• Title/Summary/Keyword: unacknowledged transmission

Search Result 3, Processing Time 0.017 seconds

A Practical Unacknowledged Unicast Transmission in IEEE 802.11 Networks

  • Yang, Hyun;Yun, Jin-Seok;Oh, Jun-Seok;Park, Chang-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.3
    • /
    • pp.523-541
    • /
    • 2011
  • In current IEEE 802.11 wireless LAN, every unicast transmission requires an ACK from the receiver for reliability, though it consumes energy and bandwidth. There have been studies to remove or reduce ACK overhead, especially for energy efficiency. However none of them are practically used now. This paper introduces a noble method of selective unacknowledged transmission, where skipping an ACK is dynamically decided frame by frame. Utilizing the fact that a multicast frame is transmitted without accompanying an ACK in 802.11, the basic unacknowledged transmission is achieved simply by transforming the destination address of a frame to a multicast address. Since removing ACK is inherently more efficient but less strict, its practical profit is dependent on traffic characteristics of a frame as well as network error conditions. To figure out the selective conditions, energy and performance implications of unacknowledged transmission have been explored. Extensive experiments show that energy consumption is almost always reduced, but performance may be dropped especially when TCP exchanges long data with a long distance node through a poor wireless link. An experiment with a well-known traffic model shows that selective unacknowledged transmission gives energy saving with comparable performance.

Selective Unacknowledged Transmission in IEEE 802.15.4 Considering Energy Efficiency (IEEE 802.15.4에서 에너지 효율성을 고려한 선택적 Unacknowledged 전송)

  • Yang, Hyun;Park, Tan-Se;Park, Chang-Yun;Jung, Chung-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.717-721
    • /
    • 2010
  • In general, wireless MAC uses the ACK for reliability. Meanwhile, in wireless sensor network, data is delivered periodically and redundantly. In these situations, every ACK transmission causes the reliability flexible applications to waste some energy. IEEE 802.15.4 developed for energy efficiency has the option of using ACK or not, but there are no researches exploiting this peculiarity. In this paper, we proposed the selective unacknowledged transmission satisfying some requirements (e.g., end-to-end delivery) by removing the ACK when frames are delivered well and using the ACK when frames are delivered poorly. Also, we performed several evaluations exploiting the NS2 simulator.

A simulation study on TCP performance for constrained IoT networks

  • Chansook, Lim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • TCP is considered a major candidate transport protocol even for constrained IoT networks due to its ability to integrate into the existing network infrastructures. Since TCP implementations such as uIP TCP often allow only a single TCP segment per connection to be unacknowledged at any given time due to resource constraints, the congestion control relies only on RTO management. In our previous work, to address the problem that uIP TCP performs poorly particularly when a radio duty cycling mechanism is enabled and the hidden terminal problem is severe, we proposed a RTO scheme for uIP TCP and validated the performance through Cooja simulation. In this study, we investigate the effect of other factors that were not considered in our previous work. More specifically, the effect of traffic intensity, the degree of the hidden terminal problem, and RDC is investigated by varying the offered load and the transmission range, and the RDC channel check rate. Simulation results imply that we need to further investigate how to improve TCP performance when the radio duty cycling mechanism is used.