Tcp-Bus: Improving TCP Performance in Wireless Ad Hoc Networks
Tcp-Bus: Improving TCP Performance in Wireless Ad Hoc Networks
2, JUNE 2001 1
Abstract: Reliable data transmission over wireless multi-hop net- the presence of the time-varying link characteristics and node
works, called ad hoc networks, has proven to be non-trivial. TCP mobility issues. If a TCP source does not receive the acknowl-
(Transmission Control Protocol), a widely used end-to-end reliable edgement packets from the destination in a timely fashion, time-
transport protocol designed for wired networks, is not entirely suit- out events for the transmitted segments will occur. TCP assumes
able for wireless ad hoc networks due to the inappropriateness that congestion has occurred within the network and initiates the
of TCP congestion control schemes. Specifically, the TCP sender congestion control procedures. In general, TCP implements two
concludes that there is network congestion upon detecting packet
phases for congestion control, namely: (a) slow start, and (b)
losses or at time-outs. However, in wireless ad hoc networks, links
are broken as a result of node mobility and hence some time is
congestion avoidance.
needed to perform route reconfiguration. During this time, packets TCP slow start is a process through which the source initiates
could be lost or held back. Hence, the TCP sender could mistake data transmission. However at a certain point, the buffering and
this event as congestion, which is untrue. A route disconnection processing limits of intermediate routers in the route are reached
should be handled differently from network congestion. In this and packets will then be dropped. Congestion avoidance, on the
paper, we propose a new mechanism that improves TCP perfor- other hand, provides the means for the source to deal with lost
mance in a wireless ad hoc network where each node can buffer on- packets. The source detects congestion occurrences according
going packets during a route disconnection and re-establishment.
to two indications of packet losses: (a) when a timeout occurs,
In addition to distinguishing network congestion from route dis-
and (b) when duplicate ACKs are received. Currently, there are
connection due to node mobility, we also incorporate new measures
to deal with reliable transmission of important control messages
two widely used variants of TCP that can handle the above-
and exploitation of TCP fast recovery procedures. Our simulation mentioned problems: (a) TCP Tahoe [12], and (b) TCP Reno
compares the proposed TCP-BuS approach with general TCP and [13].
TCP-Feedback. Results reveal that TCP-BuS outperforms other Recently, most proposals for improving TCP performance
approaches in terms of communication throughput under the pres- have focused on the cellular-type wireless network (last-hop
ence of mobility. wireless network) [11], [14], where base stations play a signif-
icant role in providing wireless access by mobile users to the
Index Terms: TCP, Ad Hoc networks, transport protocols. fixed network. Distinct mobile connections are partitioned into
segments, one between the mobile host and base station, and the
other between the base station and the correspondent host. I-
I. INTRODUCTION TCP [8] and SNOOP [9] are examples of such schemes which
Wireless ad hoc network is a new mobile network infrastruc- employ the concept of distinct connection segments. In these
ture that can be used when the deployment of wired network approaches, the base station buffers the transferred TCP seg-
is expensive and time-consuming. This applies to battlefield, ments and masquerades the mobile hosts from the fixed side of
emergency rescue operations, and large-scale wireless confer- the network.
encing situations where all the nodes are mobile. In such net- However, since all nodes are movable in a wireless ad hoc
works, each host acts as a router to forward packets sent by the network, the route reconstruction procedures are frequently in-
source to the receiver. Recently, several proposals on efficient voked during data transmission due to node movements. It is
routing protocols were suggested for wireless ad hoc networks impossible that the buffering capability for masquerading is per-
[1]–[6]. However, reliable data transmission problem has not formed by the node detecting the route disconnection every time
yet been examined thoroughly. a route disconnection occurs. Moreover, route failure is un-
TCP (Transmission Control Protocol) [7] is widely used in avoidable due to the inherent nature of the wireless ad hoc net-
the current Internet as the reliable end-to-end transport proto- work. If the TCP used in existing wired networks is applied to
col. However, earlier research works [8]–[11] had confirmed wireless ad hoc networks, TCP performance will be degraded as
that TCP cannot be directly applied to wireless networks due to it cannot distinguish congestion from route failure. Thus, in this
paper, we propose a novel scheme for improving TCP perfor-
Manuscript received November 17, 2000; approved for publication by Jaiyong
Lee, Division III Editor, March 7, 2001. mance in wireless ad hoc networks by introducing buffering ca-
D. Kim and Y. Choi are with School of Computer Science and Engineering, pability in mobile nodes. Our proposed scheme takes advantage
Seoul National University, Seoul, Korea, e-mail: pretty@mmlab.snu.ac.kr, yh- of the feedback information for detecting a route disconnection
choi@mmlab.snu.ac.kr.
C.-K. Toh is with School of Electrical and Computer Engineering, Georgia In- (which is also used by TCP-F [10]) as well as the features of the
stitute of Technology, Atlanta, Georgia, U.S.A., e-mail: cktoh@ece.gatech.edu. underlying ad hoc routing protocol. In particular, we include in-
1229-2370/01/$10.00 c 2001 KICS
2 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.3, NO.2, JUNE 2001
telligent buffering techniques at mobile nodes. We selected the mance. In addition, TCP-F does not consider the possible loss
ABR (Associativity-Based Routing) [15], [16] protocol as the of RFN and RRN messages, which can influence TCP perfor-
underlying routing protocol, which is a form of source-initiated mance. Section IV will discuss this in detail.
on-demand protocol [17]. In addition, ABR advocates for stable
and long-lived routes.
The rest of this paper is organized as follows. Section II de- III. AD HOC ROUTING PROTOCOL
scribes the TCP-F scheme. Section III presents the basic opera-
tion of the ad hoc routing protocol referred to in this paper. Our Existing routing protocols for mobile ad hoc networks can
proposed TCP-BuS scheme is then described in detail in Section generally be categorized into two classes: (a) proactive, and (b)
IV, followed by simulation works in Section V. Some discussion reactive. In proactive scheme [1], all nodes maintain their rout-
is presented in Section VI. Finally, conclusions are made in Sec- ing tables for all possible destinations irrespective of the need of
tion VII. routes. However, in reactive scheme [15], routes in the source-
receiver pair are acquired in on-demand fashion by the source.
Therefore, it does not have to constantly maintain routing tables
II. RELATED WORK: TCP-FEEDBACK when there is no desire for routes. In [4], [6], some hybrid ap-
Since our proposed scheme is based on TCP-Feedback (de- proaches are presented to take advantages of both reactive and
noted by TCP-F) proposed by University of Texas at Dallas, we proactive schemes. In this paper, we focus our discussion on
shall briefly describe its operation in this section. TCP-F allows reactive-based routing protocols. We have developed a variation
the source to be informed of a route disconnection as a result of of TCP suitable for ABR (Associativity-Based Routing) [15],
node mobility (via the use of RFN: Route Failure Notification [16], which belongs to a class of reactive routing protocols.
message), so that the source does not unnecessarily invoke con- The ABR protocol is a source initiated on-demand routing
gestion control procedures, which can refrain the source from protocol where a route is established in on-demand fashion.
sending any further packets. This avoids the drop in commu- ABR consists of three phases; (a) Route Discovery Phase, (b)
nication throughput. The source then enters SNOOZE state. Route Reconstruction (RRC) Phase, and (c) Route Deletion
When the route is repaired, an RRN (Route Re-establishment Phase. As in most source-based routing protocols, the source
Notification) message is sent back to the source to inform that generates a route request packet (in ABR, BQ-Broadcast Query
communication can now resume. message). During a route discovery process, the route request
When the source enters SNOOZE state, it performs the fol- packet is replicated at the intermediate nodes. Therefore, the
lowing steps: destination is able to receive multiple route discovery packets
containing different routing path information. Among these col-
1. The source stops transmitting data packets (be it new or lected paths, the destination selects the best route based on se-
retransmitted). lection criteria. In ABR, longevity of a route is the main met-
2. The source freezes: (a) all of its timers, and (b) the current ric used for route selection. Thereafter, the destination conveys
congestion window size and values of other state variables the selected route information to the source by using route re-
such as the retransmission timer value. The source then ply packet (in ABR, REPLY message). ABR exploits the spa-
starts a Route Failure Timer, whose value will depend on tial, temporal and connection stability of mobile hosts to derive
the worst case route re-establishment time (i.e., the maxi- long-lived routes. Each node maintains associativity informa-
mum time needed to perform a successful route repair). tion with its neighbors by recording the number of control bea-
3. When the RRN message is received, data transmission is cons received from its neighbors. Each BQ packet includes as-
resumed, and all timers and state variables are restored. sociativity information of visited intermediate nodes during a
Although the above-mentioned steps perform well in a wire- route discovery process. Therefore, the destination can select
less ad hoc network, TCP-F is also a timer-based TCP im- the best long-lived route.
plementation. Once the route reconstruction is completed, it When the association property is violated (i.e., when nodes in
is possible that the data packets are retransmitted after time- a selected route move outside the radio range of its neighbors),
out because it takes a discrete amount of time to get the seg- the route reconstruction phase is initiated. Here, an alternative
ment acknowledgements back from the receiver. The slow start partial route has to be discovered so that data packets can ul-
threshold, ssthreshold, is also set to one-half of the frozen win- timately reach the destination. Fig. 2 illustrates an example of
dow size value, and the cwnd is set to one TCP segment value the route reconstruction phase. Due to mobility, a node can de-
[18]. This, therefore, results in a decrease in throughput perfor- tect that the path is broken when it does not receive any beacons
KIM et al.: TCP-BUS: IMPROVING TCP PERFORMANCE IN WIRELESS AD HOC NETWORKS 3
We examine two possible approaches. One way is to have tocol. Therefore, on detecting route failure, each TCP-BuS of
the source generate Probe messages periodically to check intermediate nodes along the existing path performs the corre-
if the PN has found a new partial route. This probing can sponding function enumerated in Section IV-A with the help of
continue until the source receives the ERSN message or ABR routing protocol in which some existing messages such
it times out. The other approach relies on the intermediate as LQ and REPLY are modified to contain the segment infor-
node to retransmit the ERSN message if it does not re- mation. In order to minimize the functions of ABR protocol,
ceive any data packets or an echoed ERSN message dur- TCP-BuS of each intermediate node is invoked to deal with the
ing ERSN RET TIMER after relaying the message to its route failure and congestion in this paper. The parameters and
upstream node. control messages are:
ERDN GEN SEQ: When an intermediate node detects a
B. Proposed Control Messages and Parameters route failure and it cannot forward the buffered data pack-
In this paper, the following control messages are introduced ets, ERDN GEN SEQ is defined as the sequence num-
to improve TCP performance (shown in Table 1). In addition, ber of the TCP segment pending in the head of line (HOL)
the system parameters related to the various timers are shown in of the node’s transmit queue. ERDN GEN SEQ infor-
Table 2. mation is propagated from the PN to the source via the
In source-initiated on-demand routing scheme (such as ABR), ERDN message.
“on-the-fly” packets transiting along the partial path from the ERDN RCV SEQ: When the source is transmitting TCP
PN to the destination are discarded during route reconstruction segments, if the source receives an ERDN message from
while other packets are buffered at intermediate nodes. We im- the network, the source stops sending TCP segments.
prove TCP performance by using sequence information and ad- ERDN RCV SEQ is defined as the sequence number of
ditional buffering capability at mobile hosts. the last TCP segment sent until the TCP source receives
Two approaches are considered to implement TCP-BuS. One an ERDN control packet.
is that in order to conserve the end-to-end semantics of TCP pro- Last ACK: During route reconstruction, the destination
tocol, ABR routing protocol is modified to generate additional responds to the LQ message with a REPLY. Last ACK is
control messages such as ERDN and ERSN with the param- therefore defined as the sequence number of the last seg-
eters of segment information and some messages such as LQ ment which the destination has received successfully.
and REPLY are extended to convey the segment information, By using ERDN GEN SEQ and ERDN RCV SEQ men-
and TCP-BuS (sender or receiver) performs the corresponding tioned above, the following information can be inferred:
functions enumerated in Section IV-A by dealing with events in-
voked by ABR protocol using several types of primitives used at The unacknowledged segments (buffered at the source) up
the interface between transport and network layers. The other is to the segment whose sequence number is (ERDN GEN
that each node (including intermediate nodes) is equipped with SEQ - 1), may be forwarded along the path from the node
TCP-BuS (i.e., transport layer), since each node acts as a router next to the PN towards the destination.
and an end-host in wireless ad hoc network even if a tranport Unacknowledged segments (buffered at the source)
protocol such as TCP is an end-to-end protocol and conventional whose sequence numbers are from ERDN GEN SEQ to
routers used in the wired networks do not have a transport pro- ERDN RCV SEQ may be buffered at intermediate nodes
KIM et al.: TCP-BUS: IMPROVING TCP PERFORMANCE IN WIRELESS AD HOC NETWORKS 5
Acknowledged 5
6 Nodes along the old path
7 5
8 6
9 7 5
5
10 8 6
11 9 6
12 7
13 RN
LQ(10) RN
ERDN(10) 14
10
11
ERSN(6) 12
7
13
8
14
9 7
15
8
Fig. 3. An example illustrating ERDN GEN SEQ and ERDN RCV SEQ mechanisms.
from the source to the PN. the source interprets that route re-establishment is successful.
The source is then able to resume data transmission according
to the TCP window-based mechanism.
C. Operation of TCP-BuS On receiving ERSN message after a successful route recon-
Since ad hoc routes can be invalidated by node movements, struction (i.e., after the PN node receives the REPLY mes-
we shall discuss the actions taken by TCP-BuS at the source, sage used in ABR, it generates the ERSN message with the
destination, and intermediate nodes to cope with host mobility. Last ACK parameter(6) that is extracted from REPLY mes-
sage.), the source can increase the congestion window (cwnd)
by the amount of the acknowledged packets. At the same time,
C.1 TCP-BuS Functions at Source Node
the source can safely assume that the segments whose sequence
At the source, TCP-BuS transmits its segments in the same numbers range from (Last ACK + 1) to (ERDN GEN SEQ -
manner as general TCP when there are no feedback messages 1) were discarded on the path from PN to the destination in the
(such as ERDN and ERSN messages). The slow start and network. It is obvious that these discarded packets should be
congestion avoidance mechanisms function as usual. However, retransmitted by the source. In Fig. 3, since ERSN message
when the source receives the ERDN feedback message from the includes the segment sequence number(6) up to which the desti-
network, it stops sending data packets. In addition, it freezes all nation has received successfully, the source becomes aware that
timer values and window sizes as in TCP-F. it should retransmit the segments from sequence number(7) to
Next, the ERDN GEN SEQ value is extracted from the sequence number(9) which have been discarded along the old
ERDN message and the ERDN RCV SEQ is calculated. As partial path. However, it depends on the congestion situation
an example (see Fig. 3), a pivoting node detects a route fail- over the path from the source to the PN. An ERSN message
ure when it has a segment(10) to transmit. The PN generates can include congestion state information notifying the status of
ERDN message containing the sequence number(10) of the seg- router’s queues at the intermediate nodes. One can make use of
ment in the head of line of its transmit queue. Therefore, when ICMP message such as Source Quench to indicate the presence
the source receives the ERDN message, ERDN GEN SEQ of congestion and the source will have to stop transmissions for
is set to 10. Meanwhile, the source has been sending seg- a short period of time during which the intermediate node can
ments up to the segment(14). From this, we can calculate catch up.
ERDN RCV SEQ which is set to 14. Additionally, the next Note that the timeout values at the TCP source for
downstream node from PN will send RN message towards the the unacknowledged and non-retransmitted segments from
destination, which invalidates the old partial path and flushes ERDN GEN SEQ to ERDN RCV SEQ should be adjusted
buffered packets along that path. Since ERDN message indi- because of the expected increase in the packet arrival time at
cates that there is a route failure in the network, the source just the destination due to the presence of route re-establishment.
waits for an ERSN message. On receiving this ERSN message, However, if packet losses are experienced on the partial path
6 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.3, NO.2, JUNE 2001
Incoming Packet
Y
TCP Segment LQ received ?
Y Recv_LQ = 1
N Recv_LQ = 1 ? Pass the packet to TCP module
Pivot_value = ERDN_GEN_SEQ
Normal Processing N
Y Cnd. (1)
Y N Normal Processing
Cnd. (2)
Notify_SACK() In Normal Processing, the Fast Retransmission Request is allowed and Recv_LQ is reset to be 0.
incoming_seq = Pivot_value
0.85 0.5
TCP-BuS TCP-BuS
TCP-F TCP-F
0.8 General TCP 0.45 General TCP
0.75
0.4
0.7
0.35
0.65
Delivery Rate
Delivery Rate
0.3
0.6
0.25
0.55
0.2
0.5
0.15
0.45
0.4 0.1
0.35 0.05
6 8 10 12 14 16 18 5 10 15 20 25
The length of Route (hops) Frequency of Route Failure
Fig. 7. TCP throughput with respect to route length. Fig. 8. TCP throughput with respect to frequency of route failures.
0.4
TCP-BuS
route failures occurred 20 times, where each route failure lasts TCP-F
General TCP
for 10 seconds. As shown in Fig. 7, a longer route makes a 0.35
15% and 30%, respectively. TCP-F and General TCP have sim-
ilar throughput at longer routes due to the operation of timeout
Delivery Rate
0.25
the path from the source to the PN. In our simulation, random
links over the path experience congestion. We assume that con- 0.05
2 4 6 8 10 12 14
gestion has occurred 20 times during the simulation time. We Congestion Duration (seconds)
set a congestion duration of 10 seconds over randomly selected Fig. 9. TCP throughput with respect to congestion duration.
links. To better differentiate the difference of throughput of TCP
schemes, initially, we choose a maximum window size and the
ssthreshold of 60 segments and 30 segments, respectively. As route reconstruction. These events can lower communication
shown in Fig. 8, the throughput of each TCP implementation throughput. Because TCP-BuS deals with buffered data packets
decreases as the frequency of route failures increases. In case according to previously mentioned four modifications, it yields
of TCP-F and TCP-BuS, frequent route failures cause the TCP better performance than other schemes.
source to stay longer in IDLE state. However, for General TCP, In the third simulation test, we measured the impact of con-
slow start procedures due to timeout events were invoked many gestion duration on TCP throughput. Thanks to the selec-
times. These events have a negative effect on the throughput tive retransmission mechanism for the lost packets after route
performance. However, among all the three schemes examined, reestablishment, TCP-BuS shows better performance than other
TCP-BuS shows the best performance, especially at high fre- schemes. The longer the congestion exists, the resultant delivery
quency of route failures (average 10% and 30% improvement rate is lower. TCP-BuS shows the better performance by using
over TCP-F and General TCP, respectively). the early selective retransmission scheme instead of relying on
Furthermore, because delay is incurred to complete the the timeout mechanism used by other schemes (see Fig. 9).
route recovery process, General TCP experienced many time- We also traced TCP segments sequences observed at the
out events, resulting in substantial throughput degradation due source to study the behavior of TCP-BuS, TCP-F, and General
to false activation of congestion control mechanisms. In TCP- TCP (see Fig. 10). In TCP-F and TCP-BuS, the discontinuities
F, although the TCP-F source stops sending further data packet of the curves shown in Fig. 10 represent cases of route fail-
on detection of route failure, it invalidates every packets that are ures, where the source stops further transmission of data pack-
buffered at nodes on the old route, resulting in heavy retransmis- ets. In General TCP, even if an intermediate node is performing
sions of these packets. In addition, although the TCP-F source a route recovery process, because the source is not notified of
freezes all the variables related to timer values, it may still expe- the route failure, it still continues to transmit data packets. This
rience timeout events because some time is needed to perform results in lower throughput than TCP-F and TCP-BuS. Discon-
KIM et al.: TCP-BUS: IMPROVING TCP PERFORMANCE IN WIRELESS AD HOC NETWORKS 9
800
tinuity periods are observed because the source uses a window TCP-BuS
Segment Sequence
segment retransmissions after route reconstruction as mentioned
above. Overall, TCP-BuS exhibits fast increments in segment 400
sequences which makes an improvement in TCP throughput.
In addition, the congestion window size for each TCP scheme 300
over the partial path from the source to the PN. As shown in
400
Fig. 12, TCP-BuS yields better performance than other schemes
irrespective of the location of link failure. It is observed that 300
TCP-F and General TCP show similar performance when link
failure occurs at a location far away from the source. This is be- 200
cause both schemes cannot send further data packets due to the
limitation of the sender window size before it is notified of route 100
mance.
Lastly, we examine the impact of control message (ERSN) 400
60 0.5
TCP-BuS TCP-BuS
TCP-F TCP-F
General TCP 0.45 General TCP
50
0.4
Congestion Window Size (Segments)
40 0.35
Delivery Rate
0.3
30
0.25
20 0.2
0.15
10
0.1
0 0.05
700 750 800 850 900 950 1000 20 30 40 50 60 70 80 90 100
Simulation Time (seconds) Maximum Window Size (segments)
Fig. 11. Trace of congestion window size. Fig. 13. Comparisons of TCP throughput according to maximum window
size.
0.4
TCP-BuS 0.6
TCP-F Intermediate node’s Retransmission
General TCP Sender’s Retransmission
0.35 0.55
0.5
0.3
0.45
Delivery Rate
0.25 0.4
Delivery Rate
0.35
0.2
0.3
0.15
0.25
0.2
0.1
0.15
0.05
3 4 5 6 7 8 9 10 11 12 0.1
Position of Link Failure 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Prob[ERSN is lost over a wireless link]
Fig. 12. Comparisons of TCP throughput according to location of link
failure. Fig. 14. Impact of control message transmission reliability on TCP
throughput.
VI. DISCUSSION cols and hence it is not specific to ABR even if this paper applied
This paper identified the need to communicate routing infor- TCP-BuS to ABR protocol. It is important to realize that as we
mation to the transport layer in wireless ad hoc networks. Thus, move into new networking platforms, new or enhanced proto-
TCP-BuS takes advantage of the underlying routing protocol cols will be evolved. Future research includes addressing the
(especially with source-initiated on-demand routing protocol) internetworking issues of a TCP connection that spans from a
efficiently for improving the performance of TCP protocol. TCP fixed wired network to an ad hoc wireless network. An inter-
has traditionally been used in wired networks where intermedi- networking function unit, for example, gateway, may be needed
ate routes in the route are not mobile. This implies that TCP can- to transform the function of traditional TCP into TCP-BuS and
not be used for wireless ad hoc networks since multiple wireless vice verse (see Fig. 15).
links are now present and routers are mobile. Past research in
supporting TCP over wireless last-hop cellular has been to split
VII. CONCLUSIONS
TCP connections into segments. An example of such work is
Indirect-TCP [8]. Even Indirect-TCP breaks the so called “end- In this paper, we examine issues related to TCP communica-
to-end semantics” of TCP. One cannot force traditional proto- tions over ad hoc wireless networks. In particular, we reveal the
cols designed for wired networks to work in mobile networks confusion faced by a TCP sender - that of delay and packet loss
without modifications or enhancements. TCP-BuS, therefore, is due to route reconstruction as a result of host mobility and that of
one such protocol that enables TCP applications to be supported network congestion. We improve TCP performance by propos-
in an wireless ad hoc network environment and at the same time ing intelligent buffering and sequence checking techniques.
enhancing TCP performance. The advantages of TCP-BuS can We introduce the ERDN GEN SEQ and ERDN RCV SEQ
be exploited by most source-initiated on-demand routing proto- mechanism, which adjusts timeout values to compensate for
KIM et al.: TCP-BUS: IMPROVING TCP PERFORMANCE IN WIRELESS AD HOC NETWORKS 11
CH IWF MT
route reconstruction time, and avoids unnecessary requests for [15] C.-K. Toh, “Associativity based routing for Ad Hoc mobile networks,”
fast retransmission and selective retransmission of lost packets. Wireless Personal Commun. J., (Special Issue on Mobile Networking &
Computing Systems), vol. 4, no. 2, Mar. 1997.
In addition, we incorporate new measures to deal with reliable [16] C.-K. Toh, “A novel distributed routing protocol for multimedia wireless
transmission of important control messages used to inform the LANs,” in Proc. IPCCC’96, Arizona, USA, Mar. 1996.
source about mobility and status of route reconstruction. We [17] E. Royer and C.-K. Toh, “A review of current routing protocols for Ad
Hoc mobile wireless networks,” IEEE Personal Commun. Mag., pp. 46–
compare the performance of our proposed TCP-BuS Scheme 55, Apr. 1999.
with that of other TCP implementations (TCP-F and General [18] K. Fall and S. Floyd, “Comparisons of Tahoe, Reno and SACK TCP,” Mar.
TCP) via simulation. Simulation results demonstrate that TCP- 1996. Available at ftp://ftp.ee.lbl.gov.
[19] M. H. MacDougall, “Simulating computer systems: Techniques and
BuS outperforms the others in terms of throughput under differ- tools,” The MIT Press, 1987.
ent conditions (route length, frequency of route failures, conges- [20] P. Karn and C. Partridge, “Improving round trip time estimate in reliable
tion duration, and location of link failure). transport protocols,” in Proc. ACM SIGCOMM’87, 1987.
ACKNOWLEDGMENTS
This work was supported in part by the Brain Korea 21 project Dongkyun Kim received B.S. at Department of Com-
of Ministry of Education, in part by the National Research Lab- puter Engineering, Kyungpook National University,
and M.S. at Department of Computer Engineering,
oratory project of Ministry of Science and Technology, and in Seoul National University. Now, he is a Ph.D. can-
part by Agency of Defense Development, 2000, Korea. This pa- didate at School of Computer Science and Engineer-
per is an extended version of our paper to be presented at IEEE ing, Seoul National University. He has been a visiting
scholar to Georgia Institute of Technology, supervised
ICC 2000, New Orleans, 2000. by Dr. Toh since 1999. Also, he is a vice-chair of the
IEEE TCPC Subcommittee on Ad Hoc Wireless Net-
working. His research interest is in High-speed Net-
REFERENCES works, Wireless Ad Hoc Network, Internet Protocols,
and Future Wireless Networks.
[1] C. Perkins and P. Bhagwat, “Highly dynamic destination sequenced dis-
tance vector routing (DSDV) for mobile computers,” in Proc. ACM SIG-
COMM’94, 1994.
[2] M. Gerla and J. T. Tsai, “Multicluster, mobile, multimedia radio network,”
Wireless Networks, vol. 1, pp. 255–265, 1995.
[3] D. K. Kim, S. J. Ha and Y. Choi, “K-hop cluster-based dynamic source C.-K. Toh was educated at the EEE department, Uni-
routing in wireless Ad-Hoc packet radio network,” in Proc. IEEE VTC’98, versity of Manchester Institute of Science & Technol-
1998. ogy and the Computer Laboratory, Cambridge Univer-
[4] Z. J. Haas and M. R. Pearlman, “The zone routing protocol (ZRP) for Ad sity, England, in Electrical Engineering and Computer
Hoc networks,” draft-ietf-manet-zone-zrp-02.txt, June, 1999. Science. Dr. Toh is the inventor of the Cambridge Ad
[5] Z. J. Haas, “A new routing protocol for the reconfigurable wireless net- Hoc mobile routing protocol, which was awarded a
works,” in Proc. IEEE ICUPC’97, 1997. US patent. He authored the book on “Wireless ATM &
[6] D. K. Kim, S. J. Ha, and Y. Choi, “Variable-sized cluster-based dynamic Ad-Hoc Networks” which was published by Kluwer
source routing protocol in wireless Ad-Hoc Network with variable trans- Academic Press in 1996. Dr. Toh is an Editor for
mission ranges,” in Proc. IEEE VTC’99, Houston, USA, 1999. IEEE Journal on Selected Areas in Communications
[7] D. E. Comer, Internetworking with TCP/IP, vol. 1, Principles, Protocols, (JSAC), an Area Editor on wireless networking for
and Architecture, Fourth ed., 2000. IEEE Communications Survey Journal, a Feature Editor for ACM Mobile Com-
[8] A. Bakre and B. Badrinath, “I-TCP: Indirect TCP for mobile hosts,” puting & Communications Review and serves as an Editorial Board member
ICDCS, 1995. for IEEE Network Magazine, Journal of Communications & Networks (IEEE
[9] H. Balakrishnan et al., “Improving TCP/IP performance over wireless net- COMSoc), and Springer-Verlag Personal Technologies Journal. He serves as a
works,” MOBICOM’95, 1995. Technical Chair and Technical Program Committee Member for several IEEE
[10] K. Chandran et al., “A feedback based scheme for improving TCP perfor- and ACM conferences. As of 1998, he joined Georgia Institute of Technology,
mance in Ad-Hoc wireless networks,” ICDCS, 1998. School of Electrical and Computer Engineering, directing the Mobile Multi-
[11] R. Cacares and L. Iftode, ”Improving the performance of reliable trans- media and Networking Laboratory. In May 2000, he was named GeorgiaTech
port protocols in mobile computing environments,” IEEE J. Select. Areas Teaching Fellow. He is also founder and director of the Ad Hoc Wireless Net-
Commun., (Special Issue on Mobile Computing Networks), 1994. working and Computing Consortium. Prof. Toh is a Chartered Electrical Engi-
[12] V. Jacobson, “Congestion avoidance and control,” in Proc. ACM SIG- neer, of IEE UK and a registered Chartered Engineer (CEng) of the Engineering
COMM’88, Stanford, Aug. 1988. Council, London. Prof. Toh is acting Chairman of the newly formed IEE (UK)
[13] W. Stevens, “TCP slow start, congestion avoidance, fast retransmit, and Atlanta Center based in Atlanta, Georgia. Currently, he serves as Chairman of
fast recovery algorithms,” RFC 2001, Jan. 1997. IEEE TCPC Subcommittee on Ad Hoc Mobile Wireless Networks. He is listed
[14] A. Seneviratne et al., “Cellular networks and mobile internet,” Computer in MARQUIS Who’sWho in the World and Who’sWho in Science and Engi-
Commun., vol. 21, pp. 1244–1255, 1998. neering.
12 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.3, NO.2, JUNE 2001