Mod5 Transport Layer
Mod5 Transport Layer
• These traditional wired transport layer protocols are not suitable for ad
hoc wireless networks due to the inherent problems associated with
the latter.
• Induced Traffic
– Traffic at any given link (or path) due to the traffic through neighboring links
(or paths) is referred to as induced traffic.
• Misinterpretation of congestion
– Traditional mechanisms of detecting congestion in networks, such as
packet loss and retransmission timeout, are not suitable for detecting the
network congestion in ad hoc wireless networks.
– This is because the high error rates of wireless channel, location-
dependent.
– Contention, hidden terminal problem, packet collisions in the network,
path breaks due to the mobility of nodes, and node failure due to a
drained battery can also lead to packet loss in ad hoc wireless networks.
• Dynamic topology
– Some of the deployment scenarios of ad hoc wireless networks
experience rapidly changing network topology due to the mobility of
nodes.
– This can lead to frequent path breaks, partitioning and remerging of
networks, and high delay in reestablishment of paths.
• Uni-directional path
– Traditional TCP relies on end-to-end ACK for ensuring reliability. Since
the ACK packet is very short compared to a data segment, ACKs
consume much less bandwidth in wired networks.
– In ad hoc wireless networks, every TCP ACK packet requires RTS-CTS-
Data-ACK exchange in case IEEE 802.11 is used as the underlying MAC
protocol.
– This can lead to an additional overhead of more than 70 bytes if there
are no retransmissions. This can lead to significant bandwidth
consumption on the reverse path, which may or may not contend with
the forward path.
– If the reverse path contends with the forward path, it can lead to the
reduction in the throughput of the forward path.
– A path break on an entirely different reverse path can affect the
performance of the network as much as a path break in the forward
path.
• Multipath routing
– There exists a set of QoS routing and best-effort routing
protocols that use multiple paths between a source-
destination pair.
– There are several advantages in using multipath routing.
Some of these advantages include the reduction in route
computing time, the high resilience to path breaks, high
call acceptance ratio, and better security.
– For TCP, these advantages may add to throughput
degradation. These can lead to a significant amount of out-
of-order packets, which in turn generates a set of duplicate
acknowledgments (DUPACKs) which cause additional
power consumption and invocation of congestion control.