1999
DOI: 10.1109/65.777442
|View full text |Cite
|
Sign up to set email alerts
|

Internet protocol performance over networks with wireless links

Abstract: This article discusses the problems that arise when standard Internet protocols such as TCP are used over wireless links. We review wireless link characteristics with case studies drawn from commercial Wireless LANs and Cellular Telephony systems. We discuss problems with Internet protocols when employed over these systems, such as degraded TCP performance when wireless errors are interpreted as congestion losses. We survey various proposed approaches to mitigating such problems and examine their applicability… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2000
2000
2013
2013

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(27 citation statements)
references
References 27 publications
0
25
0
Order By: Relevance
“…6. The only change from the previous case is that all schemes achieve lower throughput, due to the multiplicative loss effects of the two wireless links [22]. The exception is Berkeley Snoop which is even closer to Raw Link, as it is unable to retransmit both client requests in one direction and server replies in the other.…”
Section: World Wide Web Browsingmentioning
confidence: 97%
See 2 more Smart Citations
“…6. The only change from the previous case is that all schemes achieve lower throughput, due to the multiplicative loss effects of the two wireless links [22]. The exception is Berkeley Snoop which is even closer to Raw Link, as it is unable to retransmit both client requests in one direction and server replies in the other.…”
Section: World Wide Web Browsingmentioning
confidence: 97%
“…Berkeley Snoop only works in the direction from the wired Internet towards a wireless host due to its reliance on TCP ACKs. In the reverse direction, TCP ACKs are returned late and may even signify congestion losses [22]. Since only the base station makes retransmissions towards the wireless host, TCP data cannot be retransmitted over both wireless links in the path, thus we resort to TCP recovery for one of them.…”
Section: B File Transfermentioning
confidence: 99%
See 1 more Smart Citation
“…We made this assumption because we have no control over the amount of additional traffic going through the wireless network, and we would expect authentication traffic to be a negligible fraction of the overall traffic. We derived the throughput for the wireless network by degrading transmission speeds to account for frame errors using the measurements and analysis performed by Xylomenos and Polyzos [1999]. Figure 11 demonstrates that the response times start to climb rapidly at the point at which the KDC saturates and server delay exceeds wireless network delay.…”
Section: "What-if" Analysismentioning
confidence: 99%
“…The congestion control algorithms of TCP are very essential for the stability of the Internet. However, the performance of TCP degrades rapidly when TCP operates in wireless networks [2]. Improving the end-to-end performance of TCP over wireless network has been an active research area in network community.…”
Section: Introductionmentioning
confidence: 99%