TCP over Wireless Links

Mohsen Guizani and Anupama Raju, Western Michigan University

Introduction

Congestion Avoidance and Control

Slow Start

Congestion Avoidance

Fast Retransmit

Fast Recovery

TCP over Wireless

Limitations in a Wireless Network

TCP Performance in a Wireless Network

Classification of Proposed Schemes

Proposed Schemes for Wireless TCP

Pure Link-Level Approaches

Soft-State Transport-Layer Caching Approaches

Soft-State Cross-Layer Signaling Approaches

Hard-State Transport Layer Approaches

Pure End-to-End Transport-Level Approaches

Security

Security Issues

Possible Attacks

Standards in Wireless Networks

Threats to TCP

SYN Flooding

Sequence Number Attack

TCP Session Hijacking

TCP FIN and RST Bit Attacks

Land Attack

Security Protocols

Conclusion

Glossary

Cross References

References

INTRODUCTION

The transport layer is the basic end-to-end building block of the Internet (TCP/IP) architecture and communications. Protocols above the transport layer concentrate on distributed applications processing, and protocols below the transport layer concentrate on the transmission, routing, and forwarding of application data. The transmission control protocol is a connection-oriented, reliable, byte stream service that provides data transfer that is reliable, ordered, fully duplex, robust, and flow controlled (Network Sorcery, n.d.; Rey, 1981)

Each TCP segment (shown in Figure 1) contains the source and destination port number to identify the sending and receiving application. A socket ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.