- Introduction
- Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks
- Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks
- Classification of Transport Layer Solutions
- TCP over Ad Hoc Wireless Networks
- Other Transport Layer Protocols for Ad Hoc Wireless Networks
- Security in Ad Hoc Wireless Networks
- Network Security Requirements
- Issues and Challenges in Security Provisioning
- Network Security Attacks
- Key Management
- Secure Routing in Ad Hoc Wireless Networks
- Summary
- Problems
- Bibliography
9.3 DESIGN GOALS OF A TRANSPORT LAYER PROTOCOL FOR AD HOC WIRELESS NETWORKS
The following are the important goals to be met while designing a transport layer protocol for ad hoc wireless networks:
-
The protocol should maximize the throughput per connection.
-
It should provide throughput fairness across contending flows.
-
The protocol should incur minimum connection setup and connection maintenance overheads. It should minimize the resource requirements for setting up and maintaining the connection in order to make the protocol scalable in large networks.
-
The transport layer protocol should have mechanisms for congestion control and flow control in the network.
-
It should be able to provide both reliable and unreliable connections as per the requirements of the application layer.
-
The protocol should be able to adapt to the dynamics of the network such as the rapid change in topology and changes in the nature of wireless links from uni-directional to bidirectional or vice versa.
-
One of the important resources, the available bandwidth, must be used efficiently.
-
The protocol should be aware of resource constraints such as battery power and buffer sizes and make efficient use of them.
-
The transport layer protocol should make use of information from the lower layers in the protocol stack for improving the network throughput.
-
It should have a well-defined cross-layer interaction framework for effective, scalable, and protocol-independent interaction with lower layers.
-
The protocol should maintain end-to-end semantics.