IEEE ah Based M2M Networks Employing Virtual Grouping and Power Saving Methods

Size: px
Start display at page:

Download "IEEE ah Based M2M Networks Employing Virtual Grouping and Power Saving Methods"

Transcription

1 2976 IEICE TRANS. COMMUN., VOL.E96 B, NO.12 DECEMBER 2013 PAPER Special Section on Network and System Technologies for Sustainable Society IEEE ah Based M2M Networks Employing Virtual Grouping and Power Saving Methods Kohei OGAWA a), Student Member, Masahiro MORIKURA, Fellow, Koji YAMAMOTO, Senior Member, and Tomoyuki SUGIHARA, Nonmember SUMMARY As a promising wireless access standard for machine-tomachine (M2M) networks, the IEEE task group ah has been discussing a new standard which is based on the wireless local area network (WLAN) standard. This new standard will support an enormous number of stations (STAs) such as 6,000 STAs. To mitigate degradation of the throughput and delay performance in WLANs that employ a carrier sense multiple access with collision avoidance (CSMA/CA) protocol, this paper proposes a virtual grouping method which exploits the random arbitration interframe space number scheme. This method complies with the CSMA/CA protocol, which employs distributed medium access control. Moreover, power saving is another important issue for M2M networks, where most STAs are operated by primary or secondary batteries. This paper proposes a new power saving method for the IEEE ah based M2M network employing the proposed virtual grouping method. With the proposed virtual grouping and power saving methods, the STAs can save their power by as much as 90% and maintain good throughput and delay performance. key words: M2M networks, wireless LAN, IEEE ah, EDCA, power saving, CSMA/CA 1. Introduction Machine-to-machine (M2M) networks, which are composed of power meters and various sensors, are currently attracting considerable attention for the realization of smart grids and smart communities. M2M networks are characterized by a large number of stations (STAs). A wireless medium access standard for M2M networks has been discussed by the IEEE task group ah (hereafter we write this abbreviated IEEE ah) [1], which is based on the cutting-edge wireless local area network (WLAN) standard such as the IEEE ac standard [2]. In IEEE ah, thousands of STAs are assumed to belong to an access point (AP). As the number of STAs increases, the throughput and delay performances of the system are significantly degraded when the carrier sense multiple access with collision avoidance (CSMA/CA) protocol is exploited. In normal cases, this problem does not occur because traffic in M2M networks supposed to be usually light. However, we should consider that temporary traffic congestion occurs. For example, such instances occur when the AP transmits a certain trigger frame to many STAs to collect STA information. Manuscript received March 13, Manuscript revised June 27, The authors are with the Graduate School of Informatics, Kyoto University, Kyoto-shi, Japan. The author is with the Allied Telesis Holdings K.K, Tokyo, Japan. a) ogawa@imc.cce.i.kyoto-u.ac.jp DOI: /transcom.E96.B.2976 Many STAs respond to the trigger frame and transmit their reply data frames. These events cause traffic congestion in an M2M network. To solve this problem, several STA grouping methods have been proposed, which can be classified into real and virtual grouping. The first method allocates all STAs into some groups and assigns a communication time period to each group according to a centralized control scheme of the AP to realize the real grouping method [3]. It needs overhead control information to support this scheme. The second method realizes the grouping by a distributed control scheme based on the CSMA/CA protocol. As a virtual grouping method, the distributed coordination function with virtual group (DCF/VG) scheme is proposed [4], [5]. The DCF/VG scheme achieves good throughput performance even when traffic congestion occurs; however, it suffers from a power consumption problem of STAs. According to the DCF/VG scheme, each STA always searches for the allocated slot, which is composed of a channel busy period and an idle period. An STA can transmit its data frame only at the allocated slot. Therefore, each STA always needs to sense channel busy states in order to detect assigned slot boundaries. To realize an M2M network composed of powerefficient STAs, this paper proposes the IEEE ah based M2M networks employing virtual grouping and power saving method. Virtual grouping is realized by the random arbitration interframe space (IFS) number (AIFSN) scheme to improve the throughput performance under the condition of many active STAs. An active STA means that it stays at an awake state to transmit data frames. The random AIFSN scheme is proposed for the precise quality of service (QoS) control of WLANs to transmit several types of data frames [6]. We apply this method to the M2M network to realize virtual grouping and improve the throughput performance of a system with 6,000 STAs. Moreover, we propose a novel power saving method using the virtual grouping method. Most STAs in the M2M networks are supposed to be battery-operated sensors. Therefore, power saving is a key issue. The legacy IEEE standard supports the power save poll (PS-Poll) method as a power saving method. In addition to the PS-Poll method, the IEEE n standard supports the power save multi-poll (PSMP) method [12]. Various power saving methods for wireless sensor networks and WLANs have been proposed [7] [11]. However, there are few schemes for single hop networks with a large num- Copyright c 2013 The Institute of Electronics, Information and Communication Engineers

2 OGAWA et al.: IEEE AH BASED M2M NETWORKS EMPLOYING VIRTUAL GROUPING AND POWER SAVING METHODS 2977 ber of STAs. Schemes proposed in [7] [9] are intended for multi-hop and ad-hoc mode systems. Those proposed in [10], [11] are single hop WLANs with a small number of STAs. For single-hop networks with a small number of STAs, the PS-Poll or PSMP methods are usually used to realize power saving. For power saving of the STAs, the IEEE ah adopts the PS-Poll method, which enables non-active STAs to sleep except during the period when they are receiving selected beacon frames. The PS-Poll method is effective under the usual light traffic conditions; however, it is ineffective under heavy traffic. An active STA that has data frames in its transmission queue cannot enter into the sleep state unless the queue becomes empty. Under heavy traffic conditions, STAs are likely to wait for a long period before the data frames are transmitted. Thus, the power consumption of STAs increases. In this case, the PSMP method, can conventionally be used. It is suitable for a small number of STAs, but not for M2M networks that have a large number of STAs, because the PSMP frame length becomes very long owing to the large number of STAs. For example, the PSMP frame length of 6,000 STAs is estimated to be 48 kb, which takes approximately 1.3 s to send and receive at a transmission rate of 300 kbit/s. The AP has to transmit and the STAs usually receive these extraordinarily long PSMP frames in case temporal traffic congestion occurs, which causes an increase in STAs power consumption. We, therefore, propose a new power saving method employing virtual grouping in addition to the legacy PS-Poll method. The proposed method enables the STAs to save on their power consumption in a distributed control manner. This paper is organized as follows. Section 2 describes the virtual grouping method with the random AIFSN scheme. The analysis of the virtual grouping is given in Sect. 3. Section 4 provides the description of the proposed power saving method employing virtual grouping. Section 5 evaluates the performance of the M2M network and discusses the effectiveness of the proposed power saving method. Finally, Sect. 6 presents the conclusion of this paper. 2. Virtual Grouping with Random AIFSN Scheme This section describes the random AIFSN scheme and virtual grouping. 2.1 Random AIFSN Scheme According to the random AIFSN scheme, an STA randomly selects its AIFSN value from the interval [AIFSN min, AIFSN max ], prior to every data frame transmission. AIFSN is an integral number, which decides the length of the AIFS as AIFS time = SIFS time + AIFSN slot time, (1) where slot time = 52 µs [1]. AIFS is a type of IFS, which is used in enhanced distributed channel access (EDCA) of Fig. 1 Medium access control with the random AIFSN scheme. The AIFSN value is randomly determined after the transmission. the IEEE e standard [13] to realize QoS control. The AIFS determined by Eq. (1) is expressed as AIFS(AIFSN). For example, AIFS(2) means that the AIFSN value is two. It is equal to the period of the distributed IFS. To explain the random AIFSN scheme the transmission procedure is shown in Fig. 1. In this figure, a cycle is composed of an idle channel period and the following busy channel period. According to the scheme, each STA waits for the AIFS time and backoff time before its transmission as well as the IEEE e channel access procedure. The transmission period is composed of a data frame period, a short IFS (SIFS) period, and an ACK frame period. Two cases could occur during the transmission period; successful data frame transmission and data frame collision. For the installation of this method, the parameter of AIFSN max has to be shared among the AP and the STAs. It is managed by the AP. The AP distributes it to each STA by a data frame which includes the parameter of AIFSN max to prepare for traffic congestion, when the STAs associate with the AP to start the data and control frame transaction. 2.2 Virtual Grouping In [6], the random AIFSN scheme was applied to a system with a small number of STAs to realize the precise QoS control for several types of data transmissions. We applied this scheme to M2M networks with a large number of STAs. As a result, we found that virtual grouping is feasible. The throughput performance is considerably improved by the virtual grouping method, which limits the number of contending STAs in the case of simultaneous data frame transmissions. We define two types of STAs. One is a contending STA that decreases its backoff counter value, and the other is a non-contending STA that does not decrease its backoff counter value during a cycle. The flowchart of the EDCA scheme is shown in Fig. 2. As shown in the flowchart, the STA that does not decrease backoff counter does not transmit any frames in the cycle. These events are shown as bold allows in Fig. 2. We call such STAs non-contending STAs. By this definition, the

3 2978 IEICE TRANS. COMMUN., VOL.E96 B, NO.12 DECEMBER 2013 Fig. 3 Contending and non-contending STAs with virtual grouping when random AIFSN scheme is employed. Fig. 2 Flowchart of the EDCA scheme. STAs are divided into two groups every cycle as follows: IF (AIFS N i > min 1 j N [AIFS N j + backo f f j ]) STA i is a non-contending STA; ELSE STA i is a contending STA; where STA i denotes the i-th STA, AIFS N j is the AIFSN value of STA j, backoff j is the backoff counter value of STA j and N is the total number of STAs. In Fig. 1, STA 1 decreases its backoff counter and detects the channel busy state at cycle 1. STA 2 detects the channel busy state before decreasing its backoff counter. STA 3 decreases its backoff counter to zero and then transmits its data frame. In this case, STA 1 and STA 3 may have transmitted a data frame during the cycle, but STA 2 cannot because it have not decreased its backoff counter. Thus, during the cycle, STA 1 and STA3 are considered as contending STAs, and STA 2 is considered as a non-contending STA. In this case, STAs are divided into two groups, namely, contending and non-contending STAs by the random AIFSN scheme. With this scheme, virtual grouping of the STAs is realized. Figure 3 shows the virtual grouping mechanism. After the data frame transmission, an STA obtains a new AIFSN value. If obtained AIFSN value is small, it is likely to be a contending STA. By contrast if obtained AIFSN value is large, it is likely to be a non-contending STA. Figure 4 shows the state transition diagram of the AIFSN distribution in the case of the random AIFSN scheme. For the sake of simplicity, AIFSN min and AIFSN max are selected as 2 and 4, respectively, in this figure. At the first state, each STA selects its AIFSN value from the interval [AIFSN min, AIFSN max ]. The number of STAs for each AIFSN value has a uniform distribution. Hereafter, we denote the STA of which the AIFSN value equals n as STA(AIFSN = n). We also denote the STA of which the AIFSN value is greater than n as STA(AIFSN > n). Then, the state is moved to the second state where the number of STA(AIFSN = 2)s decreases and becomes small, whereas the number of STA(AIFSN > 2)s increases. This transition is done by the following procedure: 1. STA(AIFSN = 2)s are likely to be contending to transmit their frames. 2. After their frame transmissions, they reset their AIFSN values from the interval [2, 4] with the random AIFSN scheme, which causes a decrease of the number of STA(AIFSN = 2)s and an increase of the number STA(AIFSN > 2)s. The similar transition occurs from the second state to the third state. Finally, most of the STAs have the AIFSN max value at the steady state. The majority become STA(AIFSN = AIFSN max )s which correspond approximately to the non-contending STAs, the minority, but a certain number, become STA(AIFSN < AIFSN max )s which correspond approximately to the contending STAs. We call this phase reduction phase at the steady state, since the number of STA(AIFSN < AIFSN max )s decreases in this phase. When the number of STA(AIFSN < AIFSN max )s becomes very small, STA(AIFSN = AIFSN max )s also contends. Some of them with small backoff counter values transmit their frames and reset their AIFSN values. The number of STA(AIFSN < AIFSN max ) increases. We call this phase provision phase.

4 OGAWA et al.: IEEE AH BASED M2M NETWORKS EMPLOYING VIRTUAL GROUPING AND POWER SAVING METHODS 2979 Table 1 IEEE TGah parameters. Parameters Value Channel band width 1 MHz Data rate 300 kbit/s MAC payload 200 B OFDM symbol 40 µs Slot time 52 µs SIFS 160 µs CWmin 15 CWmax 1023 Fig. 5 Average number of contending STAs with the random AIFSN scheme (AIFSN max = 20). Fig. 4 State transition diagram of AIFSN distribution. For the sake of simplicity, AIFSN max = 4 is selected in this figure. 3. Performance Evaluation and Analysis of Virtual Grouping The computer simulation results of virtual grouping are presented in this section. To evaluate the throughput, delay, and power consumption performance, we developed a simulation platform on a Monte Carlo simulation using C++ language, which emulates the IEEE protocol as closely as possible for real-world operation of each transmitting STA. The simulation parameters are shown in Table Evaluation of Virtual Grouping The evaluation of virtual grouping with the random AIFSN scheme is presented. A single-hop network, composed of an AP and many STAs, is considered according to the IEEE ah system model. For the sake of simplicity, a saturated traffic condition is assumed in which the transmission queues of all the STAs are always occupied by data frames. After a data frame transmission of an STA, the next data frame is immediately supplied to the STA [14]. Figure 5 shows the average number of contending STAs with the random AIFSN scheme in the steady state. The average number of contending STAs is kept very small with many active STAs. In this case, most of the STAs are usually at a non-contending state. When the number of STAs is equal to 6,000, the average number of contending STAs is only 16. It enables the M2M networks to improve the throughput performance drastically, which is operated with the CSMA/CA protocolunderheavy traffic conditions. Figure 6 shows the throughput performance under a saturated traffic condition versus the number of STAs. The value of AIFSN max is set 20 in order to maximize the throughput performance with 6,000 STAs. The transmission data rate equals 300 kbit/s. The throughput performance of the conventional DCF system decreases with an increase in the number of STAs. On the other hand, the virtual grouping method with the random AIFSN scheme drastically improves the throughput performance. When the STAs of different transmission data rates are mixed, the number of contending STAs is similarly limited; therefore, virtual grouping works effectively. The throughput performance is affectedby transmissionrates. However,

5 2980 IEICE TRANS. COMMUN., VOL.E96 B, NO.12 DECEMBER 2013 Fig. 6 Throughput performance under saturated traffic condition when all the STAs transmit data frames at 300 kbit/s. Fig. 8 Throughput performance under saturated traffic condition when 10% of the STAs have the error-prone links whose average frame error rate is 0.1, and the data transmission rate is 300 kbit/s. Fig. 7 Throughput performance under saturated traffic condition when half of the STAs transmit data frames at 300 kbit/s and the others at 150 kbit/s. the virtual grouping scheme by the medium access control employing EDCA with the random AIFSN scheme is not affected. Figure 7 shows the throughput performance when half of the STAs transmit at 300 kbit/s and the others at 150 kbit/s. By including low transmission rate STAs, the throughput performance becomes less than that shown in Fig. 6; however, it is improved similarly when compared with that of the conventional DCF system. Some of the STAs may have an error-prone link. We assume that 10% of the links are error-prone, of which frame error rate equals 0.1. Figure 8 shows the evaluation results of the total throughput performance. The difference in the throughput performances shown in Figs. 6 and 8 is small. The virtual grouping method effectively works in the case where some error-prone links are included. 3.2 Analysis of Virtual Grouping We described the mechanism of the virtual grouping method in Sect In this section, we analyze the mechanism of how virtual grouping is achieved, using computer simulation Fig. 9 AIFSN distribution of each state using the random AIFSN scheme (AIFSN max = 11). results. In this analysis, the value of AIFSN max is 11, which means that each STA chooses its AIFSN value as an integer number in the range of 2-11.We assume that the number of STAs is 10,000. Figure 9 shows AIFSN distribution of each state using the random AIFSN scheme. At the first state, all the STAs randomly choose their AIFSN values at the start of the computer simulation. Therefore, approximately 1,000 STAs have the same AIFSN value because of the range of AIFSN and the total number of STAs. The STA(AIFSN = 2)s immediately decrease their backoff counters and transmit the data frames. They reset their AIFSN values; therefore, the number of STA(AIFSN = 2)s decreases, and the number of STA(AIFSN > 2)s increases. If the number of STA(AIFSN = 2)s becomes small enough, STAs(AIFSN = 3) acquire a transmission priority. This is the second

6 OGAWA et al.: IEEE AH BASED M2M NETWORKS EMPLOYING VIRTUAL GROUPING AND POWER SAVING METHODS 2981 Fig. 10 Transition of the AIFSN distribution using the random AIFSN scheme (AIFSN max = 11). Table 2 Example of the steady distribution of AIFS N. AIFSN Cycle , ,775 62, ,775 62, ,775 62, ,775 62, ,776 62, ,324 62, ,323 62, ,323 62, ,323 62, ,323 state. As in the case of STA(AIFSN = 2)s, the number of STA(AIFSN = 3)s decreases, and the number of STA(AIFSN > 3)s increases. Then, STA(AIFSN = 4)s follow them. Finally, most STAs become STA(AIFSN = AIFSN max )s at the steady state. This evolution process is shown in Fig. 10. The number of STA(AIFSN < AIFSN max )s decreases with a passage of cycles. The number of STAs with large AIFSN values decreases gradually because they may choose smaller AIFSN values after their transmissions, and these STAs with smaller AIFSN values acquire the transmission priority. Then, they will have larger AIFSN values due to the reset of their AIFSN values. Table 2 shows examples of AIFSN distribution in the steady state. Most STAs are STA(AIFSN = AIFSN max )s at every cycle. After the 62,149th cycle, STA(AIFSN = AIFSN max )s contend, and some of them transmit their data frames. In this case, a collision event occurs because more than one STAs transmit their data frames. Then, STAs(AIFSN < AIFSN max )are newly provided. There are two phases in the steady state as described in Sect The reduction phase distribution allows the minor STAs that have smaller AIFSN values to contend. The number of contending STAs at the steady state is shown in Fig. 11. The number of contending STAs stays small except at some discrete time instances. These Fig. 11 Transition of the number of contending STAs at the steady state. The number of STAs is 10,000. instances correspond to the provision phase in which STA(AIFSN < AIFSN max )s are provided, such as the 62,150th cycle in Table 2. After the provision phases, the number of contending STAs immediately gets small. The distribution of the reduction phase limits the number of contending STAs where most STAs are STA(AIFSN = AIFSN max )s, and there are some STAs with smaller AIFSN values. They prevent the majorities from contending. 4. Proposed Power Saving Method Employing Virtual Grouping We proposes the power saving method which makes noncontending STAs, a large majority, to sleep in addition to the PS-Poll method. The conventional power saving methods work well under light traffic conditions with a small number of STAs. However, under traffic congestion conditions with a large number of STAs, these methods degrade the throughput and power consumption performance. The objective of the proposed method is to reduce the power consumption of the system under traffic congestion conditions. The key idea of the proposed method is to make the non-contending STAs sleep. The flowchart of this scheme is shown in Fig. 12 for active STAs that have data frames in their transmission queues. First of all, they undergo a virtual grouping process with the random AIFSN scheme to transmit the data frame as explained in Sect. 2. During the virtual grouping process, each active STA experiences either of the states the contending or the non-contending state at every cycle. Each STA counts the number of successive non-contending states and enters into the sleep state if the number exceeds a threshold r th. After sleeping for a certain sleep period T sleep, the STA returns to the active state. When an active STA decreases its backoff counter value, it stays in the active state and tries to transmit its data frame. Each STA repeats this procedure until its queue becomes empty. The proposed method realizes the power saving method in a distributed control manner. With a small value of r th, it is easy for the STAs to sleep, although they are likely to lose opportunities to transmit their data frames. The

7 2982 IEICE TRANS. COMMUN., VOL.E96 B, NO.12 DECEMBER 2013 Fig. 13 Time chart of the downlink traffic channel access with the PS-Poll method. Table 3 Power consumption parameters [15]. State Transmitting Receiving Data processing Channel sensing Sleep Value 340 mw 260 mw 56 mw 204 mw 0.19 mw Fig. 12 Flowchart of the proposed power saving method for active STAs. 5. Evaluation of the Proposed Power Saving Method The computer simulation results of the proposed power saving method are presented in this section. The simulation parameters are shown in Tables 1 and 3. In the sleep state in Table 3, some parts of the circuit are awake and the association with the AP is maintained [15]. T sleep value is restricted by the IEEE standard and the characteristics of wireless sensor devices. With regard to the IEEE standard, the STAs have to receive beacon frames which include delivery traffic indication maps (DTIMs). Hence, T sleep must be smaller than the beacon frame interval. The beacon interval of IEEE based WLANs is usually 100 ms. In the IEEE ah standard, 1/10 down clocking is considered. Therefore we assume 1 s as the beacon interval. In order to receive the beacon frames from the AP, the STAs must wake up within 1 s. On the other hand, T sleep must be greater than one cycle period, the average of which is approximately 3 ms. As a time unit for the sleep mode, we select 100 ms as T sleep. In this proposed power saving method, data transmissions with the PS-Poll method are assumed. In this case, the STAs are usually in a sleep mode to save power consumption except for receiving the DTIMs that are included in beacon frames from the AP. After receiving the DTIMs, the STAs know existence of their downlink data frames at the AP. When an STA wakes up to request the downlink data frame, it transmits a PS-Poll frame to the AP. Then, the AP transmits the data frame to the STA a SIFS period after successful reception of the PS-Poll frame. This time chart is shown in Fig. 13. Therefore, only the STAs perform the channel access procedure for the downlink data frames. The proposed method effectively works when the AP transmits data frames to the STAs. 5.1 System Description A single-hop network with an AP and 6,000 STAs is considered according to the IEEE ah system model. Each STA is assumed to have one data frame in its transmission queue at the start of the simulation to evaluate the temporary uplink trafficcongestionstate. Inthiscase, asthesimulation time progresses, the traffic congestion is mitigated owing to an increase of the number of non-active STAs that have successfully transmitted their data frames. For the sake of simplicity, the AP transmits no data frames or beacon frames during this period. The system performance is evaluated using the two criteria. The first is the maximum delay, which is the required time for all the STAs to transmit the data frames. The second one is the consumed energy, which is the amount of energy that all the STAs consumes within this period. 5.2 Simulation Results We shows the improved performance of the system with the proposed method and derive an optimum value for r th. In this subsection, T sleep is fixed at 100 ms. Figure 14 shows the consumed energy of the 6,000 STAs versus r th. The conventional method indicates the random AIFSN scheme with the PS-Poll method for power saving. This figure shows that the proposed method reduces the consumed energy by 96% as compared with the conventional method at r th = 1. The consumed energy uniformly

8 OGAWA et al.: IEEE AH BASED M2M NETWORKS EMPLOYING VIRTUAL GROUPING AND POWER SAVING METHODS 2983 Fig. 14 Total consumed energy of the STAs versus r th. r th is the sleep threshold. Fig. 16 Total consumed energy of the STAs versus r th. r th is the sleep threshold. The number of active STAs is 100. Fig. 15 Maximum delay time for 6,000 STAs to transmit all data frames versus r th. r th is the sleep threshold. Fig. 17 Maximum delay time for 100 STAs to transmit all data frames versus r th. r th is the sleep threshold. increases with value of r th, as the STAs are unlikely to sleep with a large r th value. Considering only the consumed energy of the STAs, r th = 1 is the best value. Moreover, we should consider the delay performance when choosing the r th value. Figure 15 shows the maximum delay time for the 6,000 STAs to transmit versus r th. The maximum delay decreases with an increase in the r th value and converges to the conventional value. Assuming that the permissible increase in the maximum delay is less than 5%, r th should be greater than 1. Considering the foregoing argument, r th = 2 is the optimal value. Using this value in Fig. 14 the consumed energy is reduced to 4.6 kj, which is 10% of the conventional method. We evaluate the total consumed energy of the STAs versus r th where the number of active STAs equals 100, and the maximum delay time for 100 active STAs to transmit all the data frames versus r th as shown in Figs. 16 and 17, respectively. These simulation results show that r th = 2isthe optimal value not only in the heavy traffic condition but also in the light traffic condition. Finally, we evaluate the consumed energy of the pro- Fig. 18 Total consumed energy of the STAs versus number of active STAs. posed method at different conditions where some STAs are active and the others are not. Figure 18 shows the consumed energy versus the number of active STAs. In this

9 2984 IEICE TRANS. COMMUN., VOL.E96 B, NO.12 DECEMBER 2013 References Fig. 19 Maximum delay time for all the STAs to transmit the data frames versus number of active STAs. case, r th = 2 is selected according to the discussion previously mentioned. The proposed method reduces the consumed energy of the STAs in all cases. On the other hand, the maximum delay time for all the active STAs to finish their transmissions is increased by less than 5%, as shown in Fig. 19. These results show that the proposed power saving method can be applied to various conditions without parameter adaptation. For the conventional PS-Poll method, an STA requests a downlink data frames by using a PS-Poll frame when the STA wakes up. The PS-Poll method itself is common to both the proposed method and the conventional method. If we assume the downlink data frames, there will be the similar increase in maximum delay for the proposed method and the conventional method. 6. Conclusion To realize a good throughput and power-efficient M2M network employing the CSMA/CAprotocol, this paper has proposed the IEEE ah based M2M networks employing virtual grouping and power saving methods. To solve the throughput performance degradation caused by contention of many STAs, this paper has shown that virtual grouping with the random AIFSN scheme achieved a good throughput performance. To reduce the power consumption of the STAs when the CSMA/CA protocol is used, this paper proposed the power saving method combined with virtual grouping. It enabled power saving in a distributed control manner. The simulation results show that the proposed method reduced the energy consumption of the STAs by 90% within a 5% increase in the delay, compared with the system using the virtual grouping method and the conventional PS-Poll method. [1] IEEE P task group ah Meeting update, ieee802.org/11/reports/tgah update.htm [2] IEEE P802.11ac/D2.2 Draft Std. Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz, [3] M. Park, et al., RAW slot assignment, IEEE /1321r0, Nov [4] S.M. Kim and Y.J. Cho, Performance evaluation of IEEE distributed coordination function with virtual group, IEICE Trans. Commun., vol.e88-b, no.12, pp , Dec [5] S.M. Kim and Y.J. Cho, A virtual grouping scheme for improving the performance of IEEE distributed coordination function, Proc. Wireless Networks and Emerging Technologies, July [6] S. Gaur and T. Cooklev, Introducing finer prioritization in EDCA using random AIFSN, Proc. TridentCom 2007, Orlando, Florida, USA, May [7] C. fan Hsin and M. Liu, Network coverage using low duty-cycled sensors: Random & coordinated sleep algorithms, Proc. 3rd International Symposium on Information Processing in Sensor Networks, pp , [8] J. Liu, X. Jiang, S. Horiguchi, and T.T. Lee, Analysis of random sleep scheme for wireless sensor networks, Int. J. Sensor Networks, vol.7, no.1, pp.71 84, [9] Y.S. Chen, M.K. Tsai, L.S. Chiang, and D.J. Deng, Adaptive traffic-aware power-saving protocol for IEEE ad hoc networks, Proc. IEEE 17th International Conference on Parallel and Distributed Systems, pp , Dec [10] D. Qiao and K.G. Shin, Smart power-saving mode for IEEE wireless LANs, Proc. IEEE INFOCOM, pp , March [11] X. Hu, Z. Chen, and Z. Yang, Energy-efficient scheduling strategies in IEEE wireless LANs, Proc. IEEE Computer Science and Automation Engineering, pp , May [12] IEEE Std n Amendment 5: Enhancements for Higher Throughput, [13] IEEE Std e Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements, [14] G. Bianchi, Performance analysis of IEEE distributed coordination function, IEEE J. Sel. Areas Commun., vol.18, no.3, pp , March [15] D.M. Dobkin and B. Aboussouan, Low power Wi-Fi (IEEE ) for IP smart objects, GainSpan Corporation, Kohei Ogawa received his B.E. degree from Kyoto University, Japan, in He is currently an M.E. student at Kyoto University, Japan. He has been engaged in the research of the protocol for Wireless M2M networks. Acknowledgment This work was supported in part by Grant-in-Aid for Scientific Research (B) (no ).

10 OGAWA et al.: IEEE AH BASED M2M NETWORKS EMPLOYING VIRTUAL GROUPING AND POWER SAVING METHODS 2985 Masahiro Morikura received his B.E., M.E., and Ph.D. degrees in electronics engineering from Kyoto University, Kyoto, Japan in 1979, 1981 and 1991, respectively. He joined NTT in 1981, where he was engaged in the research and development of TDMA equipment for satellite communications. From 1988 to 1989, he was with the Communications Research Centre, Canada, as a guest scientist. From 1997 to 2002, he was active in the standardization of the IEEE a based wireless LAN. He received the Paper Award and the Achievement Award from IEICE in 2000 and 2006, respectively. He also received the Education, Culture, Sports, Science and Technology Minister Award in 2007 and Maejima Award in Dr. Morikura is now a professor in the Graduate School of Informatics, Kyoto University. He is a member of the IEEE. Koji Yamamoto received the B.E. degree in electrical and electronic engineering from Kyoto University in 2002, and the M.E. and Ph.D. degrees in informatics from Kyoto University in 2004 and 2005, respectively. From 2004 to 2005, he was a research fellow of the Japan Society for the Promotion of Science (JSPS). Since 2005, he has been with the Graduate School of Informatics, Kyoto University, where he is currently an associate professor. From 2008 to 2009, he was a visiting researcher at Wireless@KTH, Royal Institute of Technology (KTH) in Sweden. His research interests include game theory, spectrum sharing, and M2M networks. He received the PIMRC 2004 Best Student Paper Award in 2004, the Ericsson Young Scientist Award in 2006, and the Young Researcher s Award from the IEICE of Japan in He is a member of the IEEE. Tomoyuki Sugihara received his B.P. degree from Kyoto Sangyo University, Japan, in He is currently a director of Allied Telesis Holdings, K.K., Japan. He has been engaged in the research & development of Ethernet and IP network products and protocols.

Hybrid Station Aided Coexistence Scheme between Wireless PANs and Wireless LAN

Hybrid Station Aided Coexistence Scheme between Wireless PANs and Wireless LAN 578 PAPER Special Section on Wideband Systems Hybrid Station Aided Coexistence Scheme between Wireless PANs and Wireless LAN Fumihiro INOUE a), Student Member, Takayuki NISHIO, Member, Masahiro MORIKURA,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Table of Contents 1 WLAN QoS Configuration 1-1

Table of Contents 1 WLAN QoS Configuration 1-1 Table of Contents 1 WLAN QoS Configuration 1-1 WLAN QoS Overview 1-1 Terminology 1-1 WMM Protocol Overview 1-2 Protocols and Standards 1-4 WMM Configuration 1-4 Configuration Prerequisites 1-4 Configuring

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Performance evaluation of IEEE e

Performance evaluation of IEEE e IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

Quality of Service (QoS) Settings on AP541N Access Point

Quality of Service (QoS) Settings on AP541N Access Point Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES

MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES ABSTRACT Joo Rak Kang 1 and Tae-Jin Lee 2 1 Samsung Electro-Mechanics Co., Ltd., Suwon, Korea College of Information and Communication

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012 33 Dynamic Traffic Prioritization and TXOP Allocation in 802.11e Based Multihop Wireless Networks Dongho

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN 802.11E WIRELESS LAN Shih-Wei Pan, Jung-Shyr Wu and Ming-Wei You Department of Communication Engineering, National Central University, JhungLi City, Taiwan

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

A Performance Investigation of the Modified PCF with Priority Scheme

A Performance Investigation of the Modified PCF with Priority Scheme 2 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 A Performance Investigation of the Modified with Priority Scheme Apichan Kanjanavapastit 1 and Bjorn Landfeldt

More information

Survey on OFDMA based MAC Protocols for the Next Generation WLAN

Survey on OFDMA based MAC Protocols for the Next Generation WLAN Survey on OFDMA based MAC Protocols for the Next Generation WLAN Bo Li, Qiao Qu, Zhongjiang Yan, and Mao Yang School of Electronics and Information Northwestern Polytechnical University, Xi an, China Email:

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access by Anni Matinlauri Instructor: Jouni Karvo Supervisor: Professor Raimo Kantola Agenda Background Research

More information

IEEE ah: A Long Range WLAN at Sub 1 GHz

IEEE ah: A Long Range WLAN at Sub 1 GHz IEEE 802.11ah: A Long Range 802.11 WLAN at Sub 1 GHz Weiping Sun, Munhwan Choi, and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea; email:{weiping, mhchoi}@mwnl.snu.ac.kr,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Key-Words: Ad hoc network, multimedia, QoS, routing protocol.

Key-Words: Ad hoc network, multimedia, QoS, routing protocol. Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

On the impact of Wi-Fi multimedia power save mode on the VoIP capacity of WLANs

On the impact of Wi-Fi multimedia power save mode on the VoIP capacity of WLANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 On the impact of Wi-Fi multimedia power save mode on the VoIP capacity

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead

Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead 1 Dr.S. Bhargavi Professor, Dept.of ECE SJCIT, Chickballapur E-mail: bhargavisunil@gmail.com 2 Chandra Naik G Asst. Professor,

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Performance Analysis of Grouping Strategy for Dense IEEE Networks

Performance Analysis of Grouping Strategy for Dense IEEE Networks Performance Analysis of Grouping Strategy for Dense IEEE 802.11 Networks Lei Zheng *, Lin Cai *, Jianping Pan *, and Minming Ni *+ * University of Victoria, Victoria, BC, Canada + Beijing Jiaotong University,

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of

More information

Performance analysis of Admission Control for WLAN Networks in ad hoc mode

Performance analysis of Admission Control for WLAN Networks in ad hoc mode Performance analysis of Admission Control for 802.11 WLAN Networks in ad hoc mode Georgios S. Paschos, Ioannis Papapanagiotou, Efstathios D. Vagenas and Stavros A. Kotsopoulos School of Electrical and

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

THE number of mobile devices and the demand for multimedia

THE number of mobile devices and the demand for multimedia An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member, IEEE arxiv:47.6266v

More information

Analysis of Energy Efficiency in IEEE ah

Analysis of Energy Efficiency in IEEE ah AALTO UNIVERSITY School of Electrical Engineering Department of Communications and Networking Analysis of Energy Efficiency in IEEE 802.11ah Yue Zhao Master's Thesis submitted in partial fulfillment of

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Samsung Smart WLAN Solution

Samsung Smart WLAN Solution Whitepaper Samsung Smart WLAN Solution Smart Capacity & Security for Smarter Mobility Voice Optimization Introduction In our modern world, enterprises are in constant need to provide their employees with

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Voice Capacity Evaluation of IEEE a with Automatic Rate Selection

Voice Capacity Evaluation of IEEE a with Automatic Rate Selection Voice Capacity Evaluation of IEEE 80.11a with Automatic Rate Selection Nattavut Smavatkul, Ye Chen, Steve Emeott Motorola Labs, 1301 E. Algonquin Rd., Schaumburg, IL 60196 Email: (Natt, Ye.Chen, Steve.Emeott)@Motorola.com

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information