2018
DOI: 10.1109/tnet.2018.2806352
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Compound TCP Over WiFi for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(13 citation statements)
references
References 40 publications
0
13
0
Order By: Relevance
“…Research work [12,[32][33][34][35][36][37] focuses on model the throughput performance in wireless networks. The interference caused by rogue APs are modeled in [32], the authors find that hidden terminals cause about 30% MAC layer loss rate increase on average, and the carrier sense interference due to rogue APs causes only 5% access delay to increase at the MAC layer.…”
Section: Mathematic Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…Research work [12,[32][33][34][35][36][37] focuses on model the throughput performance in wireless networks. The interference caused by rogue APs are modeled in [32], the authors find that hidden terminals cause about 30% MAC layer loss rate increase on average, and the carrier sense interference due to rogue APs causes only 5% access delay to increase at the MAC layer.…”
Section: Mathematic Modelingmentioning
confidence: 99%
“…Research works in [27] aim to model the packet delay caused by interference, and the author proposed an algorithm to minimize the interference and decrease the packet latencies. The compound TCP in the Internet of Thing (IoT) is modeled as several subprocesses in [37]; these subprocesses are congestion window, throughput, and packet loss.…”
Section: Mathematic Modelingmentioning
confidence: 99%
“…A large number of papers have studied the performance of TCP and ECN; see [8,[19][20][21] as a not exhaustive list, but the main focus is on the behavior of a single TCP connection under various scenarios. Other works focused on the specific TCP versions installed by default in the Linux and Windows operating systems and developed models studying their performance [22][23][24]. More similar to the analysis carried out here are those proposed in [9,25,26] where the authors consider the overall system performance in the mean field limit for ECN/RED.…”
Section: Introductionmentioning
confidence: 96%
“…Hence, wireless access technology providing reliable communications is the key to unleash the potential of the massive IoT. Currently, IoT devices access various wireless networks mainly via low-cost commercial technologies such as Zigbee [8], Bluetooth [9], and WiFi [10]. However, these technologies only support short-range wireless access for a an indoor environment or in a small area.…”
Section: Introductionmentioning
confidence: 99%