Momentary recovery algorithm: A new look at the traditional problem of TCP

Jae Hyun Hwang, See Hwan Yoo, Chuck Yoo

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


Traditional TCP has a good congestion control strategy that adapts its sending rate in accordance with network congestion. In addition, a fast recovery algorithm can help TCP achieve better throughput by responding to temporary network congestion well. However, if multiple packet losses occur, the time to enter congestion avoidance phase would be delayed due to the long recovery time. Moreover, during the recovery phase, TCP freezes congestion window size until all lost packets are recovered, and this can make recovery time much longer resulting in performance degradation. To mitigate such recovery overhead, we propose Momentary recovery algorithm that recovers packet loss without an extra recovery phase. As other TCP and variants, our algorithm also halves the congestion window size when packet drop is detected, but it performs congestion avoidance phase immediately as if loss recovery is completed. For lost packets, TCP sender transmits them along with normal packets as long as congestion window permits rather than performs fast retransmission. In this manner, we can eliminate recovery overhead efficiently and reach steady state momentarily after network congestion. Finally, we provide a simulation based study on TCP recovery behaviors and confirm that our Momentary recovery algorithm always shows better performance compared with NewReno, SACK and FACK.

Original languageEnglish
Pages (from-to)3765-3773
Number of pages9
JournalIEICE Transactions on Communications
Issue number12
Publication statusPublished - 2009


  • Congestion control
  • Loss recovery algorithm
  • Recovery overhead
  • Transmission control protocol

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Momentary recovery algorithm: A new look at the traditional problem of TCP'. Together they form a unique fingerprint.

Cite this