simulation scenario is shown in Figure 4. The transmission range of each node is 250 m, and the sensing range is 550 m. The route protocol is DSDV (Destination-Sequenced Distance-Vector routing protocol). We set the channel bandwidth (channel transmission rate) to 1 Mb and use 1000 bytes as the fixed size of each data packet. TCP data flows are sent by nodes (1, ..., n) from w1 to w4, respectively. Simulations run for 300 s. We initiate UDP/constant bit rate (CBR) traffic flow as the background traffic starting from 0.5 s to 299.5 s at the speed of 500 kbps and initiate TCP/Constant Bit Rate (CBR) traffic flow starting from 1 s to 299 s at the speed of 800 kbps.
Table 1 gives the value of simulation scenario parameters.
We have made an experiment using UDP (User Datagram Protocol) flows as the background flows and calculated the number of RTS retransmission times, FSD, R b and R F T E of a TCP flow, as shown in Table 2.
Thus, in the following experiments, the threshold of RTS retransmission times is set to two; the threshold of FSD is set to 0.03; the threshold of R b is set to 0.75; and the threshold of R F T E is set to 0.6 based on the statistical results in Table 2.

5.1. Comparison with Other Metrics

We compare the throughput and packet loss rate of RECN with other metrics. We adopt RTS retransmission times [9], FSD [10], R b [13] and R F T E as the metrics of the indicator signal respectively, and also compare their performances with the case of no ECN.
In this section of the experiment, each sending node sent a TCP flow using UDP flows as the background flows. With the experiment, the number of sending nodes changed from one to 10. The results of throughput and packet loss rate are shown in Figure 5a,b, respectively.
Figure 5a shows that with the increasing number of sending nodes, the throughput decreases as a whole. However, compared with the no ECN situation, the decline of throughput is not so obvious as using ECN with the MAC layer’s metric. Specifically, the more sending nodes, the more obvious the improvement of the throughput is. This is because with more sending nodes, the possibility of congestion also increases. The sender using the ECN mechanism will reduce its sending rate when the congestion occurs.
In addition, Figure 5b tells us that the packet loss rate of no ECN is far greater than the others. For example, when number of flows is nine, the packet loss rate with no ECN is 0.35, with RTS, FSD and R b is 0.15 and with the R F T E we propose in this paper is only about 0.014.
To sum up, in the multi-hop ad hoc networks, the four metrics mentioned above can all improve network performance. However, the RECN metric we proposed can achieve the best improvement of both throughput and packet loss rate.
Thus, in the following sections, we focused on experiments to compare the performance of TCP with or without RECN.

5.2. TCP Throughput

Table 3 gives the throughput analysis when there are different numbers of TCP flows.
With the increased number of TCP flows, the total throughput sometimes tended to decline due to the increased channel competition. For example, while the number of TCP flows with RECN became four, the total throughput declined compared with three. When the number of TCP flows without ECN became five, the total throughput declined compared with four.
However, comparing with the no ECN situation, it is obvious from Table 3 that the total TCP throughput has an improvement by using RECN. For example, when the number of TCP flow is five, the total throughput increases by 95%.
Figure 6 gives the comparison of the instantaneous value of R F T E when there are five TCP connections.
It can be shown in Figure 6 that the average value of R F T E by using RECN is higher than that of the traditional TCP most of time. Combined with the statistics in Table 3, it can be concluded that the improvement of TCP throughput results from the improvement of data frame transmission efficiency.

5.3. Fairness Analysis

When the number of TCP connections is three and five, the throughput comparison of each flow is given by Figure 7a,b, respectively. With the traditional TCP, the throughput of one flow is close to zero. This is the inherent fairness problem of the IEEE 802.11 MAC protocol. However, by using RECN, TCP flows occupying the channel will slow down their sending rates when they received ACKs with congestion notification. Thus, these starved flows can get the chance to compete for the channel, and then, each flow can access the channel more fairly. Therefore, RECN is able to guarantee better fairness for each flow in multi-hop ad hoc networks.
In addition, we also have tested the fairness among the TCP flows with different hops. As shown in Figure 8, we increase the number of nodes in the experiment scenario shown in Figure 4 to nine and then set the TCP flows with different hops. The throughput comparison of each flow is given by Figure 9a,b, respectively. With the traditional TCP, the starved flow still exists. By using RECN, each TCP flow with different hops has the chance to compete for the channel. The experiment shows again that RECN is able to guarantee better fairness for each flow in multi-hop ad hoc networks.

6. Conclusions

In wireless multi-hop ad hoc networks, congestion control plays an important role in reliable transmission. If the traditional TCP protocol is used, the network performance will degrade because of the poor interaction between the MAC and TCP layers. This paper proposes an MAC congestion notification scheme based on the frame transmission efficiency, which improves TCP performance with the congestion notification from the MAC layer. Analysis and simulation results show that our scheme outperforms traditional TCP in terms of throughput and fairness. Specially, it is realized with a small modification at the MAC layer, which can be applied to other existing TCP protocols. Therefore, the ECN mechanism has been widely used in recent years [26,27,28,29]. Thus, our scheme has good adaptability and generalization.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (61462007, 61572530).

Author Contributions

The motivation, ideas, framework and solution, as well as Section 1 to Section 6 in this paper were put forward by Huaguang He, Taoshen Li and Jin Ye. The experiment and data analysis, chart drawing and document proofreading were completed by Luting Feng.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yan, G.; Wang, J. Survey of TCP improvement over multi-hop wireless and wired hybrid networks. J. Comput. Res. Develop. 2009, 46, 738–746. [Google Scholar]
  2. Fu, Z.; Zrefos, P.; Luo, H.; Lu, S.; Zhang, L.; Gerla, M. The impact of multihop wireless channel on TCP throughput and loss. In Proceedings of the IEEE INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, 30 March–3 April 2003; Volume 3, pp. 1744–1753. [Google Scholar]
  3. Zhang, X.; Dai, Z.; Zhu, H. Channel reservation based on contention and interference in wireless ad hoc networks. In Proceedings of the IEEE International Conference on Computer Communication and Networks, Honolulu, HI, USA, 3–6 February 2014; pp. 1–8. [Google Scholar]
  4. Raghunathan, V.; Kumar, P.R. A counterexample in congestion control of wireless networks. Perform. Eval. 2007, 64, 399–418. [Google Scholar] [CrossRef]
  5. Mezzavilla, M.; Quer, G.; Zorzi, M. On the effects of cognitive mobility prediction in wireless multi-hop ad hoc networks. In Proceedings of the IEEE International Conference on Communications, Sydney, Australia, 10–14 June 2014; pp. 1638–1644. [Google Scholar]
  6. Zhang, X.; Yang, B.; Ma, Y. TCP congestion control based on accurate bandwidth-delay product in wireless Ad hoc networks. In Proceedings of the 23rd International Conference on Computer Communication and Networks, Shanghai, China, 4–7 August 2014; pp. 1–7. [Google Scholar]
  7. Kaushik, S.K.; Chahal, K.; Dhariwal, S.; Kumar, A.; Raj, P. Analysis of TCP Performance over Mobile Ad Hoc Networks with Varying Speed. In Proceedings of the 2012 International Conference on Computing Sciences, Phagwara, India, 14–15 September 2012; pp. 193–200. [Google Scholar]
  8. Duong, L.M.; Zitoune, L.; Véque, V. MAC-aware rate control for transport protocol in multihop wireless networks. In Proceedings of the IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, Sydney, Australia, 9–12 September 2012; pp. 1436–1441. [Google Scholar]
  9. Ye, J.; Wang, J.; Liu, Q.; Luo, Y. An Improved TCP with Cross-layer Congestion Notification over Wired/Wireless Hybrid Networks. In Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, China, 18–21 November 2008; pp. 368–373. [Google Scholar]
  10. Yue, P.; Wen, A.J.; Zhao, R.Q.; Liu, Z.J. Frame service delay analysis of IEEE 802.11 MAC protocol and its application in congestion control. J. Xidian Univ. 2008, 3, 5. [Google Scholar]
  11. Feng, K.T.; Lin, J.S.; Lei, W.N. Design and Analysis of Adaptive Receiver Transmission Protocols for Receiver Blocking Problem in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 2013, 12, 1651–1668. [Google Scholar] [CrossRef]
  12. Liu, Y.; Li, V.O.K.; Leung, K.C.; Zhang, L. Performance Improvement of Topology-Transparent Broadcast Scheduling in Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 2014, 63, 4594–4605. [Google Scholar] [CrossRef]
  13. Tuan, N.M.; Nakagawa, K.; Watabe, K. A Method at Link Layer to Improve the Fairness in Multi-hop Wireless Ad Hoc Networks. In Proceedings of the Sixth ACM International Symposium on Information and Communication Technology, Cape Town, South Africa, 7–10 December 2015; pp. 135–142. [Google Scholar]
  14. Zhai, H.; Chen, X.; Fang, Y. Improving Transport Layer Performance in Multihop Ad Hoc Networks by Exploiting MAC Layer Information. IEEE Trans. Wirel. Commun. 2007, 6, 1692–1701. [Google Scholar] [CrossRef]
  15. Yahia, M. Enhanced congestion control for TCP fairness in ad hoc wireless networks. In Proceedings of the 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), Singapore, 18–20 July 2012; pp. 669–675. [Google Scholar]
  16. Zhai, H.; Chen, X.; Fang, Y. How well can the IEEE 802.11 wireless LAN support quality of service? IEEE Trans. Wirel. Commun. 2005, 4, 3084–3094. [Google Scholar] [CrossRef]
  17. IEEE Standard Association. IEEE Standards Interpretation for IEEE Std 802.11™ —Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Available online: http://standards.ieee.org/findstds/interps/802.11-2007.html (accessed on 11 July 2017).
  18. Hegde, M.; Kumar, P.; Vasudev, K.R.; Sowmya, N.N.; Anand, S.V.R.; Kumar, A.; Kuri, J. Experiences with a centralized scheduling approach for performance management of IEEE 802.11 wireless LANs. IEEE/ACM Trans. Netw. 2009, 21, 648–662. [Google Scholar] [CrossRef]
  19. Bianchi, G. Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 2006, 18, 535–547. [Google Scholar] [CrossRef]
  20. Floyd, S. TCP and explicit congestion notification. ACM Sigcomm Comput. Commun. Rev. 1994, 24, 8–23. [Google Scholar] [CrossRef]
  21. Kim, B.C.; Choi, Y.S.; Cho, Y.Z. A New Packet Marking Strategy for Explicit Congestion Notification in the Internet. IEEE Int. Conf. Commun. 2002, 4, 2330–2334. [Google Scholar]
  22. Harhalakis, S.; Samaras, N.; Vitsas, V. An Experimental Study of the Efficiency of Explicit Congestion Notification. In Proceedings of the 15th Panhellenic Conference on Informatics, Kastonia, Greece, 30 September–2 October 2011; pp. 122–126. [Google Scholar]
  23. Dappuri, B.; Venkatesh, T.G. IEEE 802.11 DCF MAC protocol for cognitive radio networks: Cooperative basic access Vs RTS/CTS. In Proceedings of the 14th International Symposium on Communications and Information Technologies, Incheon, South Korea, 24–26 September 2014; pp. 45–50. [Google Scholar]
  24. VINT Project UC Berkeley/LBNL. NS2: Network Simulator. Available online: http://ee.lbl.gov/ns/#version2 (accessed on 11 July 2017).
  25. Swenson, B.P.; Riley, G.F. Implementing explicit congestion notification in ns-3. In Proceedings of the 2014 Workshop on ns-3, Atlanta, GA, USA, 7 May 2014; Volume 5, pp. 1–8. [Google Scholar]
  26. Joy, S.; Nayak, A. SDN based ECN adaptation scheme for improving data center long flow throughput. In Proceedings of the IEEE International Conference on Communication Workshop, London, UK, 8–12 June 2015; pp. 1545–1550. [Google Scholar]
  27. Li, D.; Li, S.; Du, Z. Session-aware congestion control for TCP Incast in datacenter networks. In Proceedings of the 2016 IEEE Symposium on Computers and Communication, Messina, Italy, 27–30 June 2016; pp. 1227–1232. [Google Scholar]
  28. Silva, R.F.E.; Carpenter, P.M. Controlling Network Latency in Mixed Hadoop Clusters: Do We Need Active Queue Management? In Proceedings of the IEEE 41st Conference on Local Computer Networks, Dubai, United Arab Emirates, 7–10 November 2016; pp. 415–423. [Google Scholar]
  29. Lee, C.; Nakagawa, Y.; Hyoudou, K.; Kobayashi, S.; Shiraki, O.; Shimizu, T. Flow-Aware Congestion Control to Improve Throughput under TCP Incast in Datacenter Networks. In Proceedings of the IEEE 39th Annual Computer Software and Applications Conference, Taichung, Taiwan, 1–5 July 2015; pp. 155–162. [Google Scholar]
Figure 1. The delay of RTS/CTS (Request To Send/Clear To Send) mechanism.
Figure 1. The delay of RTS/CTS (Request To Send/Clear To Send) mechanism.
Sensors 17 01637 g001
Figure 2. The delay of the basic access mechanism.
Figure 2. The delay of the basic access mechanism.
Sensors 17 01637 g002
Figure 3. The relation of R F T E , τ and n.
Figure 3. The relation of R F T E , τ and n.
Sensors 17 01637 g003
Figure 4. Simulation scenario.
Figure 4. Simulation scenario.
Sensors 17 01637 g004
Figure 5. Comparison with other metrics.
Figure 5. Comparison with other metrics.
Sensors 17 01637 g005
Figure 6. Comparison of the R F T E (TCP flow number: five).
Figure 6. Comparison of the R F T E (TCP flow number: five).
Sensors 17 01637 g006
Figure 7. Comparison of fairness with three hops.
Figure 7. Comparison of fairness with three hops.
Sensors 17 01637 g007
Figure 8. Simulation scenario with different hops.
Figure 8. Simulation scenario with different hops.
Sensors 17 01637 g008
Figure 9. Comparison of fairness with different hops.
Figure 9. Comparison of fairness with different hops.
Sensors 17 01637 g009
Table 1. Simulation scenario parameter setting. prop refers to the propagation model. Mac refers to the MAC protocol. Ifq refers to interface queue. Ifqlen refers to the length of the interface queue. SIFS refers to the Short Interframe Space. The Phy header refers to the length of the Physical layer header. The Mac header refers to the length of the media access layer header.
Table 1. Simulation scenario parameter setting. prop refers to the propagation model. Mac refers to the MAC protocol. Ifq refers to interface queue. Ifqlen refers to the length of the interface queue. SIFS refers to the Short Interframe Space. The Phy header refers to the length of the Physical layer header. The Mac header refers to the length of the media access layer header.
ParametersSetting
propTwoRayGround
mac802.11
ifqDrop Tail/PriQueue
ifqlen20
SIFS10 μ s
Phy header192 bits
Mac header224 bits
RTS160 bits + Phy header
CTS, ACK112 bits + Phy header
Table 2. The value of RTS retransmission times, Frame Service Delay (FSD), R b and R F T E .
Table 2. The value of RTS retransmission times, Frame Service Delay (FSD), R b and R F T E .
The Number of Background Flows (UDP Flows)1234
RTS retransmission times1.3491.6882.0682.109
FSD (ms)20.23421.28923.56024.395
R b 0.662370.694090.710380.72191
R F T E 0.580430.575610.573340.57322
Table 3. TCP throughput analysis. Compare the two situation: RECN and No ECN.
Table 3. TCP throughput analysis. Compare the two situation: RECN and No ECN.
TCP Flow NumberTotal Throughput (kbps)Average Value of R F T E
RECNNo ECNRECNNo ECN
1244.58232.390.7610.645
2556.11317.640.7600.640
3707.89323.810.7580.646
4640.80399.180.7560.613
5727.27373.710.7530.624

Share and Cite

MDPI and ACS Style

He, H.; Li, T.; Feng, L.; Ye, J. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks. Sensors 2017, 17, 1637. https://doi.org/10.3390/s17071637

AMA Style

He H, Li T, Feng L, Ye J. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks. Sensors. 2017; 17(7):1637. https://doi.org/10.3390/s17071637

Chicago/Turabian Style

He, Huaguang, Taoshen Li, Luting Feng, and Jin Ye. 2017. "Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks" Sensors 17, no. 7: 1637. https://doi.org/10.3390/s17071637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop