{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:19Z","timestamp":1750308259845,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2004,7]]},"abstract":"<jats:p>An intersystem or vertical handover is a key enabling mechanism for next generations of mobile communication systems. A vertical handover can cause an abrupt change of up to two orders of magnitude in link bandwidth and latency. It is hard for end-to-end congestion control to adapt promptly to such changes. This is especially a concern for slowly responsive congestion control algorithms, such as TCP-Friendly Rate Control (TFRC). TFRC is designed to provide a smooth transmission rate for real-time applications and, therefore, is less responsive to changes in network conditions than TCP. Using measurements and simulation, we show that TFRC has significant difficulties adapting after a vertical handover. TFRC receives only a fraction of TCP throughput over a fast link, but can be grossly unfair to concurrent TCP flows after handover to a slow link. We show that two proposals based on overbuffering and an explicit handover notification are effective solutions to these problems. Using them, TFRC can quickly adapt to new link characteristics after a handover, while otherwise maintaining a smooth transmission rate.<\/jats:p>","DOI":"10.1145\/1031483.1031494","type":"journal-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T18:32:02Z","timestamp":1169058722000},"page":"73-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Effect of vertical handovers on performance of TCP-friendly rate control"],"prefix":"10.1145","volume":"8","author":[{"given":"Andrei","family":"Gurtov","sequence":"first","affiliation":[{"name":"TeliaSonera Finland"}]},{"given":"Jouni","family":"Korhonen","sequence":"additional","affiliation":[{"name":"TeliaSonera Finland"}]}],"member":"320","published-online":{"date-parts":[[2004,7]]},"reference":[{"unstructured":"3GPP. TS 23. 107: QoS concept and architecture Mar. 2002.]] 3GPP. TS 23. 107: QoS concept and architecture Mar. 2002.]]","key":"e_1_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/316188.316230"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.17487\/RFC2581"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1007\/BF01985757"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1145\/383059.383080"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1109\/VETECF.2002.1040407"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1145\/570758.570763"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1109\/49.391749"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.5555\/295135.295139"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.1023\/A:1019138629630"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/347059.347397"},{"volume-title":"Proc. Sixth IEEE International Workshop on Mobile Multimedia Communications (MOMUC'99)","year":"1999","author":"Forsberg D.","key":"e_1_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1109\/98.839333"},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1145\/965732.965743"},{"unstructured":"A. Gurtov. Extensions of ns-2 simulator. Available at http:\/\/www.cs.helsinki.fi\/u\/gurtov\/ns\/ Mar. 2004.]] A. Gurtov. Extensions of ns-2 simulator. Available at http:\/\/www.cs.helsinki.fi\/u\/gurtov\/ns\/ Mar. 2004.]]","key":"e_1_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1145\/997150.997159"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1109\/INFCOM.2003.1209251"},{"doi-asserted-by":"publisher","key":"e_1_2_1_19_1","DOI":"10.1109\/VETECF.2002.1040488"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.17487\/RFC3448"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1145\/938985.938987"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1145\/938985.938989"},{"unstructured":"ICIR. Equation-based congestion control for unicast applications Aug. 2003. http:\/\/www.icir.org\/tfrc\/.]] ICIR. Equation-based congestion control for unicast applications Aug. 2003. http:\/\/www.icir.org\/tfrc\/.]]","key":"e_1_2_1_23_1"},{"unstructured":"IETF. Access link intermediaries assisting services BOF Oct. 2003.]] IETF. Access link intermediaries assisting services BOF Oct. 2003.]]","key":"e_1_2_1_24_1"},{"unstructured":"H. Inamura G. Montenegro R. Ludwig A. Gurtov and F. Khafizov. TCP over second (2.5G) and third (3G) generation wireless networks. IETF RFC 3481 (BCP 71) Feb. 2003.]] H. Inamura G. Montenegro R. Ludwig A. Gurtov and F. Khafizov. TCP over second (2.5G) and third (3G) generation wireless networks. IETF RFC 3481 (BCP 71) Feb. 2003.]]","key":"e_1_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1145\/52324.52356"},{"unstructured":"E. Kohler M. Handley and S. Floyd. Designing DCCP: Congestion control without reliability. Available at http:\/\/www.icir.org\/kohler\/dccp\/ May 2003.]] E. Kohler M. Handley and S. Floyd. Designing DCCP: Congestion control without reliability. Available at http:\/\/www.icir.org\/kohler\/dccp\/ May 2003.]]","key":"e_1_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.17487\/RFC3519"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1145\/505688.505692"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1109\/49.391748"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.17487\/RFC2018"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1145\/285237.285291"},{"doi-asserted-by":"publisher","key":"e_1_2_1_33_1","DOI":"10.1145\/965732.965736"},{"doi-asserted-by":"publisher","key":"e_1_2_1_34_1","DOI":"10.17487\/RFC3344"},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.17487\/RFC3168"},{"volume-title":"Proc. of USENIX'02","year":"2002","author":"Sarolahti P.","key":"e_1_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1109\/INFCOM.2000.832194"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1023\/A:1019197320544"},{"unstructured":"W. R. Stevens. TCP\/IP Illustrated Volume 1 (The Protocols). Addison-Wesley Nov. 1994.]] W. R. Stevens. TCP\/IP Illustrated Volume 1 (The Protocols). Addison-Wesley Nov. 1994.]]","key":"e_1_2_1_39_1"},{"unstructured":"UCB\/LBNL\/VINT. The ns-2 network simulator Aug. 2003. http:\/\/www.isi.edu\/nsnam\/ns\/.]] UCB\/LBNL\/VINT. The ns-2 network simulator Aug. 2003. http:\/\/www.isi.edu\/nsnam\/ns\/.]]","key":"e_1_2_1_40_1"},{"doi-asserted-by":"crossref","unstructured":"B. Walke. Mobile Radio Networks Networking and Protocols (2. Ed.) Wiley & Sons 2001.]] B. Walke. Mobile Radio Networks Networking and Protocols (2. Ed.) Wiley & Sons 2001.]]","key":"e_1_2_1_41_1","DOI":"10.1002\/0470841931"},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.5555\/520551.837517"},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.1109\/65.923938"},{"unstructured":"G. Xylomenos. Multi Service Link Layers: An Approach to Enhancing Internet Performance over Wireless Links. PhD thesis University of California at San Diego 1999.]] G. Xylomenos. Multi Service Link Layers: An Approach to Enhancing Internet Performance over Wireless Links. PhD thesis University of California at San Diego 1999.]]","key":"e_1_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1109\/INFCOM.2001.916669"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031483.1031494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1031483.1031494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:46Z","timestamp":1750267426000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031483.1031494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["10.1145\/1031483.1031494"],"URL":"https:\/\/doi.org\/10.1145\/1031483.1031494","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2004,7]]},"assertion":[{"value":"2004-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}