| Peer-Reviewed

Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review

Received: 5 September 2017    Accepted: 8 October 2017    Published: 23 November 2017
Views:       Downloads:
Abstract

When the data packets transferred in duplex directions from part A to part B, and the data arrives at B, instead to sending a control frame from B to A, receiver B waits until the network layer at B send the next packet to A, and the Acknowledgment is attached in data frame from B to A using the field of Acknowledgment in the data frame header. so the acknowledgment got a free ride in the data frame, this technique known as piggybacking. One of the most advantages for piggyback scheme is improving the efficiency, which is reducing the overhead and increase system throughput. In this paper, we want to provide an overview of a research progress in piggyback scheme over wireless LANs. The research contributions are organised and summarized and it highlights the piggyback schemes that need to be investigated via high speed wireless LANs.

Published in International Journal of Data Science and Analysis (Volume 3, Issue 6)
DOI 10.11648/j.ijdsa.20170306.12
Page(s) 69-76
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Piggyback Scheme, Wireless LANs, IEEE802.11, TCP

References
[1] Y. Xiao, “IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms,” Wireless Communications, IEEE Transactions on, vol. 4, no. 5, pp. 2182-2192, 2005.
[2] A. Ahmad Milad, M. Noh, Z. Azri, A. S. Shibghatullah, S. Sahib, R. Ahmad, and M. A. Algaet, “TRANSMISSION CONTROL PROTOCOL PERFORMANCE COMPARISON USING PIGGYBACK SCHEME IN WLANS,” Journal of Computer Science, pp. 1-5, 2013.
[3] T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, and T. Turletti, “Aggregation with fragment retransmission for very high-speed WLANs,” IEEE/ACM Transactions on Networking (TON), vol. 17, no. 2, pp. 591-604, 2009.
[4] Y. Xiao, and J. Rosdahl, “Throughput and delay limits of IEEE 802.11,” Communications Letters, IEEE, vol. 6, no. 8, pp. 355-357, 2002.
[5] H.-J. Lee, J.-H. Kim, and S.-H. Cho, "A delay-based piggyback scheme in IEEE 802.11." pp. 447-451.
[6] A. A. Milad, M. Noh, Z. Azri, A. S. Shibghatullah, and M. A. Algaet, “Reverse Direction Transmission in Wireless Networks: Review,” Middle-East Journal of Scientific Research, pp. 767-778, 2013.
[7] T.-H. Lee, Y.-W. Kuo, Y.-W. Huang, and Y.-H. Liu, "To Piggyback or Not to Piggyback Acknowledgments?." pp. 1-5.
[8] R. Pries, D. Staehle, and D. Marsico, "Performance evaluation of piggyback requests in IEEE 802.16." pp. 1892-1896.
[9] H.-J. Lee, J.-H. Kim, and S. Cho, "A novel piggyback selection scheme in IEEE 802.11 e HCCA." pp. 4529-4534.
[10] J. S. Park, T. O. Kim, K. J. Kim, and B. D. Choi, "Performance Analysis of IEEE 802.15. 4 Non-Beacon Mode Where Downlink Data Packets Are Transmitted by Piggyback Method." pp. 1-6.
[11] H.-J. Lee, and J.-H. Kim, "A optimal CF-poll piggyback scheme in IEEE 802.11 e HCCA." pp. 6 pp.-1959.
[12] J. He, K. Yang, K. Guild, and H.-H. Chen, “On bandwidth request mechanism with piggyback in fixed IEEE 802.16 networks,” Wireless Communications, IEEE Transactions on, vol. 7, no. 12, pp. 5238-5243, 2008.
[13] K. R. Fall, and W. R. Stevens, TCP/IP illustrated, volume 1: The protocols: addison-Wesley, 2011.
[14] “IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications,” IEEE Std 1901-2010, pp. 1-1586, 2010.
[15] A. D. Rathnayaka, and V. M. Potdar, “Wireless sensor network transport protocol: A critical review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 134-146, 2013.
[16] A. Ahmad Milad, M. Noh, Z. Azri, A. S. Shibghatullah, A. Mustapha, and M. A. Algaet, “Reverse direction transmission using single data frame and multi data frames to improve the performance of MAC layer based on IEEE 802.11 n,” Science International-Lahore, pp. 1861-1864, 2014.
[17] M. Hassan, and R. Jain, High performance TCP/IP networking: Prentice Hall, 2003.
[18] A. A. Milad, B. M. Noh, Z. Azri, A. S. Shibghatullah, and M. A. Algaet, "Design a novel reverse direction transmission using piggyback and piggyback with block ACK to improving the performance of MAC layer based on very high speed wireless lans." pp. 263-266.
[19] I. W. Group, “IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems–Local and Metropolitan Area Networks–Specific Requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments,” IEEE Std, vol. 802, pp. 1-51, 2010.
[20] Y. Xiao, “IEEE 802.11 n: enhancements for higher throughput in wireless LANs,” Wireless Communications, IEEE, vol. 12, no. 6, pp. 82-91, 2005.
[21] J. P. Pavon, and S. Choi, "Link adaptation strategy for IEEE 802.11 WLAN via received signal strength measurement." pp. 1108-1113.
[22] J. Maurer, T. Fugen, and W. Wiesbeck, "Physical layer simulations of IEEE802. 11a for vehicle-to-vehicle communications." pp. 1849-1853.
[23] A. V. Barbosa, M. F. Caetano, and J. Bordim, “The theoretical maximum throughput calculation for the IEEE 802.11 g standard,” International Journal of Computer Science and Network Security, vol. 11, no. 4, pp. 136-143, 2011.
[24] J. Zhu, and A. O. Fapojuwo, “A new call admission control method for providing desired throughput and delay performance in IEEE802. 11e wireless LANs,” IEEE Transactions on Wireless Communications, vol. 6, no. 2, 2007.
[25] G. T. Nguyen, R. H. Katz, B. Noble, and M. Satyanarayanan, "A trace-based approach for modeling wireless channel behavior." pp. 597-604.
[26] G. Xylomenos, and G. C. Polyzos, "TCP and UDP performance over a wireless LAN." pp. 439-446.
[27] K. Fall, and S. Floyd, “Simulation-based comparisons of Tahoe, Reno and SACK TCP,” ACM SIGCOMM Computer Communication Review, vol. 26, no. 3, pp. 5-21, 1996.
[28] H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz, “A comparison of mechanisms for improving TCP performance over wireless links,” IEEE/ACM transactions on networking, vol. 5, no. 6, pp. 756-769, 1997.
[29] P. Karn, "The Qualcomm CDMA Digital Cellular System."
[30] V. Jacobson, “Compressing TCP/IP headers for low-speed serial links,” 1990.
[31] R. Ludwig, B. Rathonyi, A. Konrad, K. Oden, and A. Joseph, "Multi-layer tracing of TCP over a reliable wireless link." pp. 144-154.
[32] R. Ludwig, and B. Rathonyi, "Link layer enhancements for TCP/IP over GSM." pp. 415-422.
[33] R. Ludwig, A. Konrad, A. D. Joseph, and R. H. Katz, “Optimizing the end-to-end performance of reliable flows over wireless links,” Wireless Networks, vol. 8, no. 2/3, pp. 289-299, 2002.
[34] A. V. Bakre, and B. Badrinath, “Implementation and performance evaluation of indirect TCP,” IEEE Transactions on computers, vol. 46, no. 3, pp. 260-278, 1997.
[35] R. Yavatkar, and N. Bhagawat, "Improving end-to-end performance of TCP over mobile internetworks." pp. 146-152.
[36] H. Balakrishnan, S. Seshan, and R. H. Katz, “Improving reliable transport and handoff performance in cellular wireless networks,” Wireless Networks, vol. 1, no. 4, pp. 469-481, 1995.
[37] A. DeSimone, M. C. Chuah, and O.-C. Yue, "Throughput performance of transport-layer protocols over wireless LANs." pp. 542-549.
[38] H. Balakrishnan, and R. H. Katz, "Explicit loss notification and wireless web performance." pp. 1-5.
[39] M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow, TCP selective acknowledgment options, 2070-1721, 1996.
[40] A. A. Milad, Z. A. B. M. Noh, A. S. Shibghatullah, M. A. Algaet, and A. Mustapha, “Design a New Bidirectional Transmission Protocol to Improve the Performance of MAC Layer Based on Very High Speed WLANs,” Journal of Computer Science, vol. 11, no. 5, pp. 707, 2015.
Cite This Article
  • APA Style

    Ali Ahmad Milad, Saad Mohamed Lafi, Mustafa Almahdi Algaet. (2017). Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review. International Journal of Data Science and Analysis, 3(6), 69-76. https://doi.org/10.11648/j.ijdsa.20170306.12

    Copy | Download

    ACS Style

    Ali Ahmad Milad; Saad Mohamed Lafi; Mustafa Almahdi Algaet. Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review. Int. J. Data Sci. Anal. 2017, 3(6), 69-76. doi: 10.11648/j.ijdsa.20170306.12

    Copy | Download

    AMA Style

    Ali Ahmad Milad, Saad Mohamed Lafi, Mustafa Almahdi Algaet. Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review. Int J Data Sci Anal. 2017;3(6):69-76. doi: 10.11648/j.ijdsa.20170306.12

    Copy | Download

  • @article{10.11648/j.ijdsa.20170306.12,
      author = {Ali Ahmad Milad and Saad Mohamed Lafi and Mustafa Almahdi Algaet},
      title = {Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review},
      journal = {International Journal of Data Science and Analysis},
      volume = {3},
      number = {6},
      pages = {69-76},
      doi = {10.11648/j.ijdsa.20170306.12},
      url = {https://doi.org/10.11648/j.ijdsa.20170306.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdsa.20170306.12},
      abstract = {When the data packets transferred in duplex directions from part A to part B, and the data arrives at B, instead to sending a control frame from B to A, receiver B waits until the network layer at B send the next packet to A, and the Acknowledgment is attached in data frame from B to A using the field of Acknowledgment in the data frame header. so the acknowledgment got a free ride in the data frame, this technique known as piggybacking. One of the most advantages for piggyback scheme is improving the efficiency, which is reducing the overhead and increase system throughput. In this paper, we want to provide an overview of a research progress in piggyback scheme over wireless LANs. The research contributions are organised and summarized and it highlights the piggyback schemes that need to be investigated via high speed wireless LANs.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Piggyback Scheme over TCP in Very High Speed Wireless LANs: Review
    AU  - Ali Ahmad Milad
    AU  - Saad Mohamed Lafi
    AU  - Mustafa Almahdi Algaet
    Y1  - 2017/11/23
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ijdsa.20170306.12
    DO  - 10.11648/j.ijdsa.20170306.12
    T2  - International Journal of Data Science and Analysis
    JF  - International Journal of Data Science and Analysis
    JO  - International Journal of Data Science and Analysis
    SP  - 69
    EP  - 76
    PB  - Science Publishing Group
    SN  - 2575-1891
    UR  - https://doi.org/10.11648/j.ijdsa.20170306.12
    AB  - When the data packets transferred in duplex directions from part A to part B, and the data arrives at B, instead to sending a control frame from B to A, receiver B waits until the network layer at B send the next packet to A, and the Acknowledgment is attached in data frame from B to A using the field of Acknowledgment in the data frame header. so the acknowledgment got a free ride in the data frame, this technique known as piggybacking. One of the most advantages for piggyback scheme is improving the efficiency, which is reducing the overhead and increase system throughput. In this paper, we want to provide an overview of a research progress in piggyback scheme over wireless LANs. The research contributions are organised and summarized and it highlights the piggyback schemes that need to be investigated via high speed wireless LANs.
    VL  - 3
    IS  - 6
    ER  - 

    Copy | Download

Author Information
  • Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya

  • Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya

  • Department of Computer, Faculty of Education, Elmergib University, Alkhums, Libya

  • Sections