This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST.
RFC Downloads
Cited By
- Liu B, Tang D, Chen J, Liang W, Liu Y and Yang Q (2024). ERT-EDR, Expert Systems with Applications: An International Journal, 254:C, Online publication date: 15-Nov-2024.
- Wu B, Li T, Luo C, Yan X, Wang F, Du X and Xu K Toward Timeliness-Enhanced Loss Recovery for Large-Scale Live Streaming Proceedings of the 32nd ACM International Conference on Multimedia, (7891-7899)
- Wan Y, Xu K, Wang F and Xue G (2022). IoTAthena: Unveiling IoT Device Activities From Network Traffic, IEEE Transactions on Wireless Communications, 21:1, (651-664), Online publication date: 1-Jan-2022.
- Gujral H, Mittal S and Sharma A (2019). A Novel Data Mining Approach for Analysis and Pattern Recognition of Active Fingerprinting Components, Wireless Personal Communications: An International Journal, 105:3, (1039-1068), Online publication date: 1-Apr-2019.
- Jansen R, Traudt M, Geddes J, Wacek C, Sherr M and Syverson P (2018). KIST, ACM Transactions on Privacy and Security, 22:1, (1-37), Online publication date: 23-Jan-2019.
- Li M, Pei D, Zhang X, Zhang B and Xu K (2017). Interest-suppression-based NDN live video broadcasting over wireless LAN, Frontiers of Computer Science: Selected Publications from Chinese Universities, 11:4, (675-687), Online publication date: 1-Aug-2017.
- Rifai M, Huin N, Caillouet C, Giroire F, Moulierac J, Lopez Pacheco D and Urvoy-Keller G (2017). Minnie, Computer Networks: The International Journal of Computer and Telecommunications Networking, 121:C, (185-207), Online publication date: 5-Jul-2017.
- Formby D, Walid A and Beyah R (2017). A Case Study in Power Substation Network Dynamics, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:1, (1-24), Online publication date: 13-Jun-2017.
- Ghasemi M, Kanuparthy P, Mansy A, Benson T and Rexford J Performance Characterization of a Commercial Video Streaming Service Proceedings of the 2016 Internet Measurement Conference, (499-511)
- Schneider K, Yi C, Zhang B and Zhang L A Practical Congestion Control Scheme for Named Data Networking Proceedings of the 3rd ACM Conference on Information-Centric Networking, (21-30)
- Bessani A, Neves N, Veríssimo P, Dantas W, Fonseca A, Silva R, Luz P and Correia M (2016). JITeR, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (122-136), Online publication date: 20-Jul-2016.
- Lima S, Larces D, Júnior C and Larces J E-ProbT Proceedings of the 31st Annual ACM Symposium on Applied Computing, (709-715)
- Kiertscher S and Schnor B Scalability evaluation of an energy-aware resource management system for clusters of web servers Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, (1-8)
- Ge Z, Liu W, Li T and Ye J (2015). Analysis and solutions to 3G gateway issues in agriculture WSNs, International Journal of Distributed Sensor Networks, 2015, (3-3), Online publication date: 1-Jan-2015.
- Sharma A and Kaur R Non-cryptographic Detection Approach and Countermeasure for JFDV Attack Proceedings of the 7th International Conference on Security of Information and Networks, (367-372)
- Chen J, Subramanian L, Iyengar J and Ford B TAQ Proceedings of the Ninth European Conference on Computer Systems, (1-14)
- Laxmi V, Mehta D, Gaur M, Faruki P and lal C Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks Proceedings of the 6th International Conference on Security of Information and Networks, (189-195)
- Sun Y and Melodia T The internet underwater Proceedings of the 8th International Conference on Underwater Networks & Systems, (1-8)
- Lee S and Kim D Fast retransmit for flooding-based routing in underwater wireless sensor networks Proceedings of the 2013 Research in Adaptive and Convergent Systems, (273-276)
- Rodrigues M, Moreira A, Azevedo E, Neves M, Sadok D, Callado A, Moreira J and Souza V On learning how to plan content delivery networks Proceedings of the 46th Annual Simulation Symposium, (1-8)
- Rafetseder A, Metzger F, Stezenbach D and Tutschku K Exploring YouTube's content distribution network through distributed application-layer measurements Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, (31-36)
- Heusse M, Urvoy-Keller G, Brown T and Duda A (2011). Fast track article, Pervasive and Mobile Computing, 7:4, (479-494), Online publication date: 1-Aug-2011.
- Badam A, Kaminsky M, Han D, Papagiannaki K, Andersen D and Seshan S The hare and the tortoise Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (1-11)
- Anelli P, Lochin E, Harivelo F and Lopez D Transport congestion events detection (TCED) Proceedings of the 2010 ACM Symposium on Applied Computing, (663-669)
- Zagorodnov D, Marzullo K, Alvisi L and Bressoud T (2009). Practical and low-overhead masking of failures of TCP-based servers, ACM Transactions on Computer Systems, 27:2, (1-39), Online publication date: 1-May-2009.
- Mondal A and Kuzmanovic A (2008). Removing exponential backoff from TCP, ACM SIGCOMM Computer Communication Review, 38:5, (17-28), Online publication date: 30-Sep-2008.
- Armitage G, Stewart L, Welzl M and Healy J (2008). An independent H-TCP implementation under FreeBSD 7.0, ACM SIGCOMM Computer Communication Review, 38:3, (27-38), Online publication date: 1-Jul-2008.
- Moltchanov D, Dunaytsev R and Koucheryavy Y Cross-layer modeling of TCP SACK performance over wireless channels with completely reliable ARQ/FEC Proceedings of the 6th international conference on Wired/wireless internet communications, (13-26)
- Ye Q and MacGregor M Restoration objectives for internet backbone links Proceedings of the 11th communications and networking simulation symposium, (91-98)
- Phanishayee A, Krevat E, Vasudevan V, Andersen D, Ganger G, Gibson G and Seshan S Measurement and analysis of TCP throughput collapse in cluster-based storage systems Proceedings of the 6th USENIX Conference on File and Storage Technologies, (1-14)
- Rozner E, Iyer A, Mehta Y, Qiu L and Jafry M ER Proceedings of the 2007 ACM CoNEXT conference, (1-12)
- Núñez M, Fidalgo R and Morales R (2007). Learning in Environments with Unknown Dynamics: Towards more Robust Concept Learners, The Journal of Machine Learning Research, 8, (2595-2628), Online publication date: 1-Dec-2007.
- Zimmermann A, Schaffrath D, Faber M, Wenig M and Güneş M Improving tcp performance through explicit corruption and route failure notification (ecrfn) Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, (284-288)
- Omueti M and Trajković L TCP with adaptive delay and loss response for heterogeneous networks Proceedings of the 3rd international conference on Wireless internet, (1-10)
- Rhee I and Xu L (2007). Limitations of equation-based congestion control, IEEE/ACM Transactions on Networking, 15:4, (852-865), Online publication date: 1-Aug-2007.
- Gao R, Blair D, Dovrolis C, Morrow M and Zegura E Interactions of intelligent route control with TCP congestion control Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (1014-1025)
- Psaras I and Tsaoussidis V The TCP minimum RTO revisited Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (981-991)
- Mondal A and Kuzmanovic A When TCP Friendliness Becomes Harmful Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (152-160)
- Leung K, Li V and Yang D (2007). An Overview of Packet Reordering in Transmission Control Protocol (TCP), IEEE Transactions on Parallel and Distributed Systems, 18:4, (522-535), Online publication date: 1-Apr-2007.
- Kandula S, Katabi D, Sinha S and Berger A (2007). Dynamic load balancing without packet reordering, ACM SIGCOMM Computer Communication Review, 37:2, (51-62), Online publication date: 20-Mar-2007.
- Budzisz L, Ferrus R, Grinnemo K, Brunstrom A and Casadevall F An Analytical Estimation of the Failover Time in SCTP Multihoming Scenarios Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3929-3934)
- Daiqin Yang , Ka-Cheong Leung and Li V Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3238-3243)
- Iyengar J, Amer P and Stewart R (2007). Performance implications of a bounded receive buffer in concurrent multipath transfer, Computer Communications, 30:4, (818-829), Online publication date: 15-Feb-2007.
- Eggert L and Eddy W Towards more expressive transport-layer interfaces Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, (71-74)
- Chen J, Gerla M, Lee Y and Sanadidi M TCP with variance control for multihop IEEE 802.11 wireless networks Proceedings of the 2006 IEEE conference on Military communications, (884-890)
- Zhou X, Uijterwaal H, Kooij R and Van Mieghem P Estimation of perceived quality of service for applications on IPv6 networks Proceedings of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks, (74-81)
- Le L, Hossain E and Le-Ngoc T Effects of link-level queueing and truncated ARQ on TCP throughput in multi-rate wireless networks Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks, (46-es)
- Kuzmanovic A and Knightly E (2006). Low-rate TCP-targeted denial of service attacks and counter strategies, IEEE/ACM Transactions on Networking, 14:4, (683-696), Online publication date: 1-Aug-2006.
- Rewaskar S, Kaur J and Smith F (2006). A passive state-machine approach for accurate analysis of TCP out-of-sequence segments, ACM SIGCOMM Computer Communication Review, 36:3, (51-64), Online publication date: 5-Jul-2006.
- Lee S, Kim L and Song J Performance improvement of TCP over optical burst switching networks with drop policy Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (1131-1139)
- Yoo M, Hong M and Kim Y Receiver-Based rate control with one-way trip time for multimedia applications Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (641-649)
- Wepiwé G and Albayrak S A churn-resistant strategy for a highly reliable p2p system Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (756-765)
- Gu Y and Grossman R Supporting Configurable Congestion Control in Data Transport Services Proceedings of the 2005 ACM/IEEE conference on Supercomputing
- Luo X and Chang R Novel approaches to end-to-end packet reordering measurement Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (20-20)
- Kuzmanovic A (2005). The power of explicit congestion notification, ACM SIGCOMM Computer Communication Review, 35:4, (61-72), Online publication date: 1-Oct-2005.
- Rhee I and Xu L (2005). Limitations of equation-based congestion control, ACM SIGCOMM Computer Communication Review, 35:4, (49-60), Online publication date: 1-Oct-2005.
- Kuzmanovic A The power of explicit congestion notification Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (61-72)
- Rhee I and Xu L Limitations of equation-based congestion control Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (49-60)
- Schütz S, Eggert L, Schmid S and Brunner M (2005). Protocol enhancements for intermittently connected hosts, ACM SIGCOMM Computer Communication Review, 35:3, (5-18), Online publication date: 1-Jul-2005.
- Dunaytsev R, Koucheryavy Y and Harju J Refined PFTK-Model of TCP reno throughput in the presence of correlated losses Proceedings of the Third international conference on Wired/Wireless Internet Communications, (42-53)
- Kesselman A and Mansour Y Optimizing TCP retransmission timeout Proceedings of the 4th international conference on Networking - Volume Part II, (133-140)
- Medina A, Allman M and Floyd S (2005). Measuring the evolution of transport protocols in the internet, ACM SIGCOMM Computer Communication Review, 35:2, (37-52), Online publication date: 1-Apr-2005.
- Kim H, Kim J, Kang I and Bahk S (2005). Preventing Session Table Explosion in Packet Inspection Computers, IEEE Transactions on Computers, 54:2, (238-240), Online publication date: 1-Feb-2005.
- Kumar V and Sisalem D TCP based denial-of-service attacks to edge network Proceedings of the 7th international conference on Intelligent Information Technology, (214-223)
- Olshefski D, Nieh J and Nahum E ksniffer Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (23-23)
- Zhang M, Zhang C, Pai V, Peterson L and Wang R PlanetSeer Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (12-12)
- Krishnan R, Sterbenz J, Eddy W, Partridge C and Allman M (2004). Explicit transport error notification (ETEN) for error-prone wireless and satellite networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 46:3, (343-362), Online publication date: 22-Oct-2004.
- Kalden R and Ekström H (2004). Searching for mobile mice and elephants in GPRS networks, ACM SIGMOBILE Mobile Computing and Communications Review, 8:4, (37-46), Online publication date: 1-Oct-2004.
- Aad I, Hubaux J and Knightly E Denial of service resilience in ad hoc networks Proceedings of the 10th annual international conference on Mobile computing and networking, (202-215)
- Magnaghi A, Hamada T and Katsuyama T A wavelet-based framework for proactive detection of network misconfigurations Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (253-258)
- Ladha S, Baucke S, Ludwig R and Amer P (2004). On making SCTP robust to spurious retransmissions, ACM SIGCOMM Computer Communication Review, 34:2, (123-135), Online publication date: 1-Apr-2004.
- Lu G and Li X On the correspondency between TCP acknowledgment packet and data packet Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (259-272)
- Gurtov A and Ludwig R (2003). Lifetime packet discard for efficient real-time transport over cellular links, ACM SIGMOBILE Mobile Computing and Communications Review, 7:4, (32-45), Online publication date: 1-Oct-2003.
- Kuzmanovic A and Knightly E Low-rate TCP-targeted denial of service attacks Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, (75-86)
- Mathis M, Heffner J and Reddy R (2003). Web100, ACM SIGCOMM Computer Communication Review, 33:3, (69-79), Online publication date: 1-Jul-2003.
- Bohacek S, Hespanha J, Lee J, Lim C and Obraczka K TCP-PR Proceedings of the 23rd International Conference on Distributed Computing Systems
- Sarolahti P, Kojo M and Raatikainen K (2003). F-RTO, ACM SIGCOMM Computer Communication Review, 33:2, (51-63), Online publication date: 1-Apr-2003.
- Ségura-Devillechaise M, Menaud J, Muller G and Lawall J Web cache prefetching as an aspect Proceedings of the 2nd international conference on Aspect-oriented software development, (110-119)
- Radenkovic M and Greenhalgh C Multi-party distributed audio service with TCP fairness Proceedings of the tenth ACM international conference on Multimedia, (11-20)
- Libman L and Orda A (2002). Optimal retrial and timeout strategies for accessing network resources, IEEE/ACM Transactions on Networking, 10:4, (551-564), Online publication date: 1-Aug-2002.
- Jiang H and Dovrolis C (2002). Passive estimation of TCP round-trip times, ACM SIGCOMM Computer Communication Review, 32:3, (75-88), Online publication date: 1-Jul-2002.
- Sarolahti P and Kuznetsov A Congestion Control in Linux TCP Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, (49-62)
- Loguinov D and Radha H (2002). Retransmission schemes for streaming internet multimedia, ACM SIGCOMM Computer Communication Review, 32:2, (70-83), Online publication date: 1-Apr-2002.
- Allman M Measuring end-to-end bulk transfer capacity Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (139-143)
Recommendations
The Eifel retransmission timer
We analyze two alternative retransmission timers for the Transmission Control Protocol (TCP). We first study the retransmission timer of TCP-Lite which is considered to be the current de facto standard for TCP implementations. After revealing four ...
Optimizing TCP retransmission timeout
ICN'05: Proceedings of the 4th international conference on Networking - Volume Part IIDelay spikes on Internet paths can cause spurious TCP timeouts leading to significant throughput degradation. However, if TCP is too slow to detect that a retransmission is necessary, it can stay idle for a long time instead of transmitting. The goal is ...