Mobile-host-centric transport protocol for EAST experiment

被引:6
|
作者
Shu, Yantai [1 ]
Ge, Weimin [1 ]
Jiang, Nan [1 ]
Kang, Yang [1 ]
Luo, Jiarong [2 ]
机构
[1] Tianjin Univ, Dept Comp Sci, Tianjin 300072, Peoples R China
[2] Acad Sinica, Inst Plasma Phys, Hefei 230031, Anhui, Peoples R China
关键词
information rates; traffic control; transport protocols; wireless LAN;
D O I
10.1109/TNS.2007.914319
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Some physics researchers retrieve EAST experiment data using the Transmission Control Protocol (TCP) in a wireless local area network (WLAN). TCP is the most commonly used transport control protocol. It assumes that every packet loss is caused by network congestion and invokes congestion control and avoidance. TCP's blind congestion control results in degraded performance in lossy wireless networks. In a wireless network,, mobile hosts have first-hand knowledge of the lossy wireless links; therefore, mobile stations can make better transmission control based on the known status of wireless link. In this paper, we proposed a new mobile-host-centric transport protocol (MCP) that integrates the characteristics of sender-centric and receiver-centric transport control schemes. MCP shifts most control policies to the mobile host side. The general behavior of MCP is similar to the TCP, but by utilizing the local information collecting from the mobile node in WLAN, MCP allows for better congestion control and loss recovery. Specifically, we designed a cross-layer implementation of MCP and ran it on NS-2 network simulator. With valuable Medium Access Control (MAC) layer feedback information, MCP is able to distinguish packet loss caused by wireless random errors from network congestion more clearly and can perform a more accurate congestion control. We did extensive simulations of MCP on various WLAN scenarios, and the results show that the throughput of MCP with cross-layer feedback is higher than that of TCP Reno and Westwood.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [21] Distributed mobility management with mobile Host Identity Protocol proxy
    Muhana M. Muslam
    H. Anthony Chan
    Neco Ventura
    EURASIP Journal on Wireless Communications and Networking, 2017
  • [22] A Fluid-Based Model of a Transport Protocol in Content-Centric Networking
    Yabuuchi, Tsuyoshi
    Nakamura, Ryo
    Ohsaki, Hiroyuki
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 690 - 693
  • [23] LEOTP: An Information-centric Transport Layer Protocol for LEO Satellite Networks
    Jiang, Li
    Zhang, Yihang
    Yin, Jinyu
    Zhang, Xinggong
    Liu, Bin
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 579 - 590
  • [24] Fluid-Based Modeling of Transport Protocol for Information-Centric Networking
    Yamamoto, Soma
    Nakamura, Ryo
    Ohsaki, Hiroyuki
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 330 - 335
  • [25] Formally verified TSM centric privacy preserving NFC mobile payment framework and protocol
    Ammayappan K.
    Ammayappan, Kavitha (kavitha.a@samsung.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08): : 181 - 204
  • [26] Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System
    Yan, Liang
    Guo, Hongbo
    Chen, Min
    Rong, Chunming
    Leung, Victor
    NETWORKING 2011 WORKSHOPS, 2011, 6827 : 243 - +
  • [27] Simulation of IP Mobility Support: An experiment in mobile protocol specification with SDL
    Toro, M
    SDL '97 - TIME FOR TESTING: SDL, MSC AND TRENDS, 1997, : 119 - 134
  • [28] A RELIABLE PIPELINE PROTOCOL FOR THE MESSAGE SERVICE OF A LAND MOBILE SATELLITE EXPERIMENT
    YAN, TY
    LI, VOK
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1987, 5 (04) : 637 - 647
  • [29] Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
    Kiah, Miss Laiha Mat
    Martin, Keith M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (01): : 39 - 51
  • [30] A secure payment protocol using mobile agents in an untrusted host environment
    Das, A
    Yao, CX
    ELECTRONIC COMMERCE TECHNOLOGIES, PROCEEDINGS, 2001, 2040 : 33 - 41