2008
DOI: 10.1016/j.comcom.2008.04.017
|View full text |Cite
|
Sign up to set email alerts
|

A cross-layer design for TCP end-to-end performance improvement in multi-hop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…In this mechanism, unacknowledged data is retransmitted through link layer until a retransmission limit (RET L ) is achieved, only after which the transport layer mechanism is invoked. Another similar approach called TCP-CL [13] introduces a cross-layer approach to enhance endto-end performance of multi-hop TCP. The mechanism is employed to provide explicit corruption loss information in both transport layer and MAC layer.…”
Section: B Cross-layermentioning
confidence: 98%
“…In this mechanism, unacknowledged data is retransmitted through link layer until a retransmission limit (RET L ) is achieved, only after which the transport layer mechanism is invoked. Another similar approach called TCP-CL [13] introduces a cross-layer approach to enhance endto-end performance of multi-hop TCP. The mechanism is employed to provide explicit corruption loss information in both transport layer and MAC layer.…”
Section: B Cross-layermentioning
confidence: 98%
“…snoop agent did not receive the next packet predetermined by the TCP receiver), the ACK packet will be forwarded directly to the TCP source (case 3). Conversely, if the packet was lost in the wireless connection, a negative acknowledgement (NAK) option [21] will be added in the ACK (associate with the same TCP connection) and the ACK will be forwarded to the TCP source at a later time (case 4).…”
Section: Ack Arrival From Wireless Stationmentioning
confidence: 99%
“…Consequently, it takes some time to recover from the loss of multiple segments. Owing to this limitation of TCP, it performs very poorly in an environment prone to high losses [15].…”
Section: High Bit Error (Random Losses) Rate and Burst Lossesmentioning
confidence: 99%
“…In IEEE 802.11 MAC protocol, when the number of attempts for medium access exceeds a specified limit, the sender assumes that the receiver is out of range and stops its transmission attempts. The MAC protocol notifies the upper layer that the path is unavailable, and the upper layer starts a route recovery procedure [15]. At this stage, TCP stops transmission, and throughput becomes zero during the route recovery process.…”
Section: (B) Channel Contentionmentioning
confidence: 99%