You are on page 1of 6

TCP performance over mobile ad hoc networks

La performance de TCP sur des réseaux


mobiles ad hoc
Xiang Chen, Hongqiang Zhai, Jianfeng Wang, and Yuguang Fang

TCP is a transport protocol that guarantees reliable ordered delivery of data packets over wired networks. Although it is well tuned for wired networks,
TCP performs poorly in mobile ad hoc networks (MANETs). This is because TCP’s implicit assumption that any packet loss is due to congestion is
invalid in mobile ad hoc networks where wireless channel errors, link contention, mobility and multipath routing may significantly corrupt or disorder
packet delivery. If TCP misinterprets such losses as congestion and consequently invokes congestion control procedures, it will suffer from performance
degradation and unfairness. To understand TCP behaviour and improve the TCP performance over multi-hop ad hoc networks, considerable research has
been carried out. As the research in this area is still active and many problems are still wide open, an in-depth and timely survey is needed. In this paper,
the challenges imposed on the standard TCP in the wireless ad hoc network environment are first identified. Then some existing solutions are discussed
according to their design philosophy. Finally, some suggestions regarding future research issues are presented.

TCP est un protocole de transfert qui garantit une livraison fiable et ordonnée des paquets de données sur un réseau filaire. Malgré son bon fonctionnement
sur ces réseaux, le TCP performe très mal sur les réseaux mobiles ad hoc (MANETs). C’est dû à ce que la supposition implicite de TCP affirmant
que toute perte de paquet est causée par la congestion est invalide dans les réseaux mobiles ad hoc où des erreurs dans le canal sans fil, le partage du
lien entre plusieurs usagers, ainsi que le routage multi trajet et de mobilité peuvent corrompre de façon significative ou mettre en désordre les paquets
reçus. Si le TCP interprète de telles pertes comme étant de la congestion et qu’il appelle alors des procédures de contrôle de la congestion, il souffrira
d’une dégradation de performance. Afin de comprendre le comportement du TCP et d’améliorer sa performance sur des réseaux multi sauts ad hoc, des
recherches considérables ont été effectuées. Puisque la recherche dans ce domaine est encore très active et que plusieurs problèmes sont encore non
résolus, un aperçu détaillé et opportun est nécessaire. Dans ce papier, les défis imposés au TCP standard dans l’environnement d’un réseau sans fil ad hoc
sont d’abord identifiés. Ensuite, nous discutons de quelques solutions existantes selon leur philosophie de design. Finalement, quelques suggestions sur de
futures questions de recherche sont présentées.

Keywords: congestion control, mobile ad hoc networks (MANETs), TCP

I. Introduction poor performance if it still interprets such losses as congestions and


consequently invokes congestion control and avoidance procedures,
as confirmed through analysis and extensive simulations carried out
Mobile ad hoc networks (MANETs) are suitable for applications in in [1]–[6]. Based on these observations, several research works sug-
battlefield communications, disaster rescue, and inimical environment gest that standard TCP, if no necessary changes are effected, is not
monitoring, where fixed wired infrastructure is unavailable. In most of appropriate for use in ad hoc networks [2]–[8].
these scenarios, reliable data transfer is required. It is well known that
the transport control protocol (TCP) has been well tuned to provide In response to these MANET-specific challenges, many schemes
such services in the traditional wired network environment. Due to have been proposed to improve TCP performance over MANETs.
its wide use in the Internet, it is desirable that TCP remain in use to Based on their design philosophy, they can be classified into three
provide reliable data delivery for communications within MANETs groups. The first group of schemes incorporates network feedback
and for communications across MANETs and the Internet. information into its designs to modify TCP’s response to non-
congestion-related packet losses, whereas the second group attempts to
In TCP, reliability is achieved by retransmitting lost packets. Thus, operate without requiring explicit feedback. Unlike the previous two,
each TCP sender maintains a running average of the estimated round- the third group starts by tuning the lower layers in order for TCP to
trip delay and the mean deviation derived from it. Packets are retrans- operate normally, while leaving TCP intact.
mitted if the sender receives no acknowledgement within a certain
timeout interval (e.g., the sum of smoothed round-trip delay and four The rest of this paper is organized as follows. Section II catego-
times the mean deviation) or receives duplicate acknowledgements. rizes the challenges that TCP is faced with in wireless ad hoc network
Due to the inherent reliability of wired networks, there is an implicit environments. Some representative approaches to improving TCP per-
assumption made by TCP that any loss is due to congestion. To re- formance over wireless ad hoc networks are classified and compared
duce congestion, TCP will invoke its congestion control mechanisms in Section III. We finally conclude with a discussion of future research
whenever any packet loss is detected. issues in Section IV.

However, MANETs consisting of multi-hop wireless links suffer


from packet losses due to error-prone wireless channels, media access II. Challenges for TCP in MANETs
control (MAC)–layer contention, and route breakages. TCP will yield
 Xiang Chen, Hongqiang Zhai, Jianfeng Wang, and Yuguang Fang are
with Wireless Networks Laboratory (WINET), Department of Electrical
Unlike wired networks, mobile ad hoc networks have some unique
and Computer Engineering, University of Florida, 446 & 481 Engineer- characteristics that seriously deteriorate TCP performance. These char-
ing Building, P.O. Box 116130, Gainesville, Florida 32611, U.S.A. E-mail: acteristics include unpredictable wireless channels due to fading and
xchen, zhai@ecel.ufl.edu, jfwang@ufl.edu, fang@ece.ufl.edu interference, vulnerable shared media access due to random access col-

Can. J. Elect. Comput. Eng., Vol. 29, No. 1/2, January/April 2004
130 CAN. J. ELECT. COMPUT. ENG., VOL. 29, NO. 1/2, JANUARY/APRIL 2004

nel, the node has to back off for a random period of time and try again.
After several failed tries, a route failure is reported.

TCP may also encounter serious unfairness problems [2], [6], [10]–
[11] for the following reasons:
TCP flow 1 TCP flow 2
Topology causes unfairness because of unequal channel-access
0 opportunity for different nodes. As shown in Fig. 1, where the
1 2 3 4 5 6
small circle denotes a node’s valid transmission range and the
large circle denotes a node’s interference range, all nodes in a
seven-node chain topology experience different degrees of com-
petition. There are two TCP flows, namely flow 1 from node 0 to
node 1 and flow 2 from node 6 to node 2. The transmission from
node 0 to node 1 experiences interference from three nodes, i.e.,
Figure 1: Node interference in a chain topology. nodes 1, 2, and 3, while the transmission from node 3 to node
2 experiences interference from five nodes, i.e., nodes 0, 1, 2, 4,
and 5. Flow 1 will obtain much higher throughput than flow 2
because of the unequal channel-access opportunity.
lision, the hidden terminal problem and the exposed terminal problem,
The backoff mechanism in the MAC may lead to unfairness as it
and frequent route breakages due to node mobility. Undoubtedly, all of
always favours the last successfully transmitting node.
these pose great challenges to TCP in terms of its ability to provide re-
liable end-to-end communications in mobile ad hoc networks. From TCP flow length influences unfairness. A longer flow implies
the point of view of layered network architecture, these challenges longer round-trip time and higher packet dropping probability,
can be broken down into five categories, i.e., channel error, medium leading to lower and more fluctuating TCP end-to-end through-
contention and collision, mobility, multipath routing, and congestion, put. Through this chain reaction, unfairness is amplified, as high
whose adverse impacts on TCP are elaborated below in sequence. throughput will become higher and low throughput will be-
come lower.
A. Channel error
Bursty bit errors may corrupt packets in transmission, leading to the C. Mobility
loss of TCP data packets or acknowledgements (ACKs). If it can- Mobility may induce link breakage and route failure between two
not receive the ACK within the retransmission timeout (RTO), the neighbouring nodes, as one mobile node moves out of the other’s trans-
TCP sender immediately reduces its congestion window to one packet, mission range. Link breakage in turn causes packet losses. As stated
exponentially backs off its retransmission, and retransmits the lost earlier, TCP cannot distinguish between packet losses due to route fail-
packet. Intermittent channel errors may thus cause the congestion win- ures and packet losses due to congestion. Therefore, TCP congestion
dow size at the sender to remain small, prompting low throughput. control mechanisms react adversely to such losses caused by route
breakages [13]–[15]. Meanwhile, discovering a new route may take a
significantly longer time than the TCP sender’s RTO. If route discov-
B. Medium contention and collision
ery time is longer than RTO, the TCP sender will invoke congestion
Contention-based medium access control schemes, such as the IEEE
control after timeout. The already-reduced throughput due to losses
802.11 MAC protocol [9], have been widely studied and incorporated
will further shrink. It could be even worse when the sender and the
into many wireless test beds and simulation packages for wireless
receiver of a TCP connection fall into different network partitions. In
multi-hop ad hoc networks, where the neighbouring nodes contend
such a case, multiple consecutive RTO timeouts will lead to inactivity
for the shared wireless channel before transmitting. There are three
lasting for one or two minutes even if the sender and receiver finally
key problems, i.e., the hidden terminal problem, the exposed terminal
become reconnected.
problem, and unfairness. A hidden node is one that is within the in-
terfering range of the intended receiver, but outside the sensing range Fu et al. conducted simulations considering mobility, channel er-
of the transmitter. The receiver may not correctly receive the intended ror, and shared media-channel contention [4]. They indicated that
packet because of collision from the hidden node. An exposed node mobility-induced network disconnections and reconnections have the
is one that is within the sensing range of the transmitter, but outside most significant impact on TCP performance compared to channel
the interfering range of the receiver. Though its transmission does not error and shared media-channel contention. As mobility increases
interfere with the receiver, it could not start transmission because it compared to a reference TCP, TCP NewReno suffers from a relative
senses a busy medium, which introduces spatial reuse inefficiency. The throughput drop ranging from close to % in a static case to  % in
binary exponential backoff scheme always favours the latest success- a highly mobile case (when moving speed is  m/s). In contrast, con-
ful transmitter and results in unfairness. These problems could be more gestion and mild channel error (say %) have a less noticeable effect
harmful in multi-hop ad hoc networks than in wireless LAN because on TCP (with a performance drop of less than  % compared with the
ad hoc networks are characterized by multi-hop connectivity. reference TCP).
MAC protocols have been shown to significantly affect TCP per- D. Multipath routing
formance [2], [5]–[6], [10]–[12]. When TCP runs over IEEE 802.11 Routes are short-lived due to frequent link breakages. To reduce delay
MAC, as [6] pointed out, the instability problem becomes very seri- due to route recomputation, some routing protocols such as the tempo-
ous. It is shown that collisions and the exposed terminal problem are rally ordered routing algorithm (TORA) [16] maintain multiple routes
two major factors that can prevent one node from reaching the other between a sender-receiver pair and use multipath routing to transmit
when the two nodes are in each other’s transmission range. If a node packets. In such a case, packets coming from different paths may not
cannot reach its adjacent node after several tries, it will trigger a route arrive at the receiver in order. Being unaware of multipath routing, the
failure, which in turn will cause the source node to start route discov- TCP receiver will misinterpret such out-of-order packet arrivals as con-
ery. Before a new route is found, no data packet can be sent out. Dur- gestion. The receiver will thus generate duplicate ACKs that cause the
ing this process, the TCP sender has to wait and will invoke conges- sender to invoke congestion control algorithms like fast retransmission
tion control algorithms if it observes a timeout. Serious oscillation in (upon reception of three duplicate ACKs).
TCP throughput will thus be observed. Moreover, the random backoff
scheme used in the MAC layer exacerbates this behaviour [2]. Since E. Congestion
large data-packet sizes and back-to-back packet transmissions both de- It is known that TCP is an aggressive transport-layer protocol. Its at-
crease the likelihood that the intermediate node will obtain the chan- tempt to fully utilize the network bandwidth can easily cause ad hoc
CHEN / ZHAI / WANG / FANG: TCP PERFORMANCE OVER MOBILE AD HOC NETWORKS 131

networks to become congested. In addition, because of many factors


such as route change and unpredictable variable MAC delay, the rela- RFN From SYN-RECVD
tionship between congestion window size and the tolerable data rate
for a route is no longer maintained in ad hoc networks. The conges-
tion window size computed for the old route may be too large for the From SYN-SENT
newly found route, resulting in network congestion if the sender still
transmits at the full rate allowed by the old congestion window size. Snooze Established
To FIN-WAIT_1
Congestion/overload may give rise to buffer overflow and increased
link contention, which degrades TCP performance. As a matter of fact, To CLOSE-WAIT
RRN
[17] showed that the capacity of wireless ad hoc networks decreases as or route failure
traffic and/or competing nodes rise. timeout

F. Energy efficiency Figure 2: The TCP-F state machine [20].


As power is limited at mobile nodes, any successful scheme must
be designed to be energy efficient. In some scenarios where battery
recharge is not allowed, energy efficiency is critical for prolonging net-
work lifetime. In [18], the energy-consumption behaviour of three ver- TCP-F relies on the network layer at an intermediate node to detect
sions of TCP (Reno, Newreno, and SACK) was compared. The study the route failure due to the mobility of its downstream neighbour along
in [19] showed that a tradeoff exists between the individual packet the route. A sender can be in an active state or a snooze state. In the
transmission energy and the likelihood of retransmission, which is tied active state, the transport layer is controlled by the normal TCP. As
to the session throughput. Therefore, future study of TCP over ad hoc soon as an intermediate node detects a broken route, it explicitly sends
networks will need to strike a balance between low energy consump- a route failure notification (RFN) packet to the sender and records this
tion and high session throughput. event. Upon reception of the RFN, the sender goes into the snooze
state, in which the sender completely stops sending further packets
and freezes all of its timers and the values of state variables such as
III. Current approaches to improving TCP performance RTO and congestion window size. Meanwhile, all upstream interme-
in MANETs diate nodes that receive the RFN invalidate the particular route to avoid
further packet losses. The sender remains in the snooze state until it is
notified of the restoration of the route through a route re-establishment
Recently, several schemes have been proposed to improve TCP per- notification (RRN) packet from an intermediate node. Then it resumes
formance over mobile ad hoc networks. We classify the schemes into the transmission from the frozen state. The state machine of TCP-F is
three groups, based on their fundamental philosophy: TCP with feed- shown in Fig. 2.
back [20]–[23], TCP without feedback [14], [24]–[25], and TCP with
lower-layer enhancement [3], [12], [26]–[29]. Through the use of feed- 2. TCP-ELFN
back information to signal non-congestion-related causes of packet References [21] and [22] proposed another feedback-based technique,
losses, the feedback approaches help TCP distinguish between true explicit link failure notification (ELFN). The goal is to inform the TCP
network congestion and other problems such as channel errors, link sender of link and route failures so that it can avoid responding to the
contention, and route failures. On the other end of the solution spec- failures as if congestion had occurred. ELFN is based on the dynamic
trum, TCP-without-feedback approaches make TCP adapt to route source routing (DSR) [30] protocol. To implement an ELFN message,
changes without relying on feedback from the network, considering the route failure message of DSR is modified to carry a payload simi-
that feedback mechanisms may bring about additional complexity and lar to the “host unreachable” Internet control message protocol (ICMP)
cost in ad hoc networks. The third class of approaches, i.e., TCP with message. Upon receiving an ELFN, the TCP sender disables its con-
lower-layer enhancement, starts with the idea that the TCP sender gestion control mechanisms and enters into a “stand-by” mode, which
should be shielded from any problems specific to ad hoc networks, is similar to the snooze state of TCP-F mentioned above. Unlike TCP-
while lower layers such as the routing layer and the MAC layer need F, which uses an explicit notice to signal that a new route has been
to be tailored with TCP’s congestion control algorithms in mind. As found, TCP-ELFN requires the sender, while on stand-by, to period-
expected, this idea guarantees that TCP end-to-end semantics is main- ically send a small packet to probe the network to see if a route has
tained for ad hoc networks to seamlessly internetwork with the wired been established. If there is a new route, the sender leaves the stand-by
Internet. In the following, we present some representative schemes ac- mode, restores its RTO and continues as normal. Given that most of
cording to the aforementioned taxonomy. the popular routing protocols in ad hoc networks are on-demand and
route discovery/rediscovery is event-driven, it is appropriate to period-
Notice that in this paper we focus on how to improve TCP per- ically send a small packet from the sender to restore routes with mild
formance over ad hoc networks; therefore some schemes such as the overhead and without modification to the routing layer.
ad hoc transport protocol (ATP) [7], which attempts to propose an en-
tirely new transport-layer protocol, are not presented here, since they
Through explicit route failure notification, TCP-EFLN and TCP-F
are not improvement schemes based on standard TCP.
allow the sender to instantly enter snooze state and avoid unneces-
sary retransmissions and congestion control, both of which waste pre-
A. TCP with feedback cious MH battery power and scarce bandwidth. With explicit route
1. TCP-F re-establishment notification from intermediate nodes or active route
In mobile ad hoc networks, topology may change rapidly due to the probing initiated at the sender, these two schemes enable the sender
movement of mobile hosts (MHs). The frequent topology changes re- to resume fast transmission as soon as possible. However, neither of
sult in sudden packet losses and delays. TCP misinterprets such losses these two considers the effects of congestion, out-of-order packets, or
as congestion and invokes congestion control, leading to unneces- bit errors, all of which are quite common in wireless ad hoc networks.
sary retransmission and loss of throughput. To overcome this problem, In addition, both TCP-ELFN and TCP-F use the same parameter sets,
TCP-feedback (TCP-F) [20] was proposed so that the sender can dis- including congestion window size and RTO, after re-establishment of
tinguish between route failure and network congestion. In this scheme, routes as they do before the route failure; this may cause problems be-
the sender is forced to stop transmission without reducing window size cause congestion window size and RTO are route-specific. Using the
upon route failure. As soon as the connection is re-established, fast re- same parameter sets helps little in approximating the available band-
transmission is enabled. width of the new route if the route changes significantly.
132 CAN. J. ELECT. COMPUT. ENG., VOL. 29, NO. 1/2, JANUARY/APRIL 2004

from routing protocols such as DSR. More precisely, the CWL should
Receive dup ACK or never exceed the RTHC of the path.
packet from receiver
Receive Disconnected
“Destination
Unreachable”
The rationale behind this scheme is very simple, as shown in the
ICMP TCP sender put following. It is known that to fully utilize the capacity of a network, a
CWND 1 in persist state
TCP flow should set its CWL to the bandwidth-delay product (BDP)
of the current path, where a path’s BDP is defined as the product of
TCP the bottleneck bandwidth of the forward path and the packet transmis-
Receive
ECN transmits Normal New sion delay in a round trip. On the other hand, the CWL should never
a packet ACK exceed the path’s BDP in order to avoid network congestion. In ad
hoc networks, if we assume that the size of a data packet is and
ATCP
RTO about the bottleneck bandwidth along the forward and return paths is the
same and equal to   , it can be easily seen that the delay at any hop
to expire OR retransmits
Congested 3 dup ACKs Loss segments in
TCP’s buffer along the path is less than the delay at the bottleneck link, i.e.,   .
Since the size of a TCP acknowledgement is normally smaller than that
of the data packet, according to the definition of the BDP, we know
Figure 3: State transition diagram for ATCP at the sender [8].   
 . Therefore, the CWL, which is bounded by the
path’s BDP, should never exceed the RTHC of the path.

This upper bound can be further tightened when the IEEE 802.11
3. ATCP MAC–layer protocol is adopted. In fact, it is shown that, in a chain
Ad hoc TCP (ATCP) [8] also utilizes the network-layer feedback. The topology, a tighter upper bound exists, which is equal to approximately
idea of this approach is to insert a thin layer called ATCP between IP one fifth of the RTHC of the path. According to this tighter upper
and TCP, thus ensuring correct behaviour in the event of route fail- bound, the maximum RTO is set to a relatively small value of  s,
ures as well as high bit error rate. The TCP sender can be put into which enables TCP to probe the route quickly should it break (due
a persist state, a congestion control state or a retransmit state, cor- to false link failure). Simulation results showed that this simple but
responding to the packet losses due to route breakage, true network useful strategy is able to improve TCP-Reno performance by % to
congestion or high bit error rate, respectively. Note that unlike the  % in a dynamic MANET.
previous two feedback-based approaches, ATCP also tackles packet
corruption caused by channel errors. The sender can choose an appro- 2. TCP detection of out-of-order and response (TCP-DOOR)
priate state by learning the network state information through explicit TCP-DOOR [25] attempts to improve TCP performance by detecting
congestion notification (ECN) messages and ICMP “destination un- and responding to out-of-order (OOO) packet-delivery events and thus
reachable” messages. avoiding invocation of unnecessary congestion control. By definition,
OOO occurs when a packet sent earlier arrives later than a subsequent
The state transition diagram for ATCP at the sender is shown in packet. In ad hoc networks, OOO may happen multiple times in one
Fig. 3. Upon receiving a “destination unreachable” message, the sender TCP session because of route changes.
enters into the persist state. The TCP at the sender is frozen, and no
packets are sent until a new route is found, so that the sender does not In order to detect OOO, ordering information is added to TCP ACKs
invoke congestion control. Upon receipt of an ECN, congestion control and TCP data packets. OOO detection is carried out at both ends: the
is invoked without waiting for a timeout event. If a packet loss occurs sender detects the out-of-order ACK packets, and the receiver detects
and the ECN flag is not set, ATCP assumes the loss is due to bit errors the out-of-order data packets. If the receiver detects OOO, it should
and simply retransmits the lost packet. In the case of multipath rout- notify the sender, given that it is the sender that initiates congestion
ing, upon receipt of duplicate ACKs, the TCP sender does not invoke control actions. Once the TCP sender knows of an OOO condition, it
congestion control, realizing that multipath routing shuffles the order may take one of two responsive actions: temporarily disabling conges-
in which packets are received. Thus ATCP works well when multipath tion control, and instant recovery during congestion avoidance. The
routing is applied. first action means that, whenever an OOO condition is detected, the
TCP sender will keep its state variables, such as RTO and the conges-
ATCP is considered to be a more comprehensive approach than tion window size, constant for a time period  . The second action
TCP-F and TCP-ELFN in that it accounts for more possible sources of means that if, during the past time period  , the TCP sender has al-
deficiency, including bit errors and out-of-order delivery due to multi- ready entered the state of congestion avoidance, it should recover im-
path routing. Through recomputation of congestion window size after mediately to the state prior to such congestion avoidance. The main
each route re-establishment, ATCP may adapt to route changes. An- reason for this is that the detection of an OOO condition implies that a
other benefit of ATCP is that it is transparent to TCP, and hence nodes route change event has just occurred.
with and without ATCP can interoperate.
However, OOO can be detected only after a route has recovered
In summary, as shown by the simulations, these feedback-based ap- from failures. As a result, TCP-DOOR is less accurate and respon-
proaches improve TCP performance significantly while maintaining sive than a feedback-based approach that is able to determine whether
TCP’s congestion control behaviour and end-to-end TCP semantics. congestion or route errors occur, and hence can report to the sender
However, all these schemes require that the intermediate nodes have at the very beginning. Furthermore, it may not work well with multi-
the capability of detecting and reporting network states such as link path routing since multipath routing may cause OOO as well. There-
breakages and congestion. Enhancementat the transport layer, network fore, it is concluded that TCP-DOOR may work as an alternative to the
layer, and link layer are all required. Further research on ways to detect feedback-based approach to improve TCP performance over an ad hoc
and distinguish network states in the intermediate nodes is needed. network, if the latter is not available.

B. TCP without feedback 3. Fixed RTO


1. Adaptive congestion window limit setting In TCP congestion control, TCP doubles the RTO and retransmits the
Based on the observation that TCP’s congestion control algorithm of- oldest unacknowledged packet when the retransmission timer expires.
ten overshoots, leading to network overload and heavy contention at Although this exponential backoff mechanism of the RTO could han-
the MAC layer, Chen et al. [24] proposed an adaptive congestion win- dle network congestion gracefully, it is no longer suitable in MANETs
dow limit (CWL, measured in terms of the number of packets)–setting when the loss of packets or ACKs is caused by temporary route break-
strategy to dynamically adjust the TCP’s CWL according to the cur- ages, as discussed earlier. In such a case, the RTO should be recalcu-
rent round-trip hop count (RTHC) of the path, which can be obtained lated, if possible, according to the new route instead of being doubled.
CHEN / ZHAI / WANG / FANG: TCP PERFORMANCE OVER MOBILE AD HOC NETWORKS 133

Furthermore, when the new route is established, the TCP sender should of-line packet is dropped from the buffer or marked as congested with
start the transmission immediately instead of waiting for the expiration a probability that is calculated based on this average number. Once
of the retransmit timer. it detects packet losses or the congestion flag in the ACKs, the TCP
sender invokes the congestion control algorithm that could help main-
In the fixed RTO approach [14], no feedback from lower layers tain the congestion window size around the optimum value and hence
is needed. Rather, a heuristic is employed to distinguish route fail- improve TCP’s throughput.
ures and congestion. When timeouts occur consecutively, i.e., an ACK
is not received before the second RTO expires, the sender assumes The goal of adaptive link-layer pacing is to alleviate the medium
that a route failure rather than network congestion has taken place. contention, especially when the congestion window size exceeds the
Therefore, the unacknowledged packet is retransmitted again without optimum value. It is enabled from within the Link-RED algorithm.
doubling of the RTO. The RTO remains fixed until the route is re- When a node (which is just sending a packet) notices that its aver-
established and the retransmitted packet is acknowledged. By adopt- age number of retries is below a predefined threshold, it calculates its
ing this strategy, the TCP sender avoids waiting for a long period of backoff time as usual. Otherwise, it increases the backoff period by an
time before attempting to retransmit. This fast retransmission would interval equal to the transmission time of the previous data packet, and
force routing protocols, especially those like AODV [31] and DSR, backs off accordingly.
to repair routes fast, which in turn would lead to a large congestion
window on average and high TCP throughput. Actually, this technique 3. Neighbourhood RED
complements TCP-DOOR. As described in the previous subsection on challenges, TCP exhibits
serious unfairness in ad hoc networks as a result of the combination of
C. TCP with lower-layer enhancement MAC-inherent problems such as medium contention, the hidden ter-
1. Routing-layer enhancement minal problem, and the exposed terminal problem. As these problems
In [26], Anantharaman et al. presented a framework termed Atra to are likely to exist in nodes which are located in a neighbourhood, Xu et
improve TCP performance over ad hoc networks by enhancing rout- al. [27] proposed a scheme named neighbourhood random early detec-
ing layers. Three mechanisms, called symmetric route pinning (SRP), tion (NRED) that seeks to improve TCP fairness from the point of view
route failure prediction (RFP) and proactive route error (PRE), were in- of a neighbourhood. By definition, a node’s neighbourhood consists of
troduced to minimize the probability of route failures, to predict route the node itself and the nodes which can interfere with this node’s sig-
failures in advance, and to minimize the latency in conveying route nal. To make things simpler, a node’s neighbourhood as considered
failure information to source, respectively. Since an asymmetric path in the scheme comprises the node itself and its one-hop and two-hop
would increase the probability of route failure for a connection, in the neighbours.
first mechanism, the ACK path of a TCP connection is always kept
the same as the data path. Based on the progression of signal strengths The key idea of NRED is that each node forms a distributed neigh-
of packet receptions from the concerned neighbour, the second mecha- bourhood queue based on the individual queues maintained at every
nism enables the node to predict the occurrence of link failure more ac- node located in the node’s neighbourhood, and the RED scheme can
curately. Finally, with PRE, when a link failure is detected, all sources be applied to the distributed queue to address the fairness issue, as has
that have used the link within a certain time period are informed of been done effectively in wired networks to improve fairness among
the link failure. This reduces the latency involved in the route failure TCP flows by controlling average queue size at routers.
information delivery and consequently reduces the number of packet The NRED scheme boils down to three algorithms, namely, neigh-
losses, as well as triggering early alternate route computations. bourhood congestion detection (NCD), neighbourhood congestion no-
tification (NCN), and distributed neighbourhood packet drop (DNCP).
2. Link-layer enhancement
Instead of counting on each node to actively advertise its own queue
Fu et al. [3] discussed the interaction between TCP and IEEE 802.11
size information and then measuring the neighbourhood queue size (a
MAC. Their studies reveal two interesting results. First, given a spe-
task which may cause a large amount of overhead or even aggravate
cific network topology and flow pattern, there exists a TCP window
congestion), NCD intelligently gets around the difficult task by mon-
size, say   , at which TCP throughput is maximized, since the best
itoring channel utilization. Normally, channel utilization can serve as
spatial reuse can be achieved; further increasing the window size will
an indicator of the queue size, based on the observation that channel
reduce throughput. However, the standard TCP protocol does not op-
utilization around a node is likely to increase when the queues at its
erate around   ; typically the average window size is much larger
neighbouring nodes build up. An early congestion is assumed to take
than   . As a result, TCP experiences throughput reduction due to
place as the channel utilization exceeds a certain threshold. If conges-
reduced spatial reuse and increased packet loss. In the simulated sce-
tion is detected, the node will calculate the packet dropping probability
narios, throughput reductions ranging from % to % of maximum
and send it in an NCN packet to its neighbours, provided that certain
throughput were observed. Second, most packet drops experienced by
conditions are met in order to avoid “overreaction.” The neighbours,
TCP are not due to buffer overflow, but rather to link-layer contention
upon the reception of such notification, will drop some packets ac-
that is incurred by hidden terminals. Reference [3] showed that con-
cording to DNCP.
tention drops exhibit a load-sensitive loss feature: as the injected TCP
packets exceed   and further increase, the link dropping probability Simulation studies show that the NRED scheme can improve TCP
becomes non-negligible and increases accordingly; after the injected fairness to some extent in ad hoc networks. However, the price paid is
TCP packets exceed another threshold  , the link dropping probabil- that the aggregate throughput in the network is actually reduced, which
ity saturates and flattens out. It turns out that the link-layer dropping shows that there is room for further improvement.
probability is not significant enough to make the average TCP window
oscillate around   ; this circumstance subsequently leads to subopti- It is noteworthy that, besides the schemes described above, there
mal TCP throughput. are also some other IEEE 802.11 MAC–based TCP enhancement
schemes, such as DCF+ [12], AEDCF [28], and the non-work-
Therefore, two link-layer techniques were proposed in [3] to im- conserving scheduling algorithm [29]. By modifying the MAC pro-
prove TCP efficiency: a link random early detection (Link-RED) al- tocol, these schemes are shown to improve TCP throughput or fairness
gorithm to tune the wireless link’s packet dropping probability, and an to some degree.
adaptive link-layer pacing scheme to reduce the medium contention.
The Link-RED algorithm attempts to maintain the optimum conges-
tion window size at the TCP sender. At the link layer each node mea- IV. Conclusions and future research
sures the average number of retries for recent packet transmissions.
Normally, when the TCP sender increases the congestion window size
and injects more packets into the network, this average number will in- In this paper, we presented a brief survey of the challenges TCP has en-
crease, as more packets will aggravate medium contention. The head- countered in MANETs and recent efforts to improve its performance.
134 CAN. J. ELECT. COMPUT. ENG., VOL. 29, NO. 1/2, JANUARY/APRIL 2004

Because of certain inherent characteristics of MANETs, including References


time-varying wireless channels, medium collision, and mobility, tradi-
tional TCP, which performs well in fixed wired networks, suffers from
severe performance degradation in wireless networks. [1] H. Balakrishnan, V. Padmanabhan,S. Seshan, and R. Katz, “A comparison of mech-
anisms for improving TCP performance over wireless links,” in Proc. ACM SIG-
COMM’96, Aug. 1996.
Because the assumption made by TCP that any packet loss is due [2] M. Gerla, R. Bagrodia, L. Zhang, K. Tang, and L. Wang, “TCP over wireless multi-
to network congestion is not valid in ad hoc networks, either TCP hop protocols: Simulation and experiments,” in Proc. IEEE ICC’99, Vancouver,
B.C., June 1999.
should be capable of distinguishing various reasons for packet losses,
[3] Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, “The impact of multihop
or such non-congestion-related losses should be reduced. To enable wireless channel on TCP throughput and loss,” in Proc. IEEE INFOCOM’03, San
TCP to identify various causes of packet losses, there are largely two Francisco, Calif., Mar. 2003.
approaches, depending on whether or not network feedback informa- [4] Z. Fu, X. Meng, and S. Lu, “How bad TCP can perform in mobile ad-hoc networks,”
tion is used. Feedback-based schemes seem to be able to react more in Proc. IEEE Symp. Computers and Commun., Italy, July 2002.
quickly to non-congestion-related packet losses, and thus to be more [5] M. Gerla, K. Tang, and R. Bagrodia, “TCP performance in wireless multihop net-
works,” in Proc. IEEE WMCSA’99, New Orleans, La., Feb. 1999.
effective in enhancing TCP performance. However, the price to be paid
[6] S. Xu and T. Saadawi, “Does the IEEE 802.11 MAC protocol work well in multi-
is that they are more difficult to implement, since they require end hop wireless ad hoc networks?” IEEE Commun. Mag., vol. 39, no. 6, June 2001,
nodes and intermediate nodes to cooperate with each other. On the pp. 130–137.
other hand, approaches without feedback are relatively simple to im- [7] K. Sundaresan, V. Anantharaman, H.-Y. Hsieh, and R. Sivakumar, “ATP: A reliable
plement. However, the performance gain may not be high enough. transport protocol for ad-hoc networks,” in Proc. ACM Mobihoc, June 2003.
[8] J. Liu and S. Singh, “ATCP: TCP for mobile ad hoc networks,” IEEE J. Select.
Areas Commun., vol. 19, no. 7, July 2001, pp. 1300–1315.
Meanwhile, some solutions based on enhancing the link layer and [9] IEEE, “IEEE 802.11 wireless LAN medium access control (MAC) and physical
routing layer provide insights into how to reduce non-congestion- layer (PHY) specifications,” IEEE, 1999.
related losses in order to improve TCP’s performance. At the routing [10] K. Tang and M. Gerla, “Fair sharing of MAC under TCP in wireless ad hoc net-
layer, in an effort to help TCP avoid unnecessary congestion control, works,” in Proc. IEEE MMT’99, Venice, Italy, Oct. 1999.
some schemes have been proposed to reduce the negative impact of [11] E. Royer, S. J. Lee, and C. Perkins, “The effects of MAC protocols on ad hoc net-
mobility by minimizing the probability of route failures and the la- work communication,” in Proc. IEEE WCNC, Chicago, Ill., Sept. 2000.
tency in routing re-establishment. At the link layer, there are a few [12] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, “Performance of reliable transport
protocol over IEEE 802.11 wireless LAN: Analysis and enhancement,” in Proc.
algorithms attempting to reduce the contention at the MAC layer and IEEE INFOCOM 2002, 2002.
achieve less packet loss due to medium contention. [13] A. Ahuja, S. Agarwal, J.P. Singh, and R. Shorey, “Performance of TCP over dif-
ferent routing protocols in mobile ad-hoc networks,” in Proc. IEEE Veh. Technol.
Conf. 2000, vol. 3, Tokyo, Japan, 2000, pp. 2315–2319.
Although some encouraging improvements have been reported by
[14] T.D. Dyer and R.V. Boppana, “A comparison of TCP performance over three rout-
employing the proposed schemes, none of them work well in all sce- ing protocols for mobile ad hoc networks,” in Proc. ACM Mobihoc, Oct. 2001.
narios and meet all the challenges mentioned. Therefore, there is still [15] D-K. Kim, C.-K. Toh, and Y. Choi, “TCP-BuS: Improving TCP performance over
much work to do in the near future. To serve as guidance for future wireless ad hoc networks,” IEEE Comsoc J. Commun. Networks., vol. 3, no. 2, June
research, some critical issues regarding improving TCP performance 2001, pp. 1–12.
and fairness are identified as follows. [16] V.D. Park and M.S. Corson, “A highly adaptive distributed routing algorithm for
mobile wireless networks,” in Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997.
[17] J. Li, C. Blake, D.S.J. De Couto, H. Lee, and R. Morris, “Capacity of ad hoc wireless
A. TCP fairness networks,” in Proc. ACM MobiCom’01, Rome, Italy, July 2001.
In light of the considerable effort made to improve TCP end-to-end [18] H. Singh and S. Singh, “Energy consumption of TCP Reno, Newreno, and SACK
in multi-hop wireless networks,” in Proc. ACM SIGMETRICS’02, July 2002.
throughput, fairness is a critical issue that definitely deserves more at-
[19] I. Ali, R. Gupta, S. Bansal, A. Misra, A. Razdan, and R. Shorey, “Energy efficiency
tention. It has been shown that in a mobile network with multiple flows, and throughput for TCP traffic in multi-hop wireless networks,” in Proc. IEEE IN-
the throughput can be significantly different among competing flows. FOCOM’02, New York, 2002.
This variance is particularly evident when comparing flows of short [20] K. Chandran, S. Raghunathan, S. Venkatesan, and R. Prakash, “A feedback-based
paths to those of long paths. It is crucial for every flow to fairly share scheme for improving TCP performance in ad hoc wireless networks,” IEEE Pers.
Commun., vol. 8, no. 1, Feb. 2001, pp. 34–39.
the network resource in ad hoc networks, as the network capacity is
[21] G. Holland and N.H. Vaidya, “Analysis of TCP performance over mobile ad hoc
so limited compared with its counterpart in wired networks. Although networks,” in Proc. ACM MOBICOM’99, Seattle, Wash., Aug. 1999.
fairness is touched upon in a few existing schemes, a more mature ap- [22] J.P. Monks, P. Sinha, and V. Bharghavan, “Limitations of TCP-ELFN for ad hoc
proach is highly anticipated. networks,” in Proc. MOMUC 2000, 2002.
[23] Z. Fu, B. Greenstein, X. Meng, and S. Lu, “Design and implementation of a TCP-
friendly transport protocol for ad hoc wireless networks,” in Proc. IEEE ICNP’02,
B. Compatibility with the wired Internet Nov. 2002.
For the purpose of internetworking with the wired Internet, as will be [24] K. Chen, Y. Xue, and K. Nahrstedt, “On setting TCP’s congestion window limit in
required in future pervasive mobile computing, whatever TCP is de- mobile ad hoc networks,” in Proc. IEEE ICC’03, Anchorage, Ala., May 2003.
signed for ad hoc networks should be fully compatible with the Inter- [25] F. Wang and Y. Zhang, “Improving TCP performance over mobile ad-hoc networks
net. This quest for compatibility translates into two requirements for with out-of-order detection and response,” in Proc. ACM Mobihoc’02, Lausanne,
Switzerland, June 2002, pp. 217–225.
future research. First, TCP’s end-to-end semantics must be maintained.
[26] V. Anantharaman, S.-J. Park, K. Sundaresan, and R. Sivakumar, “TCP performance
Second, TCP performance should be considered when TCP connec- over mobile ad-hoc networks: A quantitative study,” to appear in Wireless Com-
tions span both the wired networks and mobile ad hoc networks. mun. and Mobile Comput. J., special issue on performance evaluation of wireless
networks, 2004.
[27] K. Xu, M. Gerla, L. Qi, and Y. Shu, “Enhancing TCP fairness in ad hoc wireless
C. Cross-layer solution networks using neighborhood RED,” in Proc. ACM MobiCom’03, Sept. 2003.
Although layered network architecture brings a myriad of advantages, [28] L. Romdhani, Q. Ni, and T. Turletti, “The effects of MAC protocols on ad hoc
the layered design approach is inefficient for wireless networks be- network communication,” in Proc. IEEE WCNC 2003, 2003.
cause there is a strong interconnection between layers in wireless net- [29] L. Yang, W.K.G. Seah, and Q. Yin, “Improving fairness among TCP flows crossing
wireless ad hoc and wired networks,” in Proc. ACM Mobihoc’03, June 2003.
works. Cross-layer design, where higher layers share the physical- and
[30] D.B. Johnson, D.A. Maltz, and Y. Hu, “The dynamic source routing protocol for
MAC-layer knowledge of the wireless medium, thus becomes promis- mobile ad hoc networks” [online], IETF Internet draft, Apr. 15, 2003, available
ing for more efficient network resource utilization and better quality- from World Wide Web: http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-
of-service provisioning [32]. To completely tackle TCP performance 
08.txt .
degradation over ad hoc networks, we believe the cross-layer approach [31] C.E. Perkins, E.M. Belding-Royer, and S. Das, “Ad hoc on demand distance vector
(AODV) routing,” IETF RFC 3561.
is worth exploring, as is evident since the causes for performance
[32] S. Shakkottai, T.S. Rappaport, and P.C. Karlsson, “Cross-layer design for wireless
degradation lie in the physical layer, the MAC layer, and the rout- networks,” IEEE Commun. Mag., vol. 41, no. 18, Oct. 2003, pp. 74–80.
ing layer.

You might also like