2016
DOI: 10.1109/access.2016.2593605
|View full text |Cite
|
Sign up to set email alerts
|

Protocols and Mechanisms to Recover Failed Packets in Wireless Networks: History and Evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 65 publications
0
8
0
Order By: Relevance
“…Therefore, deactivating the optional checksum field may be more advantageous for VoIP technology than activating it. As a result, the Checksum field can hold some of the VoIP packet data instead of being required for VoIP (Perkins, 2003;Khan et al, 2016;Stein et al, 2020).…”
Section: The Storing Fieldsmentioning
confidence: 99%
“…Therefore, deactivating the optional checksum field may be more advantageous for VoIP technology than activating it. As a result, the Checksum field can hold some of the VoIP packet data instead of being required for VoIP (Perkins, 2003;Khan et al, 2016;Stein et al, 2020).…”
Section: The Storing Fieldsmentioning
confidence: 99%
“…Some of the information in the UDP header is optional and disabled (set to zeros) for many applications, including the VoIP applications, namely the Checksum and the Source Port. Therefore, the fields that carry the Checksum and the Source Port information will be used by the PMCF method as carrier fields for the speech payload (Tomsho 2019;Eggert et al, 2017;Khan et al, 2016;Stein et al, 2020). The third header of the VoIP packet is the IPv6, which is used with all applications in the IP-based networks.…”
Section: Superfluous Fieldsmentioning
confidence: 99%
“…Therefore, VoIP applications may disable this optional field to rescue some damaged voice data and improve the call quality. Thus, the checksum field is redundant for VoIP applications and should be utilized by the PA-CH method to store a piece of the digitized voice data (Perkins, 2003;Khan et al, 2016;Stein et al 2020). In a nutshell, the 2-byte source port, the 2-byte destination port, the 2-byte length, and the 2-byte checksum fields of the UDP are redundant for VoIP applications and can be used by the PA-CH method to store part of the digitized voice data.…”
Section: Header's Redundant Fieldsmentioning
confidence: 99%