skip to main content
RFC2488: Enhancing TCP Over Satellite Channels using Standard Mechanisms1999 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 January 1999
Bibliometrics
Skip Abstract Section
Abstract

The Transmission Control Protocol (TCP) provides reliable delivery of data across any network path, including network paths containing satellite channels. While TCP works over satellite channels there are several IETF standardized mechanisms that enable TCP to more effectively utilize the available capacity of the network path. This document outlines some of these TCP mitigations. At this time, all mitigations discussed in this document are IETF standards track mechanisms (or are compliant with IETF standards).

RFC Downloads

Cited By

  1. ACM
    Raman A, Varvello M, Chang H, Sastry N and Zaki Y (2023). Dissecting the Performance of Satellite Network Operators, Proceedings of the ACM on Networking, 1:CoNEXT3, (1-25), Online publication date: 27-Nov-2023.
  2. ACM
    Martin A and Khademi N On the suitability of BBR congestion control for QUIC over GEO SATCOM networks Proceedings of the Workshop on Applied Networking Research, (1-8)
  3. Kumar S, Andersen M, Kim H and Culler D Performant TCP for low-power wireless networks Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation, (911-932)
  4. Lai C, Leung K and Li V Enhancing AQM to combat wireless losses Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service, (1-9)
  5. Montpetit M and Médard M Video-centric network coding strategies for 4G wireless networks Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (934-938)
  6. De Vleeschouwer C and Frossard P (2008). Loss-resilient window-based congestion control, Computer Networks: The International Journal of Computer and Telecommunications Networking, 52:7, (1473-1491), Online publication date: 1-May-2008.
  7. ACM
    Sankaranarayanan V, Upadhyaya S and Kwiat K QoS-LI Proceedings of the 11th communications and networking simulation symposium, (99-105)
  8. Adelsbach A and Greveler U Insider attacks enabling data broadcasting on crypto-enforced unicast links Proceedings of the 12th European conference on Research in Computer Security, (469-484)
  9. ACM
    Lau S and Trajković L Analysis of traffic data from a hybrid satellite-terrestrial network The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, (1-7)
  10. ACM
    Mortier R and Kiciman E Autonomic network management Proceedings of the 2006 SIGCOMM workshop on Internet network management, (89-93)
  11. Tsai M, Chiang T and Huang Y Reliable transporting and optimal routing on rate-based for ad hoc networks Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing, (112-121)
  12. Byun S and Yoo C Reducing delivery delay in HRM tree Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (1189-1198)
  13. House T Client server access Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (719-724)
  14. Awal M, Kanchanasut K and Tsuchimoto Y Multicast packet loss measurement and analysis over unidirectional satellite network Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks, (254-268)
  15. ACM
    Gurtov A and Floyd S (2004). Modeling wireless links for transport protocols, ACM SIGCOMM Computer Communication Review, 34:2, (85-96), Online publication date: 1-Apr-2004.
  16. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T (2003). Upgrading transport protocols using untrusted mobile code, ACM SIGOPS Operating Systems Review, 37:5, (1-14), Online publication date: 1-Dec-2003.
  17. ACM
    Patel P, Whitaker A, Wetherall D, Lepreau J and Stack T Upgrading transport protocols using untrusted mobile code Proceedings of the nineteenth ACM symposium on Operating systems principles, (1-14)
  18. Cho S Scalable knowledge discovery in point-to-multipoint environments Proceedings of the 2003 international conference on Computational science and its applications: PartI, (437-445)
  19. Patel P, Wetherall D, Lepreau J and Whitaker A TCP meets mobile code Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9, (6-6)
  20. Pan J, Mark J and Shen S (2002). TCP Performance and Behaviors with Local Retransmissions, The Journal of Supercomputing, 23:3, (225-244), Online publication date: 1-Nov-2002.
  21. ACM
    Sterbenz J, Krishnan R, Hain R, Jackson A, Levin D, Ramanathan R and Zao J Survivable mobile wireless networks Proceedings of the 1st ACM workshop on Wireless security, (31-40)
  22. Handley M, Paxson V and Kreibich C Network intrusion detection Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  23. Farserotu J (2001). Integration of Terrestrial and Satellite Networks, Wireless Personal Communications: An International Journal, 17:2-3, (283-290), Online publication date: 1-Jun-2001.
  24. (2001). Use of TCP decoupling in improving TCP performance over wireless networks, Wireless Networks, 7:3, (221-236), Online publication date: 1-May-2001.
  25. Miyake Y, Hasegawa T, Hasegawa T and Kato T Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  26. Bakin D, Joa-Ng M and McAuley A Quantifying TCP Performance Improvements in Noisy Environments Using Protocol Boosters Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  27. Metz C (2000). IP-over-Satellite, IEEE Internet Computing, 4:4, (84-89), Online publication date: 1-Jul-2000.
Contributors
  • International Computer Science Institute

Recommendations