Professional Documents
Culture Documents
Abstract: This paper focuses on the existing vulnerability of the receiver, link sender keeps track of the all
speed mismatch and sluggish performance of TCP/IP when used unacknowledged packets by maintaining a buffer known as
with wireless medium. This paper highlights the unaware transmission buffer. Re-Transmission list is also attached
approach with the implementation of Transport Unaware Link with the buffer to keep the list of packets to be retransmitted.
Improvement Protocol (TULIP) as the probable solution to the
degraded performance of TCP/IP with Wireless Medium as
1.1 TULIP Operations
Channel of Communication. TULIP protocol portrays the
problems associated with TCP/IP when used with the wireless 1. Sender sends a packet to the receiver.
media. TULIP protocol is useful in the detection and
retransmission of lost packets so as to enable reliable 2. Sender then waits for the acknowledgment of the packet.
communication between client and server. This protocol is state- 3. Sender maintains a transmission buffer for fast delivery of
full as it keeps track of the packets and corresponding fragments packets and retransmission list to ensure reliability of
of packets so as to ensure that only after the complete
communication
acknowledgment of all fragments packet is forwarded. TULIP
makes use of buffered system to increase the performance of
4. Whenever acknowledgment is not received by the sender,
transmission and omit all the associated problems related to it retransmits the same packet again.
transmission by supporting queue based retransmission 5. Before sending the new packet, sender firstly verifies the
mechanism. TULIP makes utilizes multiple buffers to ensure contents of the retransmission list, so in this way higher
timely delivery of packets and it also aids in error correction priority is always given to the lost packets.
before the actual transmission of the packets. The various
functional and operational aspects of TULIP and comparative
1.2 Importance of TULIP Protocol
account of its performance measured in terms of various
parameters.
Keywords: TULIP, Source Based Algorithm, Receiver Based The following importance of TULIP protocol is:
Algorithm, MAC.
1. It is robust as it avoids bit error rates:
1. Introduction
2. It retransmits only dropped packets whenever are
TULIP (Transport Unaware Link Improvement protocol) is required.
a link layer protocol designed for inter-operatability with
base station oriented wireless networks [4]. This protocol 3. It doesn’t estimate round trip time to calculate
utilizes the bandwidth of the half duplex channel for its propagation delay instead of using own tulip timer.
performance. Two services are offered by the TULIP via
reliable service and Unreliable service. Reliable service of 4. It just checks data parts, and doesn’t access header
TULIP ensures the timely delivery of the packets without part of a packet.
redundancy of the packet basically it is meant for the TCP
packets. Unreliable services do not perform any re- 5. It implements encryption.
transmission and therefore, it is meant for the UDP packets,
link layer and TCP acknowledgments. 6. It works with IPV4 & IPV6
The main impetus of the TULIP in case of reliable service
is to minimize the loss of packets and timely delivery of the 7. It is used on multihop structure.
packets. It makes use of Sliding window protocol in
selective repeat type Configuration for local recovery of the
lost packets. Whenever the packet is sent by the sender to
2 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 1, January 2010
2. Experiment Setup
The fig. 4, shows the different steps that help to run the
In this paper, the following scenario is used to implement TULIP protocol. There are two different algorithms which
the TULIP protocol. In this paper, there is one sender and are executed in different machines.
one receiver that communicate with each other in both wired
and wireless networks. The communication functioning of
TULIP is shown in the following fig.1.
The Protocol is implemented in Java as well as in C++ and
testified on two machines, and thereafter its performance is
estimated. After this, it is implemented in C++ and otcl and
is run on NS2, and calculated its performance. It performs
different operations as shown in the fig. 2.
Definition of Terms
ACK= received pkt is an ACK
WAIT=RTS received by MAC Layer
TRANS=MAC has acquired channel and pkt is to be
transmited
macState=1 if MAC layer has a Packet, 0 otherwise
S= {S Nmin,----,S Nmax}
Figure2. TULIP operations W=Window Size
Figure5. Source Algorithm [4]
Phase 2 of the implementation deals with the receiver side
of the application. Here, the receiver is implemented using This Source Algorithm is implemented in java and shown
socket programming concepts of java and instantiated as:
receiver can receive the data from the sender. For ease of public class a
functioning, receiver is implemented on local host { //////////////declarations
configurations. String ack="ack";
String wait="wait";
String trans="trans";
//////////////////procedure when sender receives a signal or a
pkt
void rec_from_mac(String ins)
{ timer obj=new timer();
obj.stop();
System.out.println("recmac");
if(ins.equals("wait"))
{ System.out.println("wait");
obj.stop();
Figure3. TULIP Implementation
(IJCNS) International Journal of Computer and Network Security, 3
Vol. 2, No. 1, January 2010
2.2 Receive Based Algorithm module assists in implementing the server instance using
The receiver Algorithm receives the packets from the sender java based TCP/IP network packages and classes shown in
side. The receiver algorithm shows in figure 6. fig. 8.
Initialization
CumACK = -1
BitVector = {0,…..,0}
[this procedure is called when a pkt is received]
Procedure prcess_incoming_pkt (incoming_pkt.sn)
begin
if incoming_pkt.sn E {CumACK+1,…..,CumACK + W}
if incoming+pkt.sn = (CumACK +1) mod 2W
release to network layer
release any other in sequence packets Figure8. Receiver End (Running receiver class)
for each packet released
Figure6. Receiver Algorithm [4]
The following figure 9 represents the server instance
The implementation of receiver Algorithm is given below: working as receiver for the packets generated by the user
public static void main(String x[]) using graphical user interface
{ try
{
byte b[] = new byte[1024];
ds=new DatagramSocket(4444);
ps = new DatagramPacket(b,1024);
while(true)
{ d=new Date();
ds.receive(ps);
String s = new String(b,0,ps.getLength());
System.out.println(s);
3. Results
TULIP protocol run on the machine having platform Java .It
produce the following result as shown in the fig. 7, 8 and 9. Figure9. Receiver End (Packets Received)
This algorithm provides an interface to user to create packet The fig. 10 shows the packet delay graph and then the code
with ample amount of data before its actual transmission is executed in the java. This code is more effective than
over the network shown in figure 6. Once the packet is TCP. The losses are minimum as shown the graph.
created we can submit the packet for further Normally, packet loss is occurred when buffer resources
communication. Submit button preprocesses the information have been exhausted but using TULIP we maintain the
before submission and delivery to another node on the Buffer.
network.