Abstract

When the data packets transferred in duplex directions from part A to part B, and the data arrives at B, instead to sending a control frame from B to A, receiver B waits until the network layer at B send the next packet to A, and the Acknowledgment is attached in data frame from B to A using the field of Acknowledgment in the data frame header. so the acknowledgment got a free ride in the data frame, this technique known as piggybacking. One of the most advantages for piggyback scheme is improving the efficiency, which is reducing the overhead and increase system throughput. In this paper, we want to provide an overview of a research progress in piggyback scheme over wireless LANs. The research contributions are organised and summarized and it highlights the piggyback schemes that need to be investigated via high speed wireless LANs.

Highlights

  • TCP is a generally used protocol on the Internet designed for reliable data transfer, when the receiving side has to acknowledge some received packets, it can be wait for the data packet to be sent and put the acknowledgement information in the header, so does not have to send a separate TCP ACK packet

  • The piggyback scheme introduced some complication cases such as: how long the data link layer should wait until the packet which to piggyback the ACK? And we know the link layer wait for a time period, if the data link layer wait longer than sender timeout period the frame will be retransmitted, so the data link layer must wait for fixed time like Ad hoc scheme such as number of milliseconds

  • The CF-boll piggyback scheme is various between 24 and 36Mbps depending on the traffic load. Jianhua He et al [12] proposed to study the impacts of channel access, bandwidth and piggyback scheme on the performance, and it is observed that the bandwidth utilization can be improved if the bandwidth for random channel access can be properly configured according to the channel access parameters, piggyback scheme and the traffic of network, Piggyback requests can be used to improve the bandwidth efficiency, but it is possible to increase the delay of channel access, The bandwidth efficiency with piggyback requests can be saturated more quickly with the increased number of SSs than that without piggyback requests [2]

Read more

Summary

Introduction

TCP is a generally used protocol on the Internet designed for reliable data transfer, when the receiving side has to acknowledge some received packets, it can be wait for the data packet to be sent and put the acknowledgement information in the header, so does not have to send a separate TCP ACK packet. Piggyback mechanism reduces overhead and improves the performance [1], [2], but still need some improvements to get good system. In very high speed wireless LANs the physical layer rate may reach up to 600Mbps to get high efficiency at MAC layer. The idea for that when increasing the physical rate causes increasing transmission at MAC link and cause increasing the overhead [3]. In IEEE802.11 the throughput does not scale well with increasing the physical rate. In IEEE802.11n the throughput achieves 100Mbps at MAC layer. The theoretic throughput higher limit and a theoretic delay lower limit exist for the IEEE 802.11 protocols. The existence of International Journal of Data Science and Analysis 2017; 3(6): 69-76 such limits shows that by increasing the data rate without reducing overhead [4]

Background on Piggyback Scheme over TCP
Over View of TCP
Overview of High Speed Wireless LANs
TCP Performance Issues over Wireless Links
Throughput Loss in Cellular Communication Systems
Splitting TCP Connections
Snooping TCP at Base Stations
Notifying the Causes of Packet Loss
Adding Selective Acknowledgments to TCP
Summary and Comparison of Enhancement Schemes
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.