Please use this identifier to cite or link to this item:
https://doi.org/10.1016/S1389-1286(01)00310-3
DC Field | Value | |
---|---|---|
dc.title | TCP HACK: A mechanism to improve performance over lossy links | |
dc.contributor.author | Balan, R.K. | |
dc.contributor.author | Lee, B.P. | |
dc.contributor.author | Kumar, K.R.R. | |
dc.contributor.author | Jacob, L. | |
dc.contributor.author | Seah, W.K.G. | |
dc.contributor.author | Ananda, A.L. | |
dc.date.accessioned | 2013-07-23T09:23:41Z | |
dc.date.available | 2013-07-23T09:23:41Z | |
dc.date.issued | 2002 | |
dc.identifier.citation | Balan, R.K., Lee, B.P., Kumar, K.R.R., Jacob, L., Seah, W.K.G., Ananda, A.L. (2002). TCP HACK: A mechanism to improve performance over lossy links. Computer Networks 39 (4) : 347-361. ScholarBank@NUS Repository. https://doi.org/10.1016/S1389-1286(01)00310-3 | |
dc.identifier.issn | 13891286 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/43053 | |
dc.description.abstract | In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corruption from congestion in lossy environments resulting in improved performance. We refer to this extension as the HeAder ChecKsum option (HACK). We implemented our algorithm in the Linux kernel and performed various tests to determine its effectiveness. Our results have shown that HACK performs substantially better than both selective acknowledgement (SACK) and NewReno in cases where burst corruptions are frequent. We also found that HACK can co-exist very nicely with SACK and performs even better with SACK enabled. © 2002 Elsevier Science B.V. All rights reserved. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1016/S1389-1286(01)00310-3 | |
dc.source | Scopus | |
dc.subject | Protocol analysis | |
dc.subject | Protocol design | |
dc.subject | Wireless networks | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.contributor.department | INSTITUTE FOR COMMUNICATIONS RESEARCH | |
dc.description.doi | 10.1016/S1389-1286(01)00310-3 | |
dc.description.sourcetitle | Computer Networks | |
dc.description.volume | 39 | |
dc.description.issue | 4 | |
dc.description.page | 347-361 | |
dc.description.coden | CNETD | |
dc.identifier.isiut | 000176290300002 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.