HACK: Hierarchical ACKs for Efficient Wireless Medium Utilization
نویسندگان
چکیده
WiFi’s physical layer has increased in speed from 802.11b’s 11 Mbps to the Gbps rates of emerging 802.11ac. Despite these gains, WiFi’s inefficient MAC layer limits achievable end-to-end throughput. The culprit is 802.11’s mandatory idle period before each medium acquisition, which has come to dwarf the duration of a packet’s transmission. This overhead is especially punishing for TCP traffic, whose every two data packets elicit a short TCP ACK. Even frame aggregation and block link-layer ACKs (introduced in 802.11n) leave significant medium acquisition overhead for TCP ACKs. In this paper, we propose TCP/HACK (Hierarchical ACKnowledgment), a system that applies cross-layer optimization to TCP traffic on WiFi networks by carrying TCP ACKs within WiFi’s link-layer acknowledgments. By eliminating all medium acquisitions for TCP ACKs in unidirectional TCP flows, TCP/HACK significantly improves medium utilization, and thus significantly increases achievable capacity for TCP workloads. Our measurements of a real-time, line-speed implementation for 802.11a on the SoRa software-defined radio platform and simulations of 802.11n networks at scale demonstrate that TCP/HACK significantly improves TCP throughput on WiFi networks.
منابع مشابه
An Adaptive TCP Protocol for Lossy Mobile Environment
TCP has been designed and tuned as a reliable transfer protocol for wired links. However, it incurs end-to-end performance degradation in wireless environments where packet loss is very high. TCP HACK (Header Checksum Option) is a novel mechanism proposed to improve original TCP in lossy links. It presents an extension to TCP that enables TCP to distinguish packet corruption from congestion in ...
متن کاملAn Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem
In Wireless Sensor Networks (WSN), the wireless connections are prone to different type of attacks. Therefore, security of the data that transfer over the wireless network is a measure concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an important factor. Hence to provide security along with efficient energy utilization of sensor nodes, Secure and Ener...
متن کاملMLCA: A Multi-Level Clustering Algorithm for Routing in Wireless Sensor Networks
Energy constraint is the biggest challenge in wireless sensor networks because the power supply of each sensor node is a battery that is not rechargeable or replaceable due to the applications of these networks. One of the successful methods for saving energy in these networks is clustering. It has caused that cluster-based routing algorithms are successful routing algorithm for these networks....
متن کاملCongestion Control Approaches Applied to Wireless Sensor Networks: A Survey
Wireless Sensor Networks (WSNs) are a specific category of wireless ad-hoc networks where their performance is highly affected by application, life time, storage capacity, processing power, topology changes, the communication medium and bandwidth. These limitations necessitate an effective data transport control in WSNs considering quality of service, energy efficiency, and congestion control. ...
متن کاملGame Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network
Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014