• Title/Summary/Keyword: Selective ACK

Search Result 22, Processing Time 0.028 seconds

Selective Unacknowledged Transmission in IEEE 802.15.4 Considering Energy Efficiency (IEEE 802.15.4에서 에너지 효율성을 고려한 선택적 Unacknowledged 전송)

  • Yang, Hyun;Park, Tan-Se;Park, Chang-Yun;Jung, Chung-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.717-721
    • /
    • 2010
  • In general, wireless MAC uses the ACK for reliability. Meanwhile, in wireless sensor network, data is delivered periodically and redundantly. In these situations, every ACK transmission causes the reliability flexible applications to waste some energy. IEEE 802.15.4 developed for energy efficiency has the option of using ACK or not, but there are no researches exploiting this peculiarity. In this paper, we proposed the selective unacknowledged transmission satisfying some requirements (e.g., end-to-end delivery) by removing the ACK when frames are delivered well and using the ACK when frames are delivered poorly. Also, we performed several evaluations exploiting the NS2 simulator.

A Practical Unacknowledged Unicast Transmission in IEEE 802.11 Networks

  • Yang, Hyun;Yun, Jin-Seok;Oh, Jun-Seok;Park, Chang-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.3
    • /
    • pp.523-541
    • /
    • 2011
  • In current IEEE 802.11 wireless LAN, every unicast transmission requires an ACK from the receiver for reliability, though it consumes energy and bandwidth. There have been studies to remove or reduce ACK overhead, especially for energy efficiency. However none of them are practically used now. This paper introduces a noble method of selective unacknowledged transmission, where skipping an ACK is dynamically decided frame by frame. Utilizing the fact that a multicast frame is transmitted without accompanying an ACK in 802.11, the basic unacknowledged transmission is achieved simply by transforming the destination address of a frame to a multicast address. Since removing ACK is inherently more efficient but less strict, its practical profit is dependent on traffic characteristics of a frame as well as network error conditions. To figure out the selective conditions, energy and performance implications of unacknowledged transmission have been explored. Extensive experiments show that energy consumption is almost always reduced, but performance may be dropped especially when TCP exchanges long data with a long distance node through a poor wireless link. An experiment with a well-known traffic model shows that selective unacknowledged transmission gives energy saving with comparable performance.

A Selective ACK Protocol for Energy-Harvesting Wireless Sensor Networks (에너지 하베스팅 무선 센서 네트워크를 위한 선택적 ACK 프로토콜)

  • Yoo, Jae-Young;Shin, Min-Chul;Joe, In-whee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.351-352
    • /
    • 2013
  • 에너지 하베스팅 무선 센서 네트워크 환경에서 센서는 에너지 하베스팅 모듈을 통하여 배터리를 충전하고 충전된 배터리를 이용하여 동작을 한다. 센서는 컨트롤러에게 고정적인 주기로 데이터와 Reclaim 메시지를 전송하고 컨트롤러는 그에 대한 응답으로 ACK 메시지를 전송한다. 본 논문에서는 센서가 컨트롤러에게 데이터와 Reclaim 메시지를 전송하는데 있어 고정적인 주기를 센서 주변의 온도 정보를 이용하여 데이터의 전송주기 및 Reclaim 메시지를 동적으로 제어하여 ACK 메시지를 선택적으로 수신하도록 하였다. 제안하는 선택적 ACK 프로토콜은 기존의 ACK 프로토콜을 저 전력화하는 방법으로써 센서의 한정된 배터리 전력을 보다 효율적으로 사용하여 에너지 하베스팅 무선 센서 네트워크의 Life Time을 연장하였다.

Research on the enhancement of throughput for traffic in WLAN (초고속 무선 랜에서 트래픽 간의 처리율 향상을 위한 연구)

  • Song, Byunjin;Lee, Seonhee
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.53-56
    • /
    • 2015
  • In this paper, we want provide improved services with faster transmission, IEEE 802.11n was standardized. A-MPDU (Aggregation MAC Protocol Data UNIT) is a vital function of the IEEE 802.11n standard, which was proposed to improve transmission rate by reducing frame transmission overhead. In this paper, we show the problems of TCP retransmission with A-MPDU and propose a solution utilizing the property of TCP cumulative ACK. If the transmission of an MPDU subframe fails, A-MPDU mechanism allows selective re-transmission of failed MPDU subframe in the MAC layer. In TCP traffic transmission, however, a failed MPDU transmission causes TCP Duplicate ACK, which causes unnecessary TCP re-transmission. Furthermore, congestion control of TCP causes reduction in throughput. By supressing unnecessary duplicate ACKs the proposed mechanism reduces the overhead in transmitting redundant TCP ACKs, and transmitting only a HS-ACK with the highest sequence number. By using the RACK mechanism, through the simulation results, it was conrmed that the RACK mechanism increases up to 20% compared the conventional A-MPDU, at the same time, it tightly assures the fairness among TCP flows.

Reliable Data Transfer using Path-Reliability and Implicit ACK on Wireless Sensor Network (무선 센서 네트워크에서 경로별 신뢰도와 묵시적 ACK를 사용한 신뢰성 보장 전송기법)

  • Lee, Ga-Won;Lee, Jun-Hyuk;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.17-30
    • /
    • 2010
  • Many applications in Wireless Sensor Networks require collecting all data without loss from nodes. End-to-End data retransmission, which is used in the Internet for reliable transport, becomes very inefficient in Wireless Sensor Networks, since wireless communication, and constrained resources pose new challenges. We look at factors affecting reliability, and search for efficient combinations of the possible options. This paper proposes an efficient Overhearing based reliable transfer protocol in Wireless Sensor Networks by introducing Selective and implicit Acknowledgement. Finally, it is clarified that the proposed scheme is efficient for reliable data transfer in WSN.

Fragmentation Management Method for 6LoWPAN (6LoWPAN에서 단편화 관리 기법)

  • Seo, Hyun-Gon;Han, Jae-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.130-138
    • /
    • 2009
  • 6LoWPAN is IPv6 packets transmission technology at Sensor network over the IEEE 802.15.4 Standard MAC and Physical layer. Adaptation layer between IP layer and MAC layer performs fragmentation and reassembly of packet for transmit IPv6 packets. RFC4944, IETF 6LoWPAN WG standard document define packet fragmentation and reassembly. In this paper, we propose the IRM(Immediate Retransmission Method) and SRM(Selective Retransmission Method) to manage packet fragmentation and reassembly at 6LoWPAN. Each time destination receives a fragmented packet, it sends Ack message to the source node on IRM. However, on SRM, the destination node receives all fragmented packet, it sends Ack message or Nak message to the source node. In this case, Nak message include the dropped packet number. To compare the performance of the proposed schemes, we develop a simulator using C++. The result of simulation shows the proposed schemes provider better performance than RFC4944 standard scheme.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

A Protocol for Reliable Data Transfer and Congestion Control in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 데이터 전송과 혼잡 제어를 위한 프로토콜)

  • Kim, Hyun-Tae;Joo, Young-Hoon;Ra, In-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.3
    • /
    • pp.230-234
    • /
    • 2007
  • Generally, huge amounts of data traffic are generated by using broadcasting method to deliver sensing data to a sink node reliably so that it makes a severe network saturation problem resulting in unreliable data transfer. In order to handle this problem, a new congestion control protocol is required for supporting reliable data transfer, minimal use of energy and network resources at the same time in wireless sensor networks. In this paper, it proposes a Protocol to guarantee both a reliable transfer in data accuracy and minimum consumption of energy waste by using Hop-by-Hop sequence number and DSbACK(Delayed and Selective ACK Buffer Condition) scheme. In addition, it proves that reliability and energy efficiency are enhanced by the proposed method with the simulation results performed on TinyOS platform which is a component based built-in OS announced by UC Berkely with the performance comparison of other existing methods.

Adaptive Error Control Based on Traffic Type and Channel Error Rate in Wireless ATM (무선 ATM에서의 트래픽 형태 및 채널 오율에 기반한 적응 오류 제어)

  • 김영웅;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1532-1538
    • /
    • 1999
  • In general, because error rate of wireless link is higher than that of wired link, DLC layer protocol for wired network with low error rate is not proper for wireless environments. In addition, the conventional DLC layer protocol for wireless network is optimized for the low-speed data service, so it is difficult to use conventional DLC protocol in the current mobile communication environments handing high-speed and multimedia services. Therefore, a DLC layer protocol that is suitable to current wireless communication environments is required. In this paper, we propose a novel error control scheme that supports a variety of traffic attribute and is applicable to high-speed and multimedia data service in WATM. The proposed scheme provides enhanced throughput performance for real-time traffic by using modified ASR ARQ without ACK and reduces loss rate by using FEC in the case of high error condition. Also, for non real-time traffic, the use of ASR ARQ without ACK enhances throughput performance and delay time is decreased by using FEC in the case of high error rate channel. As a result of simulation, the proposed scheme has better performance than conventional ASR ARQ protocol in view of delay and throughput.

  • PDF

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Yang Hae-Kwon;Ra In-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.442-445
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts an acquisited data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In this paper, we proposes a reliable congestion protocol, ratted HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

  • PDF