2004
DOI: 10.1016/j.comnet.2003.10.008
|View full text |Cite
|
Sign up to set email alerts
|

Considering spurious timeout in proxy for improving TCP performance in wireless networks

Abstract: Abstract-In this paper, we introduce a new proxy that effectively prevents unnecessary retransmissions from flowing over a wireless link on a path with sudden delay. The proposed STD algorithm detects spurious timeout based on the comparison of the measured inter-arrival timeout of ACK during spurious timeout period with the average inter-arrival time of ACK. It responses to spurious timeout by filtering duplicate ACKs that can cause spurious fast retransmission. Simulation results show that proposed Spurious … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…When Figs. 5.18 and 6.6 are compared, it can be seen that the UART Data Tx time is the same at both 11.2 kbps and 24 kbps, which is a fixed overhead. However, NFC Data Tx time is As explained earlier, the NFC module requires the packet to be available for transmission at least 2 ms before the time slot occurs.…”
Section: Bandwidth Utilizationmentioning
confidence: 99%
See 1 more Smart Citation
“…When Figs. 5.18 and 6.6 are compared, it can be seen that the UART Data Tx time is the same at both 11.2 kbps and 24 kbps, which is a fixed overhead. However, NFC Data Tx time is As explained earlier, the NFC module requires the packet to be available for transmission at least 2 ms before the time slot occurs.…”
Section: Bandwidth Utilizationmentioning
confidence: 99%
“…This affects the total transmission time and thus the throughput of the TCP session. The throughput could be improved by ACKs coming from the appliance and the end-user device, similar to the technique proposed in [5]. This would reduce the number of packets on the NFC channel and improve the system performance.…”
Section: Throughput and Goodputmentioning
confidence: 99%
“…A Performance Enhancing Proxy (PEP) based approach is described in [14] -here, the performance of TCP is enhanced by filtering out DupACKs to the sender when a spurious timeout has happened in order to prevent it from unnecessarily retransmitting packets. This method is based on the assumption that the sender is unable to detect a spurious timeout by itself.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [11] proposes a proxy mechanism to detect SRTOs and to modify TCP acknowledgments in order to avoid SRTOs at the data sender.…”
Section: Related Workmentioning
confidence: 99%