Cross-Layer Error Recovery Optimization in WiFi Networks

  • Dzmitry Kliazovich
  • Nadhir Ben Halima
  • Fabrizio Granelli
Conference paper
Part of the Signals and Communication Technology book series (SCT)

This paper presents a novel approach for cross-layer error control optimization in WiFi networks. The focus is on the reduction of the overhead deriving from the duplicate ARQ strategies employed at the link and transport layers. The proposed solution, called ARQ proxy, substitutes the transmission of a transport layer acknowledgement with a short request sent at the link layer. Specifically, TCP ACKs are generated based on in-transit traffic analysis and stored at the Access Point. Such TCP ACKs are released towards TCP sender upon a request from the mobile node, encapsulated into link layer acknowledgement frame. TCP ACK identification is computed at the Access Point as well as at the mobile node in a distributed way. ARQ proxy improves TCP throughput in the range of 25-100% depending on the TCP/IP datagram size used by the connection. Additional performance improvement is obtained due to RTT reduction and higher tolerance to wireless link errors.


Mobile Node Hash Function Transmission Control Protocol Wireless Link Wireless Local Area Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    W.C.Y. Lee, “Mobile Communications Design Fundamentals,” 2nd Ed., Wiley, 1993.Google Scholar
  2. 2.
    J.B. Postel, “Transmission Control Protocol,” RFC 793, September 1981.Google Scholar
  3. 3.
    C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely and S.C. Diot, “Packet-level traffic measurements from the Sprint IP backbone,” IEEE Network, vol. 17(6), pp. 6-16, Nov.-Dec. 2003.CrossRefGoogle Scholar
  4. 4.
    A. Partow, “General Purpose Hash Function Algorithms,” http://www.partow. net/programming/hashfunctions/
  5. 5.
    NS-2 simulator tool home page,, 2000.
  6. 6.
    D. Kliazovich and F. Granelli, “A Cross-layer scheme for the TCP Performance Improvement in Wireless LANs,” IEEE Global Communications Conference, GLOBECOM’04, Dallas, U.S.A., December 2004.Google Scholar
  7. 7.
    “Fixed Wireless, WiMax, and WiFi Market Opportunities, Strategies, and Fore-casts, 2005 to 2010,” WinterGreen Research, Inc., May 2004.Google Scholar
  8. 8.
    F. Kelly, “Mathematical Modelling of the Internet,” B. Engquist and W. Schmid (eds.), “Mathematics Unlimited - 2001 and Beyond”, Springer, Berlin Heidelberg Newyork, pp. 685-702, 2001.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Dzmitry Kliazovich
    • 1
  • Nadhir Ben Halima
    • 1
  • Fabrizio Granelli
    • 1
  1. 1.DIT, University of TrentoItaly

Personalised recommendations