2010 16th Asia-Pacific Conference on Communications (APCC) 2010
DOI: 10.1109/apcc.2010.5679750
|View full text |Cite
|
Sign up to set email alerts
|

D-Proxy: Reliability in wireless networks

Abstract: Abstract-Packet corruption negatively affects TCP throughputs because losses are interpreted as congestion. To enable TCP to operate effectively over wireless networks, a number of reliability techniques such as Forward Error Correction (FEC) and Automatic Repeat Request (ARQ) are used. These provide reliability at the expense of increased overheads. This study provides experimental results of a new distributed Performance Enhancing Proxy (PEP) called D-Proxy. This proxy can provide reliability to wireless lin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
2

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 16 publications
0
6
0
2
Order By: Relevance
“…Figure 5 shows how proxies work in wireless network scenario. However, introducing proxies result in loss of end-to-end semantics of TCP and increased delay due to buffering [13]. Buffers at intermediate proxies are prone to get exhausted if the link succeeding it is a slower link.…”
Section: Proxy Based Tcp Approachesmentioning
confidence: 97%
“…Figure 5 shows how proxies work in wireless network scenario. However, introducing proxies result in loss of end-to-end semantics of TCP and increased delay due to buffering [13]. Buffers at intermediate proxies are prone to get exhausted if the link succeeding it is a slower link.…”
Section: Proxy Based Tcp Approachesmentioning
confidence: 97%
“…Figure 3 shows how network partitioning leads to inactive time periods [48]. The other constraints in wireless networks are memory and processing constraints [24,28,41] and QoS constraints [10,21,49]. TCP has to be modified to work effectively in wireless networks and treat the problems specific to wireless networks based on their merit rather than blindly triggering congestion control mechanisms.…”
Section:  Bandwidth Limitationmentioning
confidence: 99%
“…Figure 15 shows how proxies work in wireless network scenario. However, introducing proxies results in loss of end-to-end semantics of TCP and increased delay due to buffering [28]. Buffers at intermediate proxies are prone to get exhausted if the link succeeding it is a slower link.…”
Section: 25mentioning
confidence: 99%
See 1 more Smart Citation
“…The loss of this acknowledgement also causes a retransmission. Under perfect conditions, with no retransmissions, the overhead of this scheme is approximately 25% of the total transmission time [11] in 802.11a/b/g networks. In more recent 802.11 amendments, block acknowledgements have been used to reduce this overhead.…”
Section: ) Arqmentioning
confidence: 99%