57 research outputs found

    Network Coded TCP (CTCP) Performance over Satellite Networks

    Get PDF
    We show preliminary results for the performance of Network Coded TCP (CTCP) over large latency networks. While CTCP performs very well in networks with relatively short RTT, the slow-start mechanism currently employed does not adequately fill the available bandwidth when the RTT is large. Regardless, we show that CTCP still outperforms current TCP variants (i.e., Cubic TCP and Hybla TCP) for high packet loss rates (e.g., >2.5%). We then explore the possibility of a modified congestion control mechanism based off of H-TCP that opens the congestion window quickly to overcome the challenges of large latency networks. Preliminary results are provided that show the combination of network coding with an appropriate congestion control algorithm can provide gains on the order of 20 times that of existing TCP variants. Finally, we provide a discussion of the future work needed to increase CTCP's performance in these networks.Comment: 4 pages, 4 figures, Accepted at SPACOMM 201

    Fast-timescale Control Strategies for Demand Response in Power Systems.

    Full text link
    Concerns over climate change have spurred an increase in the amount of wind and solar power generation on the grid. While these resources reduce carbon emissions, the physical phenomena that they rely on - wind and sunlight - are highly stochastic, making their generated power less controllable. Demand-side strategies, which modulate load in a controllable manner, have been proposed as a way to add flexibility to the grid. Resources with innate flexibility in their load profile are particularly suited to demand response (DR) applications. This work examines two such loads: heating, ventilation, and air conditioning (HVAC) systems, and plug-in electric vehicle (PEV) fleets. HVAC systems can vary the timing of power consumption due to the thermal inertia inherent in their associated building(s). The first part of this thesis explores the efficacy of using commercial HVAC for DR applications. Results are presented from an experimental testbed that quantify performance, in terms of accuracy in perturbing the load in a desired manner, as well as the efficiency of this process. PEVs offer very fast response times and may eventually represent a significant load on the power system. The second part of this thesis develops several control strategies to manage PEV power consumption in an environment where communication resources are limited, both to prevent detrimental system effects such as transformer overload, and to provide ancillary services such as frequency regulation to the grid.PhDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/116627/1/ianbeil_1.pd

    STCP: A New Transport Protocol for High-Speed Networks

    Get PDF
    Transmission Control Protocol (TCP) is the dominant transport protocol today and likely to be adopted in future high‐speed and optical networks. A number of literature works have been done to modify or tune the Additive Increase Multiplicative Decrease (AIMD) principle in TCP to enhance the network performance. In this work, to efficiently take advantage of the available high bandwidth from the high‐speed and optical infrastructures, we propose a Stratified TCP (STCP) employing parallel virtual transmission layers in high‐speed networks. In this technique, the AIMD principle of TCP is modified to make more aggressive and efficient probing of the available link bandwidth, which in turn increases the performance. Simulation results show that STCP offers a considerable improvement in performance when compared with other TCP variants such as the conventional TCP protocol and Layered TCP (LTCP)

    Analysis of TCP performance for LTE-5G Millimeter Wave Dual Connectivity

    Get PDF
    The goal of this work is the analysis of the performance of the transport control protocol (TCP) in a Dual connectivity (DC) system, where both LTE and 5G millimeter wave (mmWave) were used in the radio access network, while a single user travels across the scenario. Since the user is moving, the interaction between the mmWave base stations (BSs) must be very efficient to avoid congestion events. This makes the analysis of DC very important. Simulation models based on open-source software frameworks were used to evaluate the performance of Dual connectivity for a 5G non-standalone (NSA) solution, where all the 5G base station traffic goes through the LTE base station. The scenarios proposed were defined in terms of non-line-of-sight/line-of-sight (NLOS/LOS) scenario, medium/high traffic, which are used to evaluate different TCP congestion control algorithms. The performance was then evaluated in terms of goodput, packet delivery ratio, standard deviation of bytes in-flight, and round-trip time. Simulation results showed that the number of bytes in-flight grows with high rates and large latencies caused by inter-BS communication. The mmWave medium is very sensitive to channel conditions specially in the middle point between mmWave BSs causing ping-pong effect during a handover (HO). At the beginning of the simulation some nodes overflow due to the aggressive slow start mechanisms, which turn to be very problematic for high traffic rates. In that sense, TCP Cubic proves to be a much reliable congestion control algorithm since it implements a hybrid slow start method

    Medium access control, error control and routing in underwater acoustic networks: a discussion on protocol design and implementation

    Get PDF
    The journey of underwater communication which began from Leonardo’s era took four and a half centuries to find practical applications for military purposes during World War II. However, over the last three decades, underwater acoustic communications witnessed a massive development due to the advancements in the design of underwater communicating peripherals and their supporting protocols. Successively, doors are opened for a wide range of applications to employ in the underwater environment, such as oceanography, pollution monitoring, offshore exploration, disaster prevention, navigation assistance, monitoring, coastal patrol and surveillance. Different applications may have different characteristics and hence, may require different network architectures. For instance, routing protocols designed for unpartitioned multi-hop networks are not suitable for Delay-Tolerant Networks. Furthermore, single-hop networks do not need routing protocols at all. Therefore, before developing a protocol one must study the network architecture properly and design it accordingly. There are several other factors which should also be considered with the network architecture while designing an efficient protocol for underwater networks, such as long propagation delay, limited bandwidth, limited battery power, high bit error rate of the channel and several other adverse properties of the channel, such as, multi-path, fading and refractive behaviors. Moreover, the environment also has an impact on the performance of the protocols designed for underwater networks. Even temperature changes in a single day have an impact on the performance of the protocols. A good protocol designed for any network should consider some or all of these characteristics to achieve better performance. In this thesis, we first discuss the impact of the environment on the performance of MAC and routing protocols. From our investigation, we discover that even temperature changes within a day may affect the sound speed profile and hence, the channel changes and the protocol performance vary. After that we discuss several protocols which are specifically designed for underwater acoustic networks to serve different purposes and for different network architectures. Underwater Selective Repeat (USR) is an error control protocol designed to assure reliable data transmission in the MAC layer. One may suspect that employing an error control technique over a channel which already suffers from long propagation delays is a burden. However, USR utilizes long propagation by transmitting multiple packets in a single RTT using an interlacing technique. After USR, a routing protocol for surveillance networks is discussed where some sensors are laid down at the bottom of the sea and some sinks are placed outside the area. If a sensor detects an asset within its detection range, it announces the presence of intruders by transmitting packets to the sinks. It may happen that the discovered asset is an enemy ship or an enemy submarine which creates noise to jam the network. Therefore, in surveillance networks, it is necessary that the protocols have jamming resistance capabilities. Moreover, since the network supports multiple sinks with similar anycast address, we propose a Jamming Resistance multi-path Multi-Sink Routing Protocol (MSRP) using a source routing technique. However, the problem of source routing is that it suffers from large overhead (every packet includes the whole path information) with respect to other routing techniques, and also suffers from the unidirectional link problem. Therefore, another routing protocol based on a distance vector technique, called Multi-path Routing with Limited Cross-Path Interference (L-CROP) protocol is proposed, which employs a neighbor-aware multi-path discovery algorithm to support low interference multiple paths between each source-destination pair. Following that, another routing protocol is discussed for next generation coastal patrol and surveillance network, called Underwater Delay-Tolerant Network (UDTN) routing where some AUVs carry out the patrolling work of a given area and report to a shore based control-center. Since the area to be patrolled is large, AUVs experience intermittent connectivity. In our proposed protocol, two nodes that understand to be in contact with each other calculate and divide their contact duration equally so that every node gets a fair share of the contact duration to exchange data. Moreover, a probabilistic spray technique is employed to restrict the number of packet transmissions and for error correction a modified version of USR is employed. In the appendix, we discuss a framework which was designed by our research group to realize underwater communication through simulation which is used in most of the simulations in this thesis, called DESERT Underwater (short for DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols). It is an underwater extension of the NS-Miracle simulator to support the design and implementation of underwater network protocols. Its creation assists the researchers in to utilizing the same codes designed for the simulator to employ in actual hardware devices and test in the real underwater scenario

    On the impact of link layer retransmission schemes on TCP over 4G satellite links

    Get PDF
    We study the impact of reliability mechanisms introduced at the link layer on the performance of transport protocols in the context of 4G satellite links. Specifically, we design a software module that performs realistic analysis of the network performance, by utilizing real physical layer traces of a 4G satellite service. Based on these traces, our software module produces equivalent link layer traces, as a function of the chosen link layer reliability mechanism. We further utilize the link layer traces within the ns-2 network simulator to evaluate the impact of link layer schemes on the performance of selected Transmission Control Protocol (TCP) variants. We consider erasure coding, selective-repeat automatic request (ARQ) and hybrid-ARQ link layer mechanisms, and TCP Cubic, Compound, Hybla, New Reno and Westwood. We show that, for all target TCP variants, when the throughput of the transport protocol is close to the channel capacity, using the ARQ mechanism is most beneficial for TCP performance improvement. In conditions where the physical channel error rate is high, hybrid-ARQ results in the best performance for all TCP variants considered, with up to 22% improvements compared to other schemes

    Control and Optimization of Energy Storage in AC and DC Power Grids

    Get PDF
    Energy storage attracts attention nowadays due to the critical role it will play in the power generation and transportation sectors. Electric vehicles, as moving energy storage, are going to play a key role in the terrestrial transportation sector and help reduce greenhouse emissions. Bulk hybrid energy storage will play another critical role for feeding the new types of pulsed loads on ship power systems. However, to ensure the successful adoption of energy storage, there is a need to control and optimize the charging/discharging process, taking into consideration the customer preferences and the technical aspects. In this dissertation, novel control and optimization algorithms are developed and presented to address the various challenges that arise with the adoption of energy storage in the electricity and transportation sectors. Different decentralized control algorithms are proposed to manage the charging of a mass number of electric vehicles connected to different points of charging in the power distribution system. The different algorithms successfully satisfy the preferences of the customers without negatively impacting the technical constraints of the power grid. The developed algorithms were experimentally verified at the Energy Systems Research Laboratory at FIU. In addition to the charge control of electric vehicles, the optimal allocation and sizing of commercial parking lots are considered. A bi-layer Pareto multi-objective optimization problem is formulated to optimally allocate and size a commercial parking lot. The optimization formulation tries to maximize the profits of the parking lot investor, as well as minimize the losses and voltage deviations for the distribution system operator. Sensitivity analysis to show the effect of the different objectives on the selection of the optimal size and location is also performed. Furthermore, in this dissertation, energy management strategies of the onboard hybrid energy storage for a medium voltage direct current (MVDC) ship power system are developed. The objectives of the management strategies were to maintain the voltage of the MVDC bus, ensure proper power sharing, and ensure proper use of resources, where supercapacitors are used during the transient periods and batteries are used during the steady state periods. The management strategies were successfully validated through hardware in the loop simulation

    Congestion mitigation in LTE base stations using radio resource allocation techniques with TCP end to end transport

    Get PDF
    As of 2019, Long Term Evolution (LTE) is the chosen standard for most mobile and fixed wireless data communication. The next generation of standards known as 5G will encompass the Internet of Things (IoT) which will add more wireless devices to the network. Due to an exponential increase in the number of wireless subscriptions, in the next few years there is also an expected exponential increase in data traffic. Most of these devices will use Transmission Control Protocol (TCP) which is a type of network protocol for delivering internet data to users. Due to its reliability in delivering data payload to users and congestion management, TCP is the most common type of network protocol used. However, the ability for TCP to combat network congestion has certain limitations especially in a wireless network. This is due to wireless networks not being as reliable as fixed line networks for data delivery because of the use of last mile radio interface. LTE uses various error correction techniques for reliable data delivery over the air-interface. These cause other issues such as excessive latency and queuing in the base station leading to degradation in throughput for users and congestion in the network. Traditional methods of dealing with congestion such as tail-drop can be inefficient and cumbersome. Therefore, adequate congestion mitigation mechanisms are required. The LTE standard uses a technique to pre-empt network congestion by a mechanism known as Discard Timer. Additionally, there are other algorithms such as Random Early Detection (RED) that also are used for network congestion mitigation. However, these mechanisms rely on configured parameters and only work well within certain regions of operation. If the parameters are not set correctly then the TCP links can experience congestion collapse. In this thesis, the limitations of using existing LTE congestion mitigation mechanisms such as Discard Timer and RED have been explored. A different mechanism to analyse the effects of using control theory for congestion mitigation has been developed. Finally, congestion mitigation in LTE networks has been addresses using radio resource allocation techniques with non-cooperative game theory being an underlying mathematical framework. In doing so, two key end-to-end performance measurements considered for measuring congestion for the game theoretic models were identified which were the total end-to-end delay and the overall throughput of each individual TCP link. An end to end wireless simulator model with the radio access network using LTE and a TCP based backbone to the end server was developed using MATLAB. This simulator was used as a baseline for testing each of the congestion mitigation mechanisms. This thesis also provides a comparison and performance evaluation between the congestion mitigation models developed using existing techniques (such as Discard Timer and RED), control theory and game theory. As of 2019, Long Term Evolution (LTE) is the chosen standard for most mobile and fixed wireless data communication. The next generation of standards known as 5G will encompass the Internet of Things (IoT) which will add more wireless devices to the network. Due to an exponential increase in the number of wireless subscriptions, in the next few years there is also an expected exponential increase in data traffic. Most of these devices will use Transmission Control Protocol (TCP) which is a type of network protocol for delivering internet data to users. Due to its reliability in delivering data payload to users and congestion management, TCP is the most common type of network protocol used. However, the ability for TCP to combat network congestion has certain limitations especially in a wireless network. This is due to wireless networks not being as reliable as fixed line networks for data delivery because of the use of last mile radio interface. LTE uses various error correction techniques for reliable data delivery over the air-interface. These cause other issues such as excessive latency and queuing in the base station leading to degradation in throughput for users and congestion in the network. Traditional methods of dealing with congestion such as tail-drop can be inefficient and cumbersome. Therefore, adequate congestion mitigation mechanisms are required. The LTE standard uses a technique to pre-empt network congestion by a mechanism known as Discard Timer. Additionally, there are other algorithms such as Random Early Detection (RED) that also are used for network congestion mitigation. However, these mechanisms rely on configured parameters and only work well within certain regions of operation. If the parameters are not set correctly then the TCP links can experience congestion collapse. In this thesis, the limitations of using existing LTE congestion mitigation mechanisms such as Discard Timer and RED have been explored. A different mechanism to analyse the effects of using control theory for congestion mitigation has been developed. Finally, congestion mitigation in LTE networks has been addresses using radio resource allocation techniques with non-cooperative game theory being an underlying mathematical framework. In doing so, two key end-to-end performance measurements considered for measuring congestion for the game theoretic models were identified which were the total end-to-end delay and the overall throughput of each individual TCP link. An end to end wireless simulator model with the radio access network using LTE and a TCP based backbone to the end server was developed using MATLAB. This simulator was used as a baseline for testing each of the congestion mitigation mechanisms. This thesis also provides a comparison and performance evaluation between the congestion mitigation models developed using existing techniques (such as Discard Timer and RED), control theory and game theory
    corecore