A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

Size: px
Start display at page:

Download "A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks"

Transcription

1 A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. Abstract In order to achieve high capacity packet transmissions in wireless ad hoc networks, the system throughput for a connectionless, distributed channel accessing scheme exploiting joint detection receivers is proposed and analyzed. Joint detection allows many concurrent, asynchronous packet transmissions to occur, thereby enhancing the capacity of a system. A novel packet format with physical layer header s containing an additional code identifier CID field as proposed in [2] is employed and CSMA is used for the physical layer header PLH of the packet. The data portion of each packet is spread by a unique random binary signature sequence identified by the code identifier field CID which allows joint detection of the asynchronous, overlapping packets. A comparison of using CSMA and Aloha multiple access for the PLH is made for a bimodal packet length distribution typical in TCP traffic. Further, an upper bound on the throughput capacity considering the proposed channel accessing schemes is given indicating a significant improvement of system and network throughput is possible with respect to conventional methods. I. INTRODUCTION An ad hoc network is a collection of nodes communicating with each other without a backbone infrastructure. These networks may have nodes that are immobile, mobile or a combination of the two. The speed of mobile nodes can vary depending on the application. An example for immobile nodes is a network of sensors in aircraft, monitoring the health of the wires and communicating it to the maintainer or the pilot [3]. Another example includes a network for controlling home appliances like televisions, computers, cell phones, toys and other devices from a distant place over the internet. Such appliances form an multihop ad hoc network to the gateway through other nodes in range. An application that involves nodes with high mobility is a multi hop network of Un-manned Airborne Vehicles UAV s for reconnaissance of terrain and battle field surveillance. The random movement of nodes and/or the inability to set up base stations at strategic points makes it extremely difficult to develop efficient protocols for such networks. The nodes communicate with each other locally and also assist in routing packets over multiple hops. The main challenge is to improve overall and per node throughput of such ad hoc networks. The low throughput in ad hoc networks as noted in [] is due to the average number of hops a packet travels before reaching the destination and also to the contention-based channel accessing method needed. Some of the issues in channel accessing schemes that need to be addressed for achieving better throughput are the well-known hidden terminal problem, the exposed node problem [4] and fairness issues. In the hidden node problem, different source nodes not in the carrier sensing range of one another sense the channel to be idle and transmit overlapping payloads causing collisions at all nodes that lie in the overlapping region of the two transmitting nodes. To avoid this, RTS/CTS control packets are exchanged between the transmitting and the receiving nodes [8]. The RTS/CTS control packet exchange scheme is used in the IEEE 802. [4] Wireless LANs. These packets are 20 6 byte control packets and are themselves vulnerable to the hidden terminal problem. In [5] it is shown that the number of RTS packets sent is twice as many as the CTS packets received and this behavior is attributed to the link loss or collisions of RTS packets. It was also observed that the per node throughput was very low, which was attributed to the number of hops a packet travels from source to destination and also to the high reliability required for the unicast delivery mechanism in IEEE 802. that consists of RTS-CTS exchanges for unicast packets. The channel accessing method for a single channel protocol suffers from inefficient usage of bandwidth due to control packet exchange, binary exponential backoff, and the exposed terminal problem. Due to node mobility, it is very difficult to maintain the channel usage information and hence very easy to cause packet collisions thereby further decreasing the throughput in mobile environment. In certain cases, a node refrains from transmission on receiving a RTS packet although transmission may not have caused collision at the receiving nodes. This behavior is called the exposed node problem. Figure explains the behavior of node B on receiving a RTS packet from node C. Although, transmission from node B to node A may not cause collisions at node A or D, node B waits till the packet transmission from node C to node D is complete. A further issue is fairness in channel accessibility. Any single node should not use excessive channel resources. Various fairness issues in the IEEE 802. WLAN standards have been studied specifically for ad hoc networks in [5] and [6] leading to similar conclusions on the unsuitability of IEEE 802. for ad hoc networks. Attempts to implement fairness increases the control information exchange [7] [9] and hence the complexity of the system. The network may suffer throughput degradation

2 A B C D packets over multiple hops to the destinations. Mobility of nodes adds additional complexities to the routing and medium access layer. Exchange of control packets and maintaining channel state information would not only further decrease the throughput of such networks but also makes the system extremely complex. The upper bound on the throughput capacity derived in [] would therefore be hard to attain. In the next section, we adopt a self-contained packet structure and propose a channel accessing scheme to suit mobility in ad hoc networks. Fig.. Exposed Node Problem. in achieving fairness. These issues are discussed in context with the novel packet structure for channel access in mobile ad hoc networks. In this paper, we propose and analyze system and network throughput of joint detection-based channel accessing schemes for ad hoc networks. A novel channel accessing scheme enabling joint detection of overlapping packets was proposed by Kota and Schlegel in [2]. In this paper, we introduce a variant of this method for mobile ad hoc networks that uses Carrier Sense Multiple Access CSMA for the Physical Layer Header PLH of a packet and compare its throughput with that of the original system. We show that using CSMA for the header achieves better throughput for a bimodal packet length distribution. Gupta and Kumar in [] proposed an abstract model for channel access in wireless ad hoc networks. Each immobile node in the model acts as a source and also assist in routing packets over multiple hops for various source destination pairs. An upper bound on the overall network throughput derived for such a network shows that as the number of nodes increases, the per node throughput decreases as n. This result shows that large ad hoc networks are inherently inefficient. The proposed channel access scheme gives a significant improvement in throughput. The organization of the paper is as follows: In Section II, we provide a detailed description of the new channel accessing scheme that has a self contained packet structure to accommodate mobility. In Section III, an equation for system throughput is obtained and the simulation results are discussed. This section also compares the throughput of the proposed system with and without CSMA. We also show that for a bimodal packet distribution the proposed system provides better throughput than the original system in [2]. In Section IV we review the upper bound on the network throughput capacity of [] and provide an upper bound on the network throughput for the channel accessing schemes proposed in this paper. A brief summary of the paper follows in Section V. II. MOBILE AD HOC NETWORKS A Mobile Ad Hoc network MANET is a collection of nodes communicating with each other without any infrastructure. Every node in the network act as a source and also relay A. Packet Structure and Channel Access The packet structure for channel access scheme is shown in Fig. 2. It consists of a Physical Layer Header PLH that has a Code Identifier CID field. The data packet from the MAC layer is spread with the code specified in the code identifier field. All packets use CSMA for the PLH. Since the PLH is spread by a common code, every node listens to this common PLH channel before a packet is transmitted. Figure 3 shows the common PLH channel and the data channel. If the channel is found idle, a random spreading code is used to modulate the data packet and is placed in the code identifier field of the PLH. If the medium is busy, the node sets a random backoff counter and retries when the backoff counter expires. Since the header duration is very short, the nodes need not wait for long before transmitting a packet. Due to this, fairness in channel accessibility and also the exposed terminal problem is not a major concern. However, in the proposed scheme, the fairness issue needs to be addressed from a different perspective in that choosing rate and power by each node transmitting a data packet must be balanced. CSMA for PLH reduces the number of header collisions and also the data packets lost during this process. Due to hidden terminals one PLH may be successfully detected while the other PLHs and the corresponding data packets are lost. On successfully receiving a packet that happens on successfully decoding the header and the payload, the node sends back an ACK to the source node. In case an ACK is not heard in the ACK-TIMEOUT period, the source node retransmits the packet. All broadcast and multicast packets use a common spreading sequence other than the one used for spreading the PLH. As in the unicast packets, the code identifier contains the code with which the packet is spread. For these packets, no acknowledgement is sent back from the receiving node. B. Advantages of the proposed system The fairness issues are less of a concern since the PLH including the preamble is approximately 200 bits in length and hence the nodes need not wait for the entire packet duration to access the channel. Collisions that lead to packet loss are limited to the PLH, as the data packets are modulated by a random spreading code. Since the packet structure contains the spreading code, no explicit distributed algorithm is required for code exchange. A code is not associated to a node but a packet itself. The

3 PLH 200bits MAC Data Packet Bytes CID 40 bits L d Fig. 2. Code Identifier field added to the PLH. Header Channel Common Spreading Code Data Channel Random Spreading Code Fig. 3. PLH channel and Data channel for the proposed system. probability that any two nodes in range of each other selecting the same code for a packet and transmitting nearly at the same time is very low. The exposed node problem is well handled, as every node uses a random code for every packet, and there is no explicit channel reservation. Various distributed code assignment schemes such as those proposed in [0] [] [2] can be completely avoided. III. SYSTEM THROUGHPUT The system throughput is calculated by taking into account the PLH and the data portion of the packet. The packets can be successfully detected by successful PLH detection and successful packet retrieval. A. CSMA for the Physical Layer Header For successful detection of the header, the PLH part of the packet from different nodes must not overlap. Overlapping PLHs are assumed to be destroyed and hence the packets from both the users are lost. However, under certain circumstances, it may be possible extract correct information from one of the overlapping PLHs if they are not bit synchronous. In [2], spread Aloha was considered for the header. In the Aloha system, nodes transmit without knowing if the channel is busy or not. In case of conflict, the node retransmits a packet again after waiting for a random amount of time. To avoid such repeated conflicts, CSMA is proposed instead of Aloha for the PLH. Note that this scheme is distributed and can take place at the node itself without requiring a feedback from any other node in the network. For PLH analysis, we consider an infinite number of users and in the form of a Poisson source with an aggregate packet generation rate of λ packets/sec. From [3], for non persistent CSMA, the probability of PLH success is given by, P P LH = G + 2a + where, G is the offered channel traffic and a is the ratio of propagation delay to packet transmission time. B. Joint Detection for the Data Packet For successful joint detection, assuming a joint detection capability of K, no more than K packets can exists in any given time slot of length 2L d. Considering a Poisson arrival of packets, we calculate the probability of K or fewer packets in this time slot as P d = k=k k=0 Q e 2λ L d 2λ L d k k! K 2λ L d L P LH 2λ 2 3 The Poisson distribution converges to a Gaussian distribution for large Kk 0 with mean and variance 2λ L d.

4 Probability of packet success: Overall system throughput: P P LH P d = S = λ G + 2a + G + 2a + Q K 2λ 2λ Q K 2λ 2λ 4 5 Number of packets and λ 2 is the arrival rate for L d2 = 536 byte-packets. λ new = λ + λ 2 = 0.66 L d λ L d2 λ Therefore, the overall system throughput, considering a bimodal packet length distribution, for PLH using Aloha and using CSMA is given by equations 6 and Packet lengthbytes Fig. 4. C. Overall System Throughput Histogram of data packets. The probability of successfully receiving the packet and the overall system throughput are given by equations 4 and 5 respectively. D. System Throughput for a Bimodal Packet Distribution Packets were collected from a TCP channel by using Ethereal [6], a packet sniffer. The packet distribution for a 00Mb download from an FTP server is shown in Fig. 4. From this distribution, we can see that a large number of packets are of length 50 60, or 530 bytes. This bimodal packet distributions was also noted in [7]. This distribution contains various network management packets including those involved for data transfer over the network. The throughput of the proposed system for a bimodal packet distribution can be found by modelling the system as two queues having different arrival rates, λ and λ 2. The sum of two poisson processes is a poisson process with mean equal to the sum of the means of the individual processes, i.e, P Y = K = λ + λ 2 K K! e λ +λ 2 where λ is the arrival rate for L d = byte-packets E. System Simulation Results The simulation of the system is based on the assumptions and the system description in Section III. Figure 5 shows the throughput for systems using CSMA and Aloha for PLH, for a joint detection capability of 20 and a payload of 500 bytes. The throughput of the joint detection system is plotted considering equation 3. The overall system throughput for both the proposed system and the one proposed in [2] is shown. It can be seen from Fig. 5 that the header collisions are avoided by sensing the physical layer header PLH channel and hence the overall system throughput is increased. The plot of CSMA and Aloha for the PLH in Fig. 5 is normalized to the packet length payload. For a system with joint detection capability of K = 0 and 50 respectively, the throughput is shown for different in Figures 6 and 7. It can be seen that the proposed system with CSMA for the header gives better performance than using spread Aloha for the header. The lines connecting the Aloha and CSMA points in the plot of Fig. 6 and 7 indicate that they are of the same packet lengths. The proposed system can also handle a higher packet arrival rate than spread Aloha for the same packet lengths. For large packet lengths, and low joint detection capability make the system joint detection capability limited and not PLH collision limited. However, with an increase in joint detection it can be seen that the system is PLH collision limited and not joint detection capability limited. Figure 8 shows the comparison of the throughput of the systems using Aloha and CSMA PLH for the bimodal packet length distribution. Figure 8 shows a considerable increase in throughput of the proposed system over using Aloha for the PLH for a bimodal packet length distribution. It can also be seen from the plot that as the joint detection capability increases, there is a significant increase initially but less further

5 S = λ new S = λ new e 2G K 2λnew Q 2λnew G + 2a + K 2λnew Q 2λnew 6 7 on. This is due to the header collision limitations. Therefore, we can conclude that for systems using Aloha or CSMA for the PLH, an increase in joint detection capability will not further increase the throughput after a certain point. The header collisions puts a limit on the requirement of joint detection capability for the system proposed in this paper. This gives a suitable value of K over which the proposed system throughput is limited by header collisions. Note, however, that the physical properties of the wireless channel are limiting traffic much before this saturation, essentially assuming that losses due to channel conditions are not a limiting factor. IV. AN ENHANCEMENT IN THROUGHPUT WITH JOINT DETECTION Let us review the results obtained in []. The nodes are arbitrarily placed in a disk of unit area. From the Protocol Model, a transmission from X i to X j is successful if for any other concurrent transmission from node X k over the same sub-channel, X k X j + X i X j, which means that there cannot be any other concurrent transmissions within the transmission radius of X i X j around the receiver X j. Using this Protocol Model, Gupta and Kumar in [] calculate 8 π W n an upper bound on the transport capacity λn L of bit-meters/sec, which makes an important assumption that only one source-destination pair within radio range to exchange packets. However, by employing joint detection, the overall network throughput can be enhanced. Let K be the number of concurrent packet transmissions in the one hop system then we have the following lemma. Lemma 4.: For ad hoc networks with a joint detection capability of K, the transport capacity λn L is bounded above by W K n πk+ bit-meters/sec. The proof of the lemma is given in [8]. As K tends to n π, the transport capacity of such a network is W n bit-meters/sec. For K =, as in the IEEE 802. WLAN s, the transport capacity is bounded by, W n 2π bit-meters/sec. V. CONCLUSION In this paper, we proposed a new channel accessing scheme to suit mobility in ad hoc networks. This channel access scheme is simple and does not include any control packets exchange overhead at the MAC layer and hence the nodes need not maintain any channel state information to transmit a packet. Due to the self contained packet structure, the nodes need not use any distributed spreading code assignment schemes for packet transmissions. It is shown that the proposed system achieves better throughput and packet arrival rates than the previously proposed system using spread Aloha for the PLH. The number of header collisions is decreased, and hence the throughput of the overall system increases. The system is distributed and hence very ideal for mobile ad hoc networks. With the proposed channel accessing scheme for ad hoc networks, an upper bound on the network throughput capacity is further enhanced by a factor of approximately K over the conventional spread spectrum systems. REFERENCES [] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Trans. on Information Theory, vol. IT-46, no.2, pp , March [2] P. Kota and C. Schlegel, A wireless packet multiple access method exploiting joint detection, Proc. ICC 03, vol. 4, pp , Anchorage, AK, USA May -5. [3] S. Nagaraj and C. Furse, An improved MAC for a network of sensors in aircrafts, unpublished manuscript. [4] ANSI/IEEE Std. 802., Part : Wireless LAN Medium Access Control MAC and Physical Layer PHY specifications, 999. [5] S. Xu and T. Saadwi, Does the IEEE 802. MAC Protocol Work Well in Multihop Wireless Ad Hoc Network?, IEEE Comm. Magazine, vol. 39, pages 30 37, June 200. [6] H.-Y. Hsieh and R. Sivakumar, IEEE 802. over Multi-hop Wireless Networks: Problems and New Perspectives. IEEE Vehicular Technology Conference VTC, Vancouver, Canada, September [7] T. Ozugur, M. Naghshineh, P. Kermani, and J. A. Copeland, Fair Media Access for Wireless LAN s, In Proc. of IEEE GLOBECOM 99, Dec [8] P. Karn, MACA - a new channel access method for packet radio, in ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pp , ARRL, 990. [9] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Protocol for Wireless LAN s, In Proc. of ACM SIGCOMM 9, pp , London, UK, Aug. 3-Sept. 2, 994. [0] L. Hu, Distributed Code Assignments for CDMA Packet Radio Networks, IEEE/ACM Trans. on Networking, Vol., no. 6, pp , Dec [] E. Sousa and J. Silvester, Spreading Code Protocols for Distributed Spread-Spectrum Packet Radio Networks. IEEE Trans. Comm., 363:2-29, March 988 [2] A.A. Bertossi and M.A. Bonuccelli, Code assignment for hidden terminal interference avoidance in multihop packet radio networks, IEEE/ACM Trans. on Networking, vol. 3, n pp [3] L. Kleinrock and F. A. Tobagi, Packet Switching in radio channels: Part I- Carrier sense multiple-access modes and their throughput-delay characteristics, IEEE. Trans. Comm., vol. COM-23, pp , Dec [4] F. A. Tobagi and L. Kleinrock, Packet switching in radio channels: part II - the hidden terminal problem in carrier sense multiple-access modes and the busy-tone solution, in IEEE Trans. on Comm., vol. COM-23, no. 2, pp , 975. [5] S. R. Das, C. E. Perkins, and E. M. Royer, Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. Proceedings of the IEEE Conference on Computer Communications INFOCOM, Tel Aviv, Israel, March 2000, pp [6] Ethereal, [7] M. Mellia, R. L. Cigno, F. Neri, Measuring IP and TCP behavior with Tstat, Technical Report. [8] S. Nagaraj, C. Schlegel, and C. Furse Code-Sense Multiple Access with Joint detection Receivers in Ad Hoc Networks, Technical Reporttr

6 5 L d = 500 bytes and K = 20 Aloha Header CSMA Header Joint detection Data Header Aloha & Data JD Header CSMA & Data JD Header Aloha and Data Joint detection Header CSMA and Data Joint detection ratio = L d ratio = ratio = 20 ratio = ratio = 2 ratio = Arrival Rate in packets/packet duration Arrival Rate in packets/packet duration Fig. 5. Overall System throughput with joint detection. Fig. 7. System throughput comparison with a joint detection capability of Header Aloha and Data Joint detection Header CSMA and Data Joint detection ratio = L d ratio = Header Aloha & Data JD Header CSMA & Data JD 2.5 ratio = 20 ratio = ratio = 2 ratio = Arrival Rate in packets/packet duration Fig. 6. System throughput comparison with a joint detection capability of Joint detection JD capability Fig. 8. System throughput comparison for a bimodal packet length distribution and varying joint detection capability.

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System 6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 489 Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay)  Wireless MAC Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks Turning Hidden Nodes into Helper Nodes in IEEE 82.11 Wireless LAN Networks Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation

Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation Jing Deng, Yunghsiang S. Han 2, and Zygmunt J. Haas 3 The CASE Center and the Dept. of Electrical Engineering and Computer Science

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM

IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM IMPLEMENTATION OF A PACKET PRIORITY AND FIFO QUEUING MODEL IN PACKET RADIO SYSTEM H. Lami 1, A. Affandi 2 1, 2 Department of Electrical Engineering, Faculty of Industrial Technology, Institut Teknologi

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information