Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS1
Abstract— Almost a decade long research on the performance of the mobile devices with the wired world necessitate its
of TCP in wireless networks has resulted in a several proposals use as a transport layer protocol in wireless networks. The
and solutions to the problem of throughput throttling. Over problem of TCP source throttling in a wireless scenario has
the years, end-to-end solutions [1], [2], [3], [4], [5], [6], split-
connection schemes [7], [8] and adaptive link-layer solutions been a research focus for a decade now. As TCP was originally
[1], [9] have been proposed, refined and evaluated for their designed to operate in wireline envirouments with highly
relative merit [1]. Several of these measures have their share of reliable underlying channel conditions, it faces operational
drawbacks, and/or specificy in applicability. With the continuing challenges in wireless acenario which is characterized by
emergenece of wireless technologies ever since the work on TCP sporadic losses and disconnections. The primary cause of
performance over wireless began, smart link-layer mechanims
like adaptive modulation and conding, power control, Link TCP’s malperformance is its perception of the wireless losses
Adaptation, Incremental Redundancy etc. have been evolving and to be an indication of network congestion. The resulting
getting deployed. Although some recent works [10], [11] have congestion control and avoidance mechanims that ensue, lead
tried to use the link-layer adaptiveness to TCP’s benefit, these to low TCP throughput. While TCP SACK and NewRenoare
do not base their optimization on the dynamics of TCP and able to recover from segment losses relatively efficiently, these
also do not suggest the application of their methods to real link-
layer designs. In our work, we ouline an optimization framework cannot still distinguish between congestion and wireless link
based on the congestion control dynamics of a bulk tranfer losses.
TCP flow, and demonstrate its application to networks which The solutions that have been proposed over the past several
offer link-layer adaptive measures. The approach adopted can be years to ehance TCP performance in wireless networks include
summarized as follows: we first isolate and present recurrence end-to-end schemes [1], [2], [3], [4], [5], [6], split connection
patterns in TCP’s congestion control dynamics, that are useful for
identifying its operation in a wireless network. We then overlay approaches [7], [8] and TCP aware link layer protocols [1],
a generalized optimization approach which can be used for [9]. Each has its share of adavantages and drawbacks. The
enhancing TCP throughput via link-layer-adaptiness measures. end-to-end schemes like the Explicit Loss Notification (ELN)
Finally we demonstrate the performance benefits that can be preserve TCP’s semantics but require modifications to TCP.
achieved via application of the optimization approach to EGPRS The infeasibiity of Internet wide deployment of such changes
and IEEE 802.11a. The main contributions of this paper are
twofold: development of a generalized optimization framework poses a severe restriction to the practical utility of such solu-
that permits TCP performance optimization via adaptive link- tions. The split connection approaches can employ a separate
layer mechanisms, and demonstration of measures to noticably specialized protocol over the wireless hop and have the TCP
enhance TCP througput via power control and link adaptation connection terminated at the Base Station (BS) or an Access
in networks like EGPRS and IEEE802.11a. Point (AP). The approach is however marred by increased
Index Terms— TCP, 3G Networks, EDGE, EGPRS, processing overheads, violation of end-to-end semantics of
IEEE802.11a, Link Adaptation, Power Control, Dynamic TCP acknowledgements, and slow, complicated handoffs.
Programming Enhanced link-layer reliability [12], [13] has been inves-
tigated as a meachanism to improve TCP performance in
I. I NTRODUCTION wireless senario . However link layer designs that are TCP
unaware, cannot efficiently shield TCP from the wireless
W ITH the proliferation in use of wireless devices over
past several years, there has a growing interest for
access to the mobile Internet and web-based applications. As
losses [12], and are also associated with increased rate and
delay variability [14]. On the other hand, approaches on line
TCP carries most of the Internet traffic today, the integration of SNOOP protocol [1], [9] represent a TCP aware link-layer
design. While SNOOP preserves the end-to-end semantics of
Manuscript received January 20, 2002; revised November 18, 2002. This TCP and does not require any changes to TCP implementation,
work was supported by the IEEE. it has its own share of limitations. It cannot be used for
Jatinder Pal Singh and Nicholas Bambos are with Stanford Networking
Research Center (SNRC) at Stanford University. email:jatinder@stanford.edu, the case when TCP data and ACKs do not both traverse
bambos@stanford.edu through the BS/AP. It also has overheads of SNOOP cache
Ahmad Bahai is with Stanford University (Consulting Professor) and maintenance. During the interim period betwen handoffs, the
National Semiconductor (CTO). email: bahai@stanford.edu
Bangnan Xu and Gerd Zimmerman are with T-Systems, Darmstadt, Ger- BS/AP to which the handoff is occuring cannot snoop on
many any acknowledgements sent from the mobile host. Another
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS2
disadvantage of the SNOOP protocol is its inability to function avoidance phase on the other hand is marked by an increment
when TCP headers are encrypted. of 1 in window size every RTT. The slow start phase governs
None of the aforementioned solutions emcompass or utilize dynamics until the window size reaches a threshold (called the
adaptive wireless system design features like FEC, transmis- slow start threshold) beyond which congestion avoidance takes
sion power, and existence of multiple transmission modes. over. The idea is to make TCP probe for network capacity
There have been some recent efforts [10], [11] to examine by increasing the window size first aggressively and then
adaptive link layer measures for TCP throughput optimization, cautiously. In case of a Timeout (TO) or Triple Duplicate (TD)
where the authors adopt standard steady state TCP throughput loss indication [19], the value of the threshold is set to the
expressions and make an attempt for optimization via adaptive minimum of 2 segments and half of congestion window. At all
FEC, ARQ and power control. The TCP window dynamics and times TCP’s window size is limited by the reciver advertized
congestion events are not considered in the work. We observe window.
that the work on TCP throughput modeling via consideration The TO and TD indications characterize the congestion (or
of its dynamics [15], [16] and throughput optimization via loss) events of TCP. The TO indication occurs when the TCP
adaptive system design has thus remained adressed orthogo- sender is waiting for an ACK and the retransmission timer
nally. We argue that for performance optimization, link-layer expires. TCP infers that the packet has been lost: it reduces
needs to be adaptive to the instantaneous dynamics of a TCP window size to 1 segment, retransmits the packet and doubles
flow. In [17] we model TCP’s congestion avoidance dynamics the Retransmission Time Out (RTO) value. This retransmission
and evaluate adaptive power control measures for throughput procedure is repeated until the packet is ACKed. Subsequently,
enhancement in a simplified scenario. TCP wndow dynamics follow the slow start or congestion
In this paper we explore the adaptiveness of link layer avoidance algorithms, depending on the values of threshold
mechanims in a wireless system for optimization of TCP and congestion window size. The TD loss indication on the
throughput. We present a general optimization framework other hand is characterized by the arrival at the sender of
based on TCP dynamics and demonstrate its utiity via adaptive three duplicate ACKs. A duplicate ACK is generated by the
power control, and link adaptation. Our approach does not receiver in response to arrial of out-of-order segment and bears
require changes to TCP or any extensive imlepmentations. We the sequence number of the next expected segment. TCP’s
begin by analyzing in Section II, the perforamnce dynamics Fast Retransmit Algorithm uses the arrival of 3 duplicated
of a bulk transfer TCP flow. Unlike several bulk transfer ACKs (4 ACKs with same sequence number) as an indication
throughut evaluations which ignore TCP’s slow start phase that a segment has been lost. Following the TD indication,
[16], [18], we model both the slow start and congestion TCP performs the retransmission of what appears to be the
avoidance mechanisms. We outline an optimization framework missing segment, without waiting for the retransmission timer
in Section II based on TCP dynamics. We then demonstrate to expire.
in Section III, TCP performance enhancement via proposed Most TCP versions today implement the above discussed
optimization measures. We start by adopting a simplifed congestion control algorithms. TCP Reno in addition employs
scenaio and assess the impact of transmission power adaptation Fast Recovery [20] that enables it to recover from single packet
on TCP throughput. We then demonstrate the application of loss in a window without a timeout. TCP New Reno [21] can
proposed optimization measures to EGPRS and WLANs. recover from multiple segment losses in a window via partial
acknowledgements . TCP SACK can counter multiple segment
loss as well, via selective acknowledgements. It can employ
II. C ONGESTION C ONTROL DYNAMICS OF TCP
congestion control algorithms similar to Reno, or can utilize
We in this section discuss the dynamics of a steady state information from its SACK options [22].
bulk-transfer TCP flow. The bulk-transfer originates from a We in our work model the slow start and congestion avoid-
TCP sources with a large amount of data to send. The protocol ance algorithms with maximum window size limitation and
dynamics can be described via a) TCP window size evolution consider both TD and TO congestion events. Most of the Reno
and b) congestion events. TCP congestion window designates implementations today have been rendered obsolete by New
the limit on maximum amount of data (or the number of Reno/SACK deployment. Hence we assume that TCP is able
segments) that can be transmitted without waiting for an to recover from multiple segment losses in a window in the
acknowledgement (ACK). The receiver advertizes a simliar event of TD loss indication. A TCP flavor may implement its
limit on outstanding data based on its buffer limitations. At own fast recovery process: the one assisted by SACK options
any time, a TCP sender can send as many unacknowledged (TCP SACK) or partial ACK meachanisms (TCP NewReno);
segments as allowed by the minimum of congestion and we do not specifically model any particular one in our work.
receiver windows. Further, we do not consider TCP’s delayed ack mechanism for
The slow start and congestion avoidance algorithms [19] reasons of clarity of presentation of our work, and also since
determine the evolution of congestion window and are used it does not bring out any insights relevant to the scope of this
by a TCP sender to control the amount of unacknowledged paper. However the benefits of delayed ACK measures can be
data being injected into the network. During the slow start easily applied to the proposals in this work.
phase, TCP increments congestion window by 1 segment for We observe that any given trace of TCP’s window size
eack ACK that acknowledges new data. This entails doubling evolution comprises of certain atomic patterns which can be
of the window every Round Trip Time (RTT). The congestion isolated and represented as in figs. 1 and 2. These window size
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS3
W W
d t T 2T 4T t
d
(a) CAbegin cycle terminating via TD indication. (b) CAbegin cycle terminating via TO indication.
Window size increases linearly with time and is The window size increases linearly in CA phase.
reduced by by half at the end of cycle The initial window size for next cycle is 2.
Fig. 1. Window size variation in CAbegin TCP cycles. The dotted horizontal line represents the slow start threshld and d denotes the duration of the cycle.
W W
next
cycle
next
cycle
T 2T t
d t d
(a) SSbegin cycle termination via TD indication. (b) SSbegin cycle termination via TO indication.
The window size grows first exponentially (slow The window size grows first exponentially (slow
start) and then linearly (congestion avoidance) with start) and then linearly (congestion avoidance) with
time, and is reduced by half at the end of cycle. time. The initial window size for next cycle is 2.
Fig. 2. Window size variation in SSbegin TCP cycles. The dotted horizontal line is the slow start threshold and d denotes the duration of the cycle.
III. O PTIMIZATION F RAMEWORK Fig. 4. Scenario for TCP session in a wireless network.
(a) C(r) is the transmission cost incurred in round (b) T (k, r) is the cost-to-go at round k given
r, J(r) is the cost-to-go, CLoss (r) is the cost on that TO indication occured at round r. Cseg (r)
loss indication and CT D (r) is the terminal cost on is the cost of transmitted segment. CT O (k, r) is
TD loss indication. Dr denotes the round duration. the terminal cost on end of cycle.
Fig. 3. Evolution of a Slow Start/Congestion Avoidance round (left) and Timeout phase (right) for SSbegin and CAbegin cycles.
Packets
Sent ACKed Packet In a round, cost is incurred for transmission of window of
Wr Lost Packet segements. The cost may be attributed to transmission power,
Sent Packet
(ACKed or Lost) transmission time, etc., and is represented by C(r). The total
cost to be incurred (called cost to go) starting from round r till
the end of the cycle is represented by J(r). In case a segment
in the round is lost, additional cost CLoss (r) is incurred. If
1 2 ...... R R+1 R+2 ..... K
To
Round(r) there is TD loss indication, CLoss (r) is simply evaluated as
Additive Increase Timeout Phase
the negative of the throughut achieved during the cycle (with
the throughput evaluated as the number of packets transmitted
Fig. 5. TCP segment transmission dynamics in a CAbegin cycle. The cycle during the cycle divided by the duration of the cycle). The
ends with TD indication at round R + 1 in case three of the dotted segments
are successful, or else the cycle ends in Timeout phase at round K.
cycle ends at round r + 1 with the completion of transmission
of window of segments following the segment for which TD
loss indication occured (e.g. round R+1 in fig. 5).
and arrival of an ACK for a segment in the window. The In the event that the loss indication is a timeout, CLoss (r)
duration of a round can vary depending on the window size, represents the cost incurred during the Timeout Phase (fig.
the variation in transmission time of the frames on the wireless 3(b)). The cost of the timeout phase is given by T (r + 2, r)
channel and also the RTT in wireline domain. where T (k, r) is the cost to go from round k given that the
An instance of window size evolution with rounds is shown timeout occured due loss indication of a segment in round r.
for a CAbegin cycle in fig. 5. The window size increases by Note that as in the TD loss indication case, round r+1 involves
one if all the segments transmitted in a round are ACKed. completion of transmission of segment window following the
In the event of a segment loss in round R, the TCP cycle lost segment. During round k of timeout phase, the cost
can end with a TD or a TO indication. When three or corresponding to the transmission of segment is termed as
more of the packets following the lost packet are sucessful, Cseg (k). In case the segment transmitted during round k is
duplicate ACKs for the lost packet are generated and a TD loss successfully ACKed, the timeout phase and the cycle ends with
indication occurs. In that case, the cycle terminates at round a termination cost CT O which is the negative of the throughput
R + 1. We assume that TCP is able to recover from single or achieved during the cycle.
multiple losses in the window by using, for instance, SACK The optimization approach for the discussed framework is
options, and we do not specifically model the recovery process. motivated by Dynamic Programming (DP) [24] princliples and
In the event when less than three segments make it sucesfully involves minimization of cost-to-go J(r). We will reuse the
to the receiver, TCP times out. On each subsequent attempt to cost symbols in Fig. 3 and formuate detailed optimization
transmit the unACKed segment, the timeout duration doubles. equations. We let vector γ represent the channel condition
The cycle finally ends at round K when the lost segment is vector corresponding to the wireless state encountered by
retransmitted successfully. An SSbegin cycle can be explained the segments in a round and c represent the corresponding
likewise in terms of its window size evolution in rounds. congestion vector. The dimension of γ depends on the scenario
We next discuss the optimization framework for TCP dyan- for which optimization is being attempted. For instance, when
mics based on dissection of TCP operation into cycles. Fig. the wireless channel decorrelates over transmission duration
3 outlines the framework. The dynamics of a round in slow of a physical data block, then the dimension of γ is the
start or congestion avodance phase are shown in Fig. 3(a). number of blocks required to transmit the TCP segements
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS5
Z Z
CLoss (r, s) = min
0
[ pT D (r, s, s0 ) [CL (r, s0 , γ 0 , c0 ) + CB (r)] + (1 − pT D (r, s, s0 )) T (r + 2, r) ] dγ 0 dc0 (2)
γ0 c0 s
in a round. The congestion vector c has a dimesion equal cycle. For instance, when a congestion avoidance phase ends
to the the number of segments in a round. The quantities in a TD loss indication with terminal round window of Wr , the
γ and c together ascertain the success of delivery of TCP next cycle would have a initial window size of Wr /2. To favor
segments in a round. We assume a reliable TCP ACK delivery a higher initial window size for the next cycle, we make the
in our work. The channel and congestion state vectors have cost for current cycle have a deduction which is an increasing
probability distribution functions denoted by fγ (γ) and fc (c) function of Wr . By virtue of the cost deduction, termination
respectively. The success probability vector of segments in the of a cycle with a larger window size would be prefered, since
round is denoted by s. The success probability of a round is a the overall objective is to minimize the cost of a cycle.
function of s, and can be expressed as Srnd (s). The cost C of The event that loss indication in a cycle is a timeout is
round r depends on the success probability of the segments, represented by probability 1 − pT D (r) in (2). In accordance
the wireless channel state vector, the congestion state vector with the dynamics represented in fig. 3(b), the corresponding
and the round number. cost-to-go from round k of the timeout phase, given that the
The key to the optimization process is to ascertain the TO indication occured in round r, is given by
segment success probability vectors s for all given γ and c.
The set of these optimal vectors would results in lowest cost to
Z Z
go averaged over the channel state and congestion distribution. T (k, r)= min [Cseg (r, s, γ, c) + sCT O (k, r)
c γ s
J(r) can thus be represented as the cost-to-go minimized over + (1 − s)T (k + 1, r)] fc (c)dγdc (3)
all possible success probability vectors.
Z Z where s is the success prabability of the transmitted seg-
J(r) = min [Ctg (r, s, γ, c)] fγ (γ)fc (c)dγdc (1) ment, and CT O represents the teminal cost for the cycle ending
γ c s
in a timeout.
where the cost-to-go for given γ and c is Pr
Wi + nl + (k − r)
CT O (k, r) = λ(− i=1
Pr+1 − ρ(Wr )); (4)
i=1 Di + f (k)T0
Ctg (r, s, γ, c)=C(r, s, γ, c) + Srnd (s)J(r + 1)
where T o is the timeout value and f (k) denotes the timeout
+ (1 − Srnd (s))CLoss (r, s) sequence given by
2k−i − 1, k−i≤7
The terminal cost CLoss (r, s) incurred on the loss of one f (k) = { (5)
127 + 64(k − i − 7), k − i ≥ 8
or more segments in round r, is expressed in (2). The vectors
γ 0 , c0 and s0 respectively denote the channel state, congestion The optimization framework discussed in this section can be
vector, and success probabilities of the segments in round r+1 applied to both CAbegin and SSbegin cycles via the associated
for the case when there is TD loss in round r. pT D (r, s, s0 ) window evolution. Given the initial size, the window size
represents the probability of a TD loss indication, and can during the rounds of SSbegin cycle can be ascertained (a
be evaluated as the probability of three or more segments linear increase until a loss indication). Similarly with a given
being successful amongst the ones in round r + 1 and those initial window size and slow start threshold, the window size
transmitted follwing the first lost segment in round r. We will can be determined for CAbegin cycle as a function of round
discuss the formulation of pT D (r, s, s0 ) in subsequent sections. number. The solution to optimization equations yields the
CL (r, s0 , γ, c) represents the cost associated with transmission cost minimizing segment success proabability vector for all
of sements in round r + 1. Round r + 1 is the terminal round channel state and congestion vectors and for every round in a
for a TD loss indication. CB (r), the terminal cost for the TD cyle. There is a set of CAbegin cycles for which optimization
loss case, is modeled as the negative of throughput attained is done. This set contains cycles begininning with different
during the cycle. values of initial window size. For instance when there is a
Pr limit on maximum window size denoted by Wmax , the initial
W + nl window size can vary from 1 to Wmax . Similarly the set of
CB (r) = λ(− i=1 Pr i − ρ(Wr )); (2)
i=1 Di SSbegin cycles for which optimization is done, comprises of
where Di represents the duration of round i, nl is the all cycles beginning with different inital window sizes and
number of segments transmitted in the terminal round r + 1 slow start thresholds.
of TD loss case, Wi represents the window size during round
i, and λ is the scaling factor between the transmission and IV. TCP T HROUGHPUT O PTIMIZATION VIA A DAPTIVE
throughput costs. The term −ρ(Wr ) where ρ is an icreasing L INK - LAYER T ECHNIQUES
function of r is introduced to the influence the evolution of Based on the framework presented in the prevoius section,
the current cycle to favor high throughput in the subsequent we now demonstrate TCP’s performance enhancements via
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS6
adaptive link layer measures. We show that by suitably model- BPSK modulation, the bit error probability is
ing the cost of transmission, measures like power control and p
pb (γ) = Q( 2γ) (7)
link adaptation can be utilized for throughput optimization.
To discuss the intuition behind the approach, we begin by where Q denotes the Q-function and the SNR γ follows the
adopting a simple evaluation model and assess the merits of Rayleigh exponential distribution with mean γ̄.
power adaptation for efficient TCP dynamics. We then move
on to investigate the benefits of optimization for EGPRS and 1 γ
fγ (γ) = exp (− ), γ ≥ 0 (8)
IEEE802.11a networks. γ̄ γ̄
We model the cost of transmission (Section III) of TCP
A. Adaptive Power Contol segments in a round as the aggregate transmission power for
the frames encapsulating the segments in the round. Greater
The success probability of TCP segments in a wireless net-
the transmission power, more the associated cost because of
work can be regulated by adapting the transmission power of
higher generated interference and battery power drain. As
physical layer frames on the wireless channel. This enables a
fixed modulation and constant frame size entail a constant
TCP dynamics adaptive power control for ehanced throughput.
transmission time, the power cost for a segment can also be
Power control [25] is desirable in wireless networks for several
translated to transmission energy cost via a scalar constant.
reasons including limiting the interference that a wireless link
Hence maximizing throuhgput with contrained power also
generates in a multi-user environment, and conserving energy
implies acheiving the same objective with constrained energy.
for battery power limited mobile devices. We will see how
With a reasonably simplified model and the approach above,
controlling transmission according to TCP dynamics results in
we will demonstrate the intuition behind TCP optimization
significant throughput enhancement over conventional power
measures presented in section III and also investigate the
control methods.
impact of power control measures on TCP throughput.
1) Evaluation Model: For present evaluation we neglect the
2) Optimization Framework: Adopting the assumptions
time spent by TCP in slow start phase and and incorporate
discussed in the previous subsection, (1) reduces to the
only CAbegin cycles in TCP’s window evolution. While many
simplfied following form (9) where γ1 , γ2 , ..., γWr are the
works including [16], [18] have adopted this assumption, we
components of SNR vector γ for round r. The cost of a round
will relax it in subsequent subsections. We attribute the loss
is modeled in terms of the transmission power Pseg of the
of TCP segments to wireless channel errors and the losses
segments in the round.
due to congestion are neglected. Furthermore, we adopt a
The optimization framework allows us to determine the
simple channel and MAC mode. The constant length TCP
cost-minimizing success probability vector in a round for every
segments are assumed to be encapsulated in single data frames
given γ, and ascetain the transmission power required for
which are transmitted at a suitable power level. Adaptive
transmission of segements. However there may be practical
modulation, error correction mechanisms like FEC, and ARQ
limitations to adopting the optimization guidelines on the fly.
are disregarded here. The wireless channel is modeled as
When transmission of segments in a round commences, we
AWGN Rayleigh flat-fading channel and the modulation is
may only have an estimate of SNR for the current frame
taken to fixed as BPSK. The channel is assumed to decorrelate
transmission, and it may be difficult to predict the SNRs
over transmission of successive frames, and hence the frames
for all frame transmission in the current round. However the
undergo independent fading. The wireless link is assumed to
selection of target success probability vector can be done only
be high-bandwidth so that it does not present a bottleneck
by selecting the optimal success probability for a given γ. To
to the realizable throughput. The duration of each round is
overcome the problem, we modify the formulation to yield a
assumed to be fixed and taken as averge RTT. While a high-
causal cost model. We first select the targeted packet success
bandwidth wireless link will comply with this assumption
probability to be the same for all segments in the round.
adopted in popular modeling approaches [16], we will relax
Then s simplifies to a single-element optimization parameter s.
it after this section and evaluate round duration accurately.
Not assuming apriori information about the SNR experienced
The Retransmission timeout T o is taken to be fixed, and the
by the segments in the round, we replace the power cost of
updates are considered only in further subsections.
each segment in (9) by powerR consumption averaged over the
The channel state vector γ is represented by Signal to Noise
channel state distribution, γ p(s, γ)fγ (γ)dγ. We also assume
Ratio (SNR) values experienced on the wireless channel by
that for the case when there is a loss indication in a round, the
frames encapsulating TCP segments. A TCP segment is in
target success probability of the following round (e.g. round
error if any of the bits of the encapsulating frame is in error.
R + 1 in fig. 5) is the same as that of the current round. Then,
Furthermore we assume that error detection mechanisms are
the cost formulation J(r), with no apriori knowledge of γ, is
capable of identifying bit errors incurred during transmission.
given by (10). Accordingly, (2) reduces to (11).
Neglecting the headers encapsulating a TCP segment being
We next discuss the evaluation of pT D (r, s), the probability
neglected, the segment error probability p can be expressed as
of a TD loss indication conditioned on the event that a segment
is lost in round r. The probability of one of more segments in
p(γ) = 1 − [1 − pb (γ)]N ; (6)
a round being lost is (1 − sWr ), where s is the target success
where γ is the SNR during the frame transmission duration probability for segments in a round. The probability that the
and N is the frame length in bits. For an AWGN channel and first segment lost in a round is the ith one is given by si−1 s.
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS7
Z Wr
X Wr
Y Wr
Y
J(r) = min [ Pseg (sj , γj ) + ( sj )J(r + 1) + (1 − sj )CLoss (r, s) ] fγ (γ)dγ (9)
γ s
j=1 j=1 j=1
Z
J(r) = min [ Wr Pseg (s, γ)fγ (γ)dγ + sWr J(r + 1) + (1 − sWr )CLoss (r, s) ] (10)
s γ
Z
CLoss (r, s) = pT D (r, s) [nl Pseg (s, γ 0 )fγ 0 (γ 0 )dγ 0 + CB (r)] + [1 − pT D (r, s)] T (r + 2, r) (11)
γ0
Wr W r −1
1 X
i−1
X Wr − 1 j
pT D (r, s) = s (1 − s) [I{W >3} s (1 − s)Wr −1−j ] (12)
(1 − sWr ) i=1 r
j=3
j
W r −1
X Wr − 1
= [ si (1 − s)Wr −1−i ] I{Wr >3} (13)
i=3
i
Z
T (k, r) = min [ Pseg (s, γ)fγ (γ)dγ + sCT O (k, r) + (1 − s)T (k + 1, r)] (14)
s γ
The formulation for pT D (r, s) is then given by (12) where sopt (r, Winit ) for every round number r and initial window
I{Wr >3} is the indicator function which assumes a value of 1 size Winit is generated. For a given round and inital window,
when Wr > 3 and is 0 otherwise. On simlification, pT D (r, s) the value s that minimizes the integrands in (10) (and likewise
reduces to (13). The timeout cost from (3) can be expressed (14)) is the success probability stored in the look up table.
as (14). Winit ascerains the evolution of window size in a cycle for
3) Performance assessment: Based on the discussed as- determining the teminal costs (2) and (4), and can take vaules
sumtions and methodology, we simulate bulk transfer of TCP from 1 to the maximum window size, Wmax .
segments to assess TCP throughput with adaptive power For simulation run, SNR value is drawn every round from a
control mechanisms. Bulk transfer implies that the sender is Rayleigh distribution. The target segment success probability
saturated and has data to send all times. for the round and initial window size with which the cycle
As a TCP segement is transmitted, its success probability began is then retrieved from the look-up table. With the SNR
is ascertained by the state of the wireless hop of the TCP value and and the target success probability, the transmission
connection and transmission power level on the link. The power for frames in that round is determined. Throughput is
SNR experienced by a frame encapsulating TCP packet is evaluated as the fraction of number of segements transmitted
evaluated based on exponential Rayleigh fading distribution during the simulation run and the duration of the run. Several
and the channel model presented before. The transmission runs are performed to obtain an average throughput value.
power levels are selected depending on the employed power With increasing values of λ, the priority given to through-
adaptation scheme. put cost in the dynamic programming formulation increases
The approach for evaluating TCP throughput with adaptive relative to the power cost. Hence increasing throughput values
power control is discussed next. (10) and (14) are first con- are obtained, but at the cost of higher average power.
verted to finite-period. Round numbers Rt and Kt , defined to The throuhgput variation based on DP solutions is evaluated
be the final rounds for evaluation of optimal solutions to (10) with a segment size 1500bytes, RTT 250ms, T o 3s and the
and (14), are selected as 200 each. The selction is based on maximum window size W max as 48. The performance is
taking into consideration that in any realistic environment it is compared with that with Truncated Channel Inversion (TCI)
highly likely that a TCP cycle ends before the round number [26] power control policy with a cut-off threshold γc of 5dB.
value of 200. Our simulations too justify this selection. (10) The power adaptation for TCI is given by
and (14), can then be solved together with (11), (13), (2), (4)
and (5) for optimizing power control. We choose the function (
σ
ρ(Wr ) in (2) and (4) to be W2r and approximate nl as W2r or P (γ) γ γ ≥ γc
= (15)
Wr depending on whether the round r incurring a segment P̄ 0 γ < γc
loss belongs to slow start or congestion avodance phase.
The following procedure is then performed for the SSbegin where P̄ represents the average transmission power and
cycle and for a range of values of the cost ratio λ. A is set to the average power of dynamic programming based
look up table Sopt comprising of target success probability power control for a given average SNR. The constant received
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS8
1
2.5
TCI
Constant power 0.9
DP based
2
0.8
0.6
0.5
0.5
0.4
0.3
0
5 10 15 20 25 30 35
Average SNR (dB)
0.2
0 5 10 15 20 25 30 35 40 45 50
TCP Round Number
P (γ)
Z
dγ = 1 (16) 19
γ P̄
18
is given by
DP based
tion measures is the same for a given average SNR. As can be 13
TCI
Constant Power
0 2 4 6 8 10 12 14 16 18 20
seen, the DP based solutions result in significant enhancement TCP Round Number
1
60
0.9
MCS−1 to 9
50
Segment Success Probability 0.8
40
Throughput (kbps)
0.7 W ={1,5,10,20,25}
init
30
0.6
0.5 20
0.4 10
0.3
0
0 5 10 15 20 25 30
C/I (dB)
c
0.2
0 5 10 15 20 25 30 35 40 45 50
TCP Round Number
pb,g
to have both SSbegin and CAbegin cycles. The duration of
rounds in this case is no longer assumed to be constant and can
pb,b Bad Good p
g,g
vary with the data transmission time on the wireless link: an
instance being the case when the link bandwidth is a bottleneck
as compared to the delays aside from the wireless link.
pg,b The evaluation of cost minimizing success probability s (in
adapted (10) (14)) of TCP segments in a round for a given
Fig. 11. Two State Markov Chain Model for Wireless Channel Variation C/Ic can be done by scanning a range of possible values of
s and finding the value for which optimization equations are
satisfied. To decrease the computational complexity we restrict
transmission frequency is updated every 20ms TDMA burst. the set of values that are scanned. This set Sset is evaluated
The block error process is taken to decorrelate over different in terms of the average segment error probability by assuming
bursts as TCP data is sent in a time slot belonging to a burst. indentical modes to be employed for transmission of all blocks
The congestion in the network, c in (1), (2) and (3) corresponding to a TCP segment. Note that this assumtion is
is modeled as a constant TCP segment loss process. We restricted only to the evaluation of Sset , and not carried over
assume that the wireless link adaptation process does not have to actual block transmission or analysis via simulations.
information pertaining to the network congestion, as would
be the case in a real scenario. The optimization is hence not Sset = {1 − SER(1), .., 1 − SER(9)} (19)
performed over congestion characteristics. The framework as
presented in sec. IV-A.2 then applies, with the cost Pseg (s, γ) where SER(m) is the average error probability for trans-
changed to Tseg (s, γ). Tseg (s, γ) represents the total time over mission of segment via blocks of mode-m.
the air during which bursts comtaining the data corresponding
to a TCP segment are transmitted, with γ denoting the C/Ic SER(m) = BLERRT X (m)nBlocks(m) (20)
of the channel. With these representations, (10), (11), (13)
and (14) apply to this scenario. We will discuss in the next nBlocks(m) denotes the number of blocks of mode-m
subsection, the choice of target success probability vector s, required to transmit a TCP segment and BLERRT X (m) is
and the selection of modes of transmission for EGPRS blocks the average block error rate for mode-m with ARQ retrans-
based on DP solutions. missions, and is given by
EGPRS block transmission mechanisms, TCP dynamics
RT
YL
and network congestion effects are considered for the flow
BLERRT X (γ, m) = BLERr (m) (21)
of TCP data in the network. A TCP segment is transmitted
r=1
over variable number of EGPRS blocks. The modes for
transmission of each of these blocks are selected depending BLERi (m) in the above equation represents the average
on the link adaptation policy employed. For TCP dynamics (over channel state) error probability of a block when trans-
aware link-adaptation, the mode selection will be described mitted via mode-m.The subscript i denotes the transmission
in the following subsection. The TCP Timeout peried T o attempt and varies from 1 for first transmission to the re-
is no longer assumed to be constant but updated based on transmission limit RT L for the last one (the number RTL
RTT observations, as described in [33]. The TCP segment includes all transmission of a data block, including the first
size is taken to be 512 bytes. Results will be presented for one). Note that the transmission attempts yield different block
different values of round trip delay D which includes the error probabilities because of IR combination. We will discuss
delay experienced by the segment in the Internet and also their evaluation in next subsection.
the wired part of GPRS network, but excludes the wireless With the reduced success probability set evaluated as de-
link transmission time. Delay due to transmission on the scribed above, dynamic programming solutions are obtained
wireless link is variable and depends on the transmission for target segment success probability. For the CAbegin cycle,
modes selected for the blocks containing TCP segment data. target success probability is a function of round number and
We model the wireless channel variations as a Markov initial window size, i.e., sCA opt (r, Winit ). This constitutes the
Chain with its two states good and bad represented by C/Ic look-up table SCA opt . The target success probability for SSbegin
uniformly distributed in the intervals [0, 15]dB and (16, 30]dB cycle is in addition a function of the slow start threshhold
respectively. The time spent in these states is exponentially ssthresh at the beginning of the cycle, and can be expressed
distributed with respective rates rg and rb . The discrete time as sCA
opt (r, Winit , ssthresh): there values constitute the look-
representation of the channel is shown in fig. 11, with the up tqable SSS opt . The look up tables are used to ascertain the
transition probabilities pg,b and pb,g related to the transition transmission modes for blocks of a TCP segment.
rg
rates as rb +r g
and rbr+r
b
g
respectively. The same model has We next discuss the mode selection procedure for transmis-
been used for the work in [31]. sion of a TCP segment data. Let the transmission round be r
3) Dynamic Programming Solutions and Performance As- and the estimated C/Ic for current burst transmission be γ.
sessment: Methodology similar to the one highlighted in Then mode mb which minimizes the cost of deviation from
Sec. IV-A.3 is adopted for obtaining dynamic programming the target success probability and transmission time is selected
solutions. However, we now generalize the TCP dynamics for transmission.
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS11
45
ERP: RTL=3
45
ERP: RTL=3 LA/IR: RTL=3
40
LA: RTL=3 ERP: RTL=2
40
ERP: RTL=2 LA/IR: RTL=2
LA: RTL=2 35
35
30
25
25
20
20
15
15
10
10
5
5
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0 p
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 b,g
p
b,g
Fig. 16. TCP throughput over EGPRS with IR, D=500ms, and pint = 0%
Fig. 12. TCP throughput over EGPRS with noIR, D=500ms, and pint = 0%
20
attempts for data blocks. Upon every block retransmission the
15
code rate of an MCS scheme is reduced due to IR combining
10 with previous transmissions. This code rate reduction for
second and third transmission is noted in Table. I. To obtain the
5
block error rate for retransmissions, we determine the MCS
0
0 0.1 0.2 0.3 0.4 0.5
p
0.6 0.7 0.8 0.9 1 of the same modulation as the transmitted block which has
b,g
20
approach enables us to approximate IR performance for high
code rate schemes. For low code rate schemes it has been
15
observed that IR is anyway not very beneficial [23].
10
Figs. 16 and 17 plot TCP throughput versus the transition
5 probability pb,g for approximate P1+P2 and P1+P2+P3 (denot-
ing combination of blocks transmitted via puncturing schemes
0
0 0.1 0.2 0.3 0.4 0.5
p
b,g
0.6 0.7 0.8 0.9 1
1, 2 and 3) combining, with D=500 ms and 1000ms, and no
Internet congestion lesses. Note that for the modes which offer
Fig. 14. TCP throughput over EGPS with noIR, D=500ms, and pint = 5% only two puncturing schemes, the third transmission attempt
is decoded for P1 puncturing.
Throughput for a congestion loss of pint = 5% and
25
ERP: RTL=3
D=1000ms, is presented for P1+P2 recombination and for
LA: RTL=3
ERP: RTL=2
RTL=2 with no recombination, in Fig. 18. The corresponding
LA: RTL=2
20
reults for P1+P2+P3 recombination and for RTL=3 and no
recombination are shown in Fig. 19. As in the no-IR case, DP
TCP Throughput (kbps)
15
based power adaptation can be seen to yield multiple folds
throughput enhancement for unfavorable channel conditions,
10
and in general upto 50−100% performance enhancement over
5
LA which selects transmission mode based on the maximum
throughput for a given C/Ic .
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
p
b,g
C. Link Adaptation in IEEE 802.11a
Fig. 15. TCP throughput over EGPRS with noIR,D=1000ms,and pint = 5%
The IEEE 802.11 is a widely prevalent WLAN standard
with several compliant products in use. 802.11a is a high speed
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS13
45
ERP: RTL=3
IEEE 802.11a employs an OFDM PHY with 52 subcarriers,
40
LA/IR: RTL=3
ERP: RTL=2
48 of which are used to carry data. The dates rates, modulation
LA/IR: RTL=2
35 and code rate pertaining to the 8 transmission moides are
TCP Throughput (kbps) 30 shown in Table ??tab:802.11amodes). The quantity NDBP S
25 represents data bytes per OFDM symbol.
20
10
TCP Throughput (kbps)
12 with values tSlotT ime, aCW min and aCW max for
TCP Throughput (kbps)
10
RTY
L−1 9
RT
XL
Tf rame (γ, m) = [1 − F ER(γ, m)]Tsuccess (γ, m) + F ER(γ, m) [F ER(m)]n−1 F ER(m)TRT X (γ, m, n)
n=2
+ F ER(γ, m)[F ER]RT L−1 Tf ail (γ, m) (30)
Tsuccess (γ, m) = tDIF Stime + T̄bkof f (1) + Tdata (m) + tSIF Stime + Tack (m0 ) (31)
n
X
TRT X (γ, m, n) = tDIF Stime + [Twait (γ, m) + (n − 1)T̄wait (m)] + Tbkof f (i) + nTdata (m) +
i=1
+ tSIF Stime + T̄ack (m) (32)
n
X
Tf ail (γ, m) = tDIF Stime + [Twait (γ, m) + (RT L − 1)T̄wait (m)] + T̄bkof f (i) + nTdata (l, m) (33)
i=1
1.4
DP:D=50ms
intuition behind the approach by presenting TCP throughput
1.3
LA:D=50ms
DP:D=100ms
enhancement via adaptive power control in a simplified sce-
1.2
LA:D=100ms
nario. We then apply the framework to EGPRS and show that
choosing the transmission modes according to TCP dynamics
TCP Throughput (Mbps)
1.1
ACKNOWLEDGMENT
Fig. 22. TCP throughput for RTL=3, and pint = 5%
We would like to thank Yan Li for his help with dynamic
programming concepts and some simulation. We are also
grateful to Gerd Zimmerman and Gerhard Kadel for their
V. C ONCLUSION useful insights that motivated this work.
We address the problem of malperformance of TCP in
R EFERENCES
wireless networks by introducing an optimization framework
based on the congestion control dynamics of a bulk transfer [1] H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz,
“A comparison of mechanisms for improving TCP performance over
TCP flow. We observe atomic patterns called cycles in the wireless links,” IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 756–
dynamics and overlay a throughput maximation strategy that 769, 1997.
enables utilization of adaptive link-layer measures to enhance [2] P. K. Gupta and J. Kuri, “Reliable eln to enhance throughput of tcp
over wireless links via tcp header checksum,” in Proc. IEEE Global
TCP throughput in current and futuristic wireless technologies. Telecommunications Conference’02, vol. 2, 2002, pp. 1985–1989.
We discuss the essence behind the optimization approach [3] R. Balan, B. Lee, K. Kumar, L. Jacob, W. Seah, and A. Ananda, “Tcp
which is to protect selective rounds of TCP by ensuring a high hack: Tcp header checksum option to improve performance over lossy
links,” in Proc. IEEE INFOCOM’01, vol. 1, 2001, pp. 309–318.
segement success probability. The high success probability can [4] J. Cobb and P. Agarwal, “Congestion or corruption? a strategy for
be obtained via link layer measures like robust modulation efficient wireless tcp sessions,” in Proc. IEEE Symposium on Computers
and coding, greater transmission power, etc. The farther a and Communications’95, 1995, pp. 262–268.
[5] A. Chan, D. Tsang, and S. Gupta, “Tcp (transmission control protocol)
round from filling the bandwidth-delay product of the network, over wireless links,” in Proc. IEEE Vehicular Technology Conference
greater the protection attained by it. We demonstrate the ’97, 1997, pp. 2326–2330.
SINGH et al.: TCP PERFORMANCE DYNAMICS AND TRANSMISSION POWER/LINK ADAPTATION BASED OPTIMIZATION METHODS FOR WIRELESS NETWORKS16
[6] J. Arauz, S. Banerjee, and P. Krishnamurthy, “Maite: A scheme for [32] A. Furuskar, D. Bladsjo, S. Eriksson, M. Frodigh, S. Javerbring, and
improving the preformance of tcp over wireless channel,” in Proc. IEEE H. Olofsson, “System performance of the EDGE concept for enhanced
Vehicular Technology Conference ’01, 2001, pp. 252–256. data rates in GSM and TDMA/136,” in Proc. IEEE Wireless Communi-
[7] K. Brown and S. Singh, “M-tcp: Tcp for mobile cellular networks,” cations and Networking Conference’99, vol. 2, 1999, pp. 752–756.
in Proc. ACM SIGCOMM Computer Communication Review, vol. 27, [33] V. Paxson and M. Allman, “Computing TCP’s retransmission timer,”
no. 5, 1997, pp. 19–43. RFC 2988, Nov. 2000.
[8] A. Bakre and R. Badrinath, “Handoff and system support for Indirect [34] U. Rehfuess and K. Ivanov, “Estimating the gains of adaptive antenna
TCP/IP,” in Proc. 2nd USENIX Symposium on Mobile and Location- systems for GPRS and EDGE data services in GSM networks,” in Proc.
dependent computing, 1995, pp. 11–24. IEEE Vehicular Technology Conference’00, vol. 6, 2000, pp. 3026–3032.
[9] H. Balakrishnan, S. S. E. A. Elan, and R. H. Katz, “Improving tcp/ip [35] H.-Y. Hsieh and R. Sivakumar, “pTCP: An end-to-end transport layer
performance over wireless networks,” in Proc. ACM Mobicom ’99, 1995, protocol for striped connections,” in Proc. 10th Intl. Conf. on Network
pp. 2–11. Protocols, 2002, pp. 24–33.
[10] G. M. Laura Galluccio and S. Palazzo, “An analytical study of a tradeoff [36] T. V. Laxman and U. Madhow, “The performance of tcp/ip for networks
between transmission power and FEC for TCP optimization in wireless with high bandwidth-delay products and randow loss,” IEEE/ACM Trans.
networks,” in Proc. IEEE INFOCOM’03, vol. 3, 2003, pp. 1765–1773. Networking, vol. 5, no. 3, pp. 336–350, 1997.
[11] D. Barman, I. Matta, E. Altman, and R. E. Azouzi, “TCP optimization [37] J. P. Singh, N. Bambos, K. Radermacher, and V. Scharf-Katz, “Power
through FEC, ARQ, and transmission power tradeoffs,” in Proc. 2nd Intl. control for TCP adaptation to high mobility bradband systems,” in Proc.
Conf. on Wired/Wireless InternetCommunications, 2004, pp. 87–98. IEEE Vehicular Technology Conference ’04, vol. 5, 2004, pp. 3501–
3505.
[12] M. Miyoshi, M. Sugano, and M. Murata, “Performance evaluation of
tcp throughput on wireless cellular networks,” in Proc. IEEE Vehicular
Technology Conference ’01, vol. 3, 2001, pp. 2177–2181.
[13] A. Srivastava, R. Friday, M. Ritter, and W. Filippo, “A study of tcp
performance over wireless data networks,” in Proc. IEEE Vehicular
Technology Conference ’01, vol. 3, 2001, pp. 2265–2269.
[14] M. C. Chan and R. Ramjee, “Tcp/ip performance over 3G wireless links
with rate and delay variation,” in Proc. ACM Mobicom ’02, 2002, pp.
71–82.
[15] E. Altman, K. Avrachenkov, and C. Barakat, “A stochastic model of
TCP/IP with stationary random losses,” IEEE/ACM Trans. Networking,
vol. 13, pp. 356–369, 2005.
[16] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, “Modeling TCP
throughput: A simple model and its empirical validation,” in Proc. ACM Michael Shell Biography text here.
SIGCOMM’98, 1998, pp. 303–314.
[17] J. P. Singh, Y. Li, and N. Bambos, “Channel state awareness based
transmission power adaptation for efficient tcp dynamics in wireless PLACE
networks,” in Proc. IEEE International Conference on Communications, PHOTO
2005. HERE
[18] M. Mathis, J. Semske, J. Madhavi, and T. Ott, “The macroscoic behavior
of the TCP congestion avoidance algorithm,” Computer Communication
Review, vol. 27, no. 3, 1997.
[19] W. Stevens, “TCP slow start, congestion avoidance, fast retransmit, and
fast recovery algorithms,” RFC 2001, Jan. 1997.
[20] M. Allman, V. Paxson, and W. Stevens, “TCP congestion control,” RFC
2581, Apr. 1999.
[21] S. Floyd and T. Henderson, “The NewReno modification to TCP’s fast
recovery algorithm,” RFC 2582, Apr. 1999.
[22] M.Mathis, J. Madhavi, S. Floyd, and A. Romanow, “TCP selective
acknowledgement options,” RFC 2018, Oct. 1996.
[23] D. Molkdar, W. Featherstone, and S. Lamotharan, “An overview of
EGPRS: the packet data component of EDGE,” Electronic. Communic.
Eng. J., vol. 14, no. 1, pp. 21–38, 2002.
[24] D. P. Bertsekas, Dynamic programming and optimal control, 2nd ed.
Belmont, MA: Athena Scientific, 2001.
[25] J. M. Rulnick and N. Bambos, “Mobile power management for wireless John Doe Biography text here.
communication networks,” Wireless Networks, vol. 3, no. 1, pp. 3–14,
1997.
[26] A. J. Goldsmith and P. Varaiya, “Capacity of fading channels with
channel side information,” IEEE Trans. Inform. Theory, vol. 63, no. 6,
pp. 1986–1992, 1997.
[27] G. Brasche and B. Walke, “Concepts, services, and protocols of the new
gsm phase 2+ general packet radio service,” IEEE Commun. Mag., pp.
94–104, Aug. 1997.
[28] S. Hamiti, M. Hakaste, M. Moisio, N. Nefedov, E. Nikula, and
H. Vilpponen, “Edge circuit switched data-an enhancement of gsm
data services,” in Proc. IEEE Wireless Communications and Networking
Conference’99, vol. 3, 1999, pp. 1437–1441.
[29] J. Chuang and S. Timiri, “Edge compact and edge classic data perfor- Jane Doe Biography text here.
mance,” in Proc. 2000 Universal Wireless Communication Consortium
Global Summit, 2000.
[30] D. Krishnaswamy, “Network-assisted link adaptation with power control
and channel re-assignment in wireless networks,” in Proc. 3G Wireless
Conference’02, 2002, pp. 165–170.
[31] D. Qiao and S. Choi, “Goodput analysis and link adaptation for IEEE
802.11a wireless LANs,” IEEE Trans. Mobile Comput., vol. 1, no. 4,
pp. 278–292, 2002.