• Nenhum resultado encontrado

TCP over IEEE 802.11

N/A
N/A
Protected

Academic year: 2017

Share "TCP over IEEE 802.11"

Copied!
11
0
0

Texto

(1)

! ! " # $ %&'

!"

() ### $ !! % % & '

(

) ) % % * ( *

) % % * *

) + ,

- * ) ( + % % *

( ### $ !! +

, ,

, , ### $ !!

' % * '

* +, -) (. ### $ !!. . % . % /.

.! /.

' + ) % , /

+ ) % , 0 %

% % * , % % * 1 .

2 , 3 % * .

4 +

% , , ,

% ### $ !! %

### $ !! % 4

5 6 7. 8 + 98 :. (

9( : 8

% +

(2)

8 4

% , 9 4 ; : 0 )

8

98 + : , . %

+ . %

. % ) 8 .

+ * < , + )

#, % + * < , '

+ + % + * < , . )

= . + * < , > ?@ . % @ <

) , +

% % 5 . 37. 3 ) + % % %

9 34 : % % / 9 34 /:

+ * < , + . , . )

+ )

. A + * < , %

. )

8 ,

% + * < , A .

3 34 . % , 3 +

/ , 3 34 /

### $ !! % +

. @ & ) @ @

/ + 8

+ @ %

A + % @ < , , & ) @

. , B. % A ) @ <

,

. , !0

( , ) , ### $ !!+

, 5C6 !7 #/ , ,

) % * + ) +

+ % % % * *

) ) + . ( D ,

) - % , . % % ) ' .

(3)

+ . + , ( + %

) ( + % !4+

/ , /

( , % < % *

5EE F7 , ) , ,

% * = % < < ### $ !!+ %

% , %

) . % + ) + )

% ( ### $ !!

+ ( , % <

% *

) 4

+ % ( < ) $ !!

% * 5'G F7 + , ( , <

) = < <

= ( % %

/ + . % % (

+ ) (D )) ,

, ( % * + ,

$ !! % *

( , $ !! % * ) 5E B7

E )

* % ) ( ) ,

+ , * % )

( < % *

) 536 B7 # 4

# < <# ( , % + *) .

% % % * ) . )

* ( ) + H % , .

) )

. )

) ) % * , 4

( % % * )

### $ !! 5 6 F7 C ,

% * ) % . / % %

A I3D % ( , ) ) , /

% - % , . ( ) %

% % A ) 3. ) )

(4)

. , 2 . *

+ + * ( % % A 3 & *

@#8 * * ) + + + A

( % % A 3

! !1 / ! 2 .

1 , , ### $ !!

@ . 34 .

34 /

3 .

' < J % * ) ) )

K) , ! . ! . !B %

) % * !F K !

+ % /

) ( % * A !F + ) +

) % , ) + % ) !

+ . +

J

4 ! 5 ) 1 . 6

#

+ D % * .

) . % . , , . % /

& 3 , & ' 8 = 98 :

) & 3 , & ' 8 =

% + ! % * ) 8

(5)

7 5 -))) ! 1 . ! " .. "

! 1 . !

4 / + % 4+

= !B4-A

4 8 ;8L( E

! 0

! FF <!! 0

@ , M FJ <! 0

( 3 .! /"

N +

* , +

N , ) * * )

# < <#

N + *

N + * ,

+ 4 ( * *

/ )

) 1 . " ." " "

/. ) !. .! .

4 ! 5 ! . 17 ! 6 /0 ." ! " // ""

(6)

) !. 26 . N

4 ! &5 ! . ! 9. 9 - 8 . ) !. .! .

) !. 26 . N

! "

(7)

) !. 26 . N #

$ $

@ . % A * .

+ * . + ) , )

) * ### $ !! , & % ,

+ % + +

, % +

) . % ,

% )

+ * ) %

* ) . ) ,

+

3 , % + *

/ ) +

* % ) B '

/ + , ) ) , , ) # < <#

% ) M

/. ,3 ,3 2

4 ! $5 ! . 17 ! 6 /0 ." ! " // "" 8 . ,3

) !. 26 . % #

&' #

&'

(8)

4 ! %5 ! . 17 ! /0 ." -! 66 8 . ,3

) !. 26 . N #

&' + &'

4 ! ;5 ! . 17 ! 6 /0 ." ! " // "" 8 . ,3 2

) !. 26 . N #

(9)

4 ! 5 ! . 17 ! /0 ." -! 66 8 . ,3 2

) !. 26 . N #

&' ,

&' ( )*

7 5 8 . - ! . , < 1 ."

, < 1 ." = ,3

,3 2>

17 ! 6 /0 ."

! " // ""

! 9. 9 -=" /> . 17 ! /0 ." -! 66 17 ! /0 ." -! 66 . 3 ! 7 1"

17 ! /0 ." -! 66 . " " 17 ! /0 ."

-! 66 .

.! .

2/ ."

< 1 .

9!F.! M: !M$ ! !B J !$ F! !

9M!.! M: !M $ B BM ! J !M

9M!.F!!: ! JJ ! !F ! F !FJ FF ! !

9! . FF: !B M !F! ! F FF

9! .F!!: !F $ M!FF !B ! J J BJ

9! .! M: !JM! !BJ !JF ! J$ FB

9 FF.F!!: !JJ$ B M M FB !

) !. 26 . N , &' $ &' ! ))$)--! .

&' &'

### $ !! % . ,

(10)

) % , 0 * < , 3 +

@ % + * < ,

@ ) @ <@ 3 , 34

% + + @ <@ @ < ) )

* + ) / )

) , 34 ,

+ , % 34 , % ) F +

* % 34 , . % %

) J % 34 / - ) , 34 /

+ % ) ) $

) + , . 34

34 / - 34 + +

) + * , +

+ , ) 34 34 / % + +

% 3 )) + % 34 34 /

/ "

, , ### $ !!

- ) , + % * ' +

* , %

,

+ * + ,

% 3 . 34

34 / , ( , ### $ !!

34 / , ( , ###

$ !! ' + * , +

* % 34 ,

, 34 , FF. 34 / ,

! / "

5 6 7 (! ! 8 ! , ? ? @ * 1 ! "/ ..

) 0 9 ./// 0 -- . ###

) A . !

5 6 F7 A 4 B < .! " A ! " < 2 A

(11)

&1 1 $ ./// & . , B. ' . F

5C6 !7 3 !. @ !/ C < " ) / D < " 3 D 9

/ 2 2 &1 1

./// 0 -- '+ #. ( ) ###

3 ( 4 .

!

5E B7 !D * ! ? ) ! <1 .

&1 " &3 ./// 0 -- ' + # .

( ) 3 ' B

5EE F7 0 " * 8 * 1 ! 9 / .

&1 1 ' # .

( ) C 144D F. F

5'G F7 * . 1 * 9 &1 0

--# % . 1 / .

( ) 4 + - . F

536 B7 + 1 , * + + < B 1 A 9 /

& 4 &1 1 ./// 0 -- 5

Referências

Documentos relacionados

Não existem duas placas com o mesmo endereço MAC , ou seja, este endereço é único para cada placa de rede em cada computador... Cabo de

Define os protocolos de aplicativos TCP/IP e como os programas host estabelecem uma interface entre o usuário e a aplicação, assim como uma interface

(A “widow” is any single last line of a paragraph, even if it is of full column width.) The exceptions are when widows are used to introduce equations or when they are in

So, i propose a simple heuristic, called fixed RTO, to distinguish betien route loss and network congestion and thereby improve the performance of the routing algorithms.. The

transmissions in the network. The drawback of these TCP variants is that they still adopt the AIMD congestion control algorithm with unnecessary large transmission windows. Chen

without errors in transmission or losing clients. This flexibility is also required for being able to dynamically adjust the bandwidth, modulation and coding

(v) If the retransmission timer timeout, TCP regards packet loss, set ssthresh to half of the current congestion window, cwnd is one segment, and then TCP retransmits the lost

Plot 2 shows the variation of RTT vs Time for 300s simulation for the scenario 2 for flow 2 having 3 flows in total. Plot 1 shows the variation of RTT vs Time for 300s simulation