Académique Documents
Professionnel Documents
Culture Documents
I.
INTRODUCTION
Bandwidth (M)
8
7
6
5
4
3
2
1
0
0
25
50
75
Window Size
100
125
150
Bandwidth(M)
LAN 10M
LAN 100M
100
90
80
70
60
50
40
30
20
10
0
0
25
50
75
Window Size
100
125
150
Wireless channel
0.6
0.5
Bandwidth (M)
D. Timer Processor
transmitted
acknowledged
10
0.4
0.3
0.2
0.1
0
0
10
15
20
Window Size
25
30
35
40
B. Window size
Figure 5 describes the curves of the bandwidth
utilization vs. the window size in the sender and receiver.
In the same figure, we show the impacts of the different
probabilities of packets loss on the bandwidth utilization.
Lossless
Loss 1%
Loss 2%
Lossless
25
50
75
WindowSize
100
125
150
Loss 2%
Loss 5%
100000
80000
60000
40000
20000
0
0
25
50
75
Window Size
100
125
150
C. Timeout period
Timeouts play a crucial role in the network performance.
Figure 7 illustrates the impacts of timeout periods on the
bandwidth utilization in a 100M Ethernet LAN. For
reliable communication channels, a high timeout value
doesnt appear to reduce throughput. But for unreliable
channels, a high timeout period will affect the
performance unfavorably.
Transmitted
Loss 5%
100
90
80
70
60
50
40
30
20
10
0
Loss 1%
120000
Bandwidth(M)
Bandwidth(M)
transmitted
Acknowledgement Delay(s)
w =Tt/Ts= Tt/(S/B)=146,
the throughput will be dropped rapidly.
3) Due to the receiver uses the policy of the
piggybacked acknowledgement in our model, when a
data frame arrives to the receiver, the acknowledgement
cannot generated immediately and should wait to the
next data frame which is sent by the receiver. The
half-bandwidth capacity is wasted in this case when we
set the window size not bigger enough.
Figure 3 presents the simulation results on a 100 Mbps
Ethernet LAN. In this case we can also get w =122 and
w =146. Figure 4 presents some results on the wireless
channel. The medium bandwidth capacity is 50 kbps, the
packet size S=100 bytes, the round trip time Tr=500 ms,
the timeout period Tt=600 ms and no packet loss. In the
same way, we can get w=31 and w=38.
This exercise is shown that we can derive similar
performance results in different medium bandwidth
environments with no packet loss. It is significant for the
high performance network. In many network, errors are
very rare so these simulation results is close to reality.
Lossless
Loss 1%
Loss 2%
Loss 5%
100
90
80
70
60
50
40
30
20
10
0
10
15
20
Timeout Period (ms)
25
30
D. Packet size
The simulation results of curves of the bandwidth
utilization vs. the packet sizes shown in figure 8 are
derived on a 100Mbps Ethernet LAN. A bigger enough
packet generally gives better performance. However, too
bigger packet size fills up the pipeline, the performance
will be drop off.
Transmittedl
Lossless
Loss 1%
Loss 2%
Loss 5%
100
90
Bandwidth (M)
80
70
60
50
40
30
20
10
0
0
5000
10000
15000
Packet Size (bytes)
20000
25000
V. CONCLUSIONS
In this paper we have presented an abstract executable
performance model of the sliding window protocol in the
modeling language POOSL. Some simulation results can be
derived from the model. These results illustrated a number
of key-parameters affecting the overall performance of the
protocol. We have discussed that the impacts of the
key-parameters on the bandwidth utilization and the delay
of the acknowledgement in several network environments
and different parameter settings. It is shown that the
window size, the timeout period and the probability of
packets loss are effect on the performance characteristics of
the protocol dramatically.
For our future work, we would like to extend the model to
the sliding window protocol using selective repeat. More
parameters and complex network environments should be
investigated in our model. We are also interested in the
comparison between the simulation results and the
measurements in a real network.
REFERENCES
[1] N.V. Stenning. A data transfer protocol. Computer Networks,
1(2):99-110,1976.
[2] Eric Madelaine and Didier Vergamini. Specification and
Verification of a Sliding Window Protocol in LOTOS. FORTE
'91, Sydney, Australia, November 1991, pages 495-510.
[3] Mark A. Smith and Nils Klarlund. Verification of a Sliding
Window Protocol Using IOA and MONA. FORTE/PSTV 2000,
Pisa, Italy, October 2000, pages 19-34.
[4] Dmitri Chkliaev, Jozef Hooman and Erik de Vink. Formal
Verification of an Improved Sliding Window Protocol. In
proceeding of the PROGRESS 2002, Utrecht, The Nethelands,
October 2002, pages 18-27.
[5] A.S. Tanenbaum. Computer Networks. Prentice-Hall International, Inc., 1996.
[6] P.H.A.van der Putten and J.P.M. Voeten. Specification of
Reactive Hardware/Software Systems. PhD thesis, Eindhoven
University of Technology, Department of Electrical Engineering,
1997.