Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review
International Journal of Data Science and Analysis
Volume 3, Issue 6, December 2017, Pages: 69-76
Received: Sep. 5, 2017; Accepted: Oct. 8, 2017; Published: Nov. 23, 2017
Views 1747      Downloads 80
Authors
Ali Ahmad Milad, Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya
Saad Mohamed Lafi, Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya
Mustafa Almahdi Algaet, Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya
Article Tools
Follow on us
Abstract
When the data packets transferred in duplex directions from part A to part B, and the data arrives at B, instead to sending a control frame from B to A, receiver B waits until the network layer at B send the next packet to A, and the Acknowledgment is attached in data frame from B to A using the field of Acknowledgment in the data frame header. so the acknowledgment got a free ride in the data frame, this technique known as piggybacking. One of the most advantages for piggyback scheme is improving the efficiency, which is reducing the overhead and increase system throughput. In this paper, we want to provide an overview of a research progress in piggyback scheme over wireless LANs. The research contributions are organised and summarized and it highlights the piggyback schemes that need to be investigated via high speed wireless LANs.
Keywords
Piggyback Scheme, Wireless LANs, IEEE802.11, TCP
To cite this article
Ali Ahmad Milad, Saad Mohamed Lafi, Mustafa Almahdi Algaet, Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review, International Journal of Data Science and Analysis. Vol. 3, No. 6, 2017, pp. 69-76. doi: 10.11648/j.ijdsa.20170306.12
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Y. Xiao, “IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms,” Wireless Communications, IEEE Transactions on, vol. 4, no. 5, pp. 2182-2192, 2005.
[2]
A. Ahmad Milad, M. Noh, Z. Azri, A. S. Shibghatullah, S. Sahib, R. Ahmad, and M. A. Algaet, “TRANSMISSION CONTROL PROTOCOL PERFORMANCE COMPARISON USING PIGGYBACK SCHEME IN WLANS,” Journal of Computer Science, pp. 1-5, 2013.
[3]
T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, “Aggregation with fragment retransmission for very high-speed WLANs,” IEEE/ACM Transactions on Networking (TON), vol. 17, no. 2, pp. 591-604, 2009.
[4]
Y. Xiao, and J. Rosdahl, “Throughput and delay limits of IEEE 802.11,” Communications Letters, IEEE, vol. 6, no. 8, pp. 355-357, 2002.
[5]
H.-J. Lee, J.-H. Kim, and S.-H. Cho, "A delay-based piggyback scheme in IEEE 802.11." pp. 447-451.
[6]
A. A. Milad, M. Noh, Z. Azri, A. S. Shibghatullah, and M. A. Algaet, “Reverse Direction Transmission in Wireless Networks: Review,” Middle-East Journal of Scientific Research, pp. 767-778, 2013.
[7]
T.-H. Lee, Y.-W. Kuo, Y.-W. Huang, and Y.-H. Liu, "To Piggyback or Not to Piggyback Acknowledgments?." pp. 1-5.
[8]
R. Pries, D. Staehle, and D. Marsico, "Performance evaluation of piggyback requests in IEEE 802.16." pp. 1892-1896.
[9]
H.-J. Lee, J.-H. Kim, and S. Cho, "A novel piggyback selection scheme in IEEE 802.11 e HCCA." pp. 4529-4534.
[10]
J. S. Park, T. O. Kim, K. J. Kim, and B. D. Choi, "Performance Analysis of IEEE 802.15. 4 Non-Beacon Mode Where Downlink Data Packets Are Transmitted by Piggyback Method." pp. 1-6.
[11]
H.-J. Lee, and J.-H. Kim, "A optimal CF-poll piggyback scheme in IEEE 802.11 e HCCA." pp. 6 pp.-1959.
[12]
J. He, K. Yang, K. Guild, and H.-H. Chen, “On bandwidth request mechanism with piggyback in fixed IEEE 802.16 networks,” Wireless Communications, IEEE Transactions on, vol. 7, no. 12, pp. 5238-5243, 2008.
[13]
K. R. Fall, and W. R. Stevens, TCP/IP illustrated, volume 1: The protocols: addison-Wesley, 2011.
[14]
“IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications,” IEEE Std 1901-2010, pp. 1-1586, 2010.
[15]
A. D. Rathnayaka, and V. M. Potdar, “Wireless sensor network transport protocol: A critical review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 134-146, 2013.
[16]
A. Ahmad Milad, M. Noh, Z. Azri, A. S. Shibghatullah, A. Mustapha, and M. A. Algaet, “Reverse direction transmission using single data frame and multi data frames to improve the performance of MAC layer based on IEEE 802.11 n,” Science International-Lahore, pp. 1861-1864, 2014.
[17]
M. Hassan, and R. Jain, High performance TCP/IP networking: Prentice Hall, 2003.
[18]
A. A. Milad, B. M. Noh, Z. Azri, A. S. Shibghatullah, and M. A. Algaet, "Design a novel reverse direction transmission using piggyback and piggyback with block ACK to improving the performance of MAC layer based on very high speed wireless lans." pp. 263-266.
[19]
I. W. Group, “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems–Local and Metropolitan Area Networks–Specific Requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments,” IEEE Std, vol. 802, pp. 1-51, 2010.
[20]
Y. Xiao, “IEEE 802.11 n: enhancements for higher throughput in wireless LANs,” Wireless Communications, IEEE, vol. 12, no. 6, pp. 82-91, 2005.
[21]
J. P. Pavon, and S. Choi, "Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement." pp. 1108-1113.
[22]
J. Maurer, T. Fugen, and W. Wiesbeck, "Physical layer simulations of IEEE802. 11a for vehicle-to-vehicle communications." pp. 1849-1853.
[23]
A. V. Barbosa, M. F. Caetano, and J. Bordim, “The theoretical maximum throughput calculation for the IEEE 802.11 g standard,” International Journal of Computer Science and Network Security, vol. 11, no. 4, pp. 136-143, 2011.
[24]
J. Zhu, and A. O. Fapojuwo, “A new call admission control method for providing desired throughput and delay performance in IEEE802. 11e wireless LANs,” IEEE Transactions on Wireless Communications, vol. 6, no. 2, 2007.
[25]
G. T. Nguyen, R. H. Katz, B. Noble, and M. Satyanarayanan, "A trace-based approach for modeling wireless channel behavior." pp. 597-604.
[26]
G. Xylomenos, and G. C. Polyzos, "TCP and UDP performance over a wireless LAN." pp. 439-446.
[27]
K. Fall, and S. Floyd, “Simulation-based comparisons of Tahoe, Reno and SACK TCP,” ACM SIGCOMM Computer Communication Review, vol. 26, no. 3, pp. 5-21, 1996.
[28]
H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz, “A comparison of mechanisms for improving TCP performance over wireless links,” IEEE/ACM transactions on networking, vol. 5, no. 6, pp. 756-769, 1997.
[29]
P. Karn, "The Qualcomm CDMA Digital Cellular System."
[30]
V. Jacobson, “Compressing TCP/IP headers for low-speed serial links,” 1990.
[31]
R. Ludwig, B. Rathonyi, A. Konrad, K. Oden, and A. Joseph, "Multi-layer tracing of TCP over a reliable wireless link." pp. 144-154.
[32]
R. Ludwig, and B. Rathonyi, "Link layer enhancements for TCP/IP over GSM." pp. 415-422.
[33]
R. Ludwig, A. Konrad, A. D. Joseph, and R. H. Katz, “Optimizing the end-to-end performance of reliable flows over wireless links,” Wireless Networks, vol. 8, no. 2/3, pp. 289-299, 2002.
[34]
A. V. Bakre, and B. Badrinath, “Implementation and performance evaluation of indirect TCP,” IEEE Transactions on computers, vol. 46, no. 3, pp. 260-278, 1997.
[35]
R. Yavatkar, and N. Bhagawat, "Improving end-to-end performance of TCP over mobile internetworks." pp. 146-152.
[36]
H. Balakrishnan, S. Seshan, and R. H. Katz, “Improving reliable transport and handoff performance in cellular wireless networks,” Wireless Networks, vol. 1, no. 4, pp. 469-481, 1995.
[37]
A. DeSimone, M. C. Chuah, and O.-C. Yue, "Throughput performance of transport-layer protocols over wireless LANs." pp. 542-549.
[38]
H. Balakrishnan, and R. H. Katz, "Explicit loss notification and wireless web performance." pp. 1-5.
[39]
M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow, TCP selective acknowledgment options, 2070-1721, 1996.
[40]
A. A. Milad, Z. A. B. M. Noh, A. S. Shibghatullah, M. A. Algaet, and A. Mustapha, “Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs,” Journal of Computer Science, vol. 11, no. 5, pp. 707, 2015.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186