Aggressive packet combining for error control in -wireless networks

Yiu Wing Leung*

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

34 Citations (Scopus)


In uplink data communication in wireless networks, a portable computer may retransmit a packet multiple times before the base station receives the correct one. Each retransmission consumes communication bandwidth and battery energy of the portable computer. Therefore, it is desirable to reduce the number of retransmissions. In this paper, we propose the aggressive packet combining scheme for this purpose. The base station executes this scheme to combine multiple erroneous copies as follows: (1) perform bit-by-bit majority voting on the erroneous copies to produce a combined packet, (2) identify the least reliable bits in this combined packet, and (3) search the correct bit pattern for these bits. Then the base station may recover the correct packet, thereby reducing the mean number of retransmissions. The proposed scheme has several advantages: (1) it is more powerful than the majority packet combining scheme, (2) it can complement many existing ARQ protocols to improve their performance, (3) it does not add additional bits to the packet and hence it does not consume extra bandwidth in the wireless channel, and (4) it is only executed by the base station and hence the portable transceiver can be kept simple. The simulation results show that the proposed scheme is more bandwidth-efficient and energy-efficient than the majority packet combining scheme.

Original languageEnglish
Pages (from-to)380-385
Number of pages6
JournalIEICE Transactions on Communications
Issue number2
Publication statusPublished - 2000

Scopus Subject Areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

User-Defined Keywords

  • Arq protocols
  • Error control
  • Packet combining
  • Wireless networks


Dive into the research topics of 'Aggressive packet combining for error control in -wireless networks'. Together they form a unique fingerprint.

Cite this