Grid-Based Channel Resource Allocation and Access Scheduling Using Latin Squares in Wireless Mesh Networks

Size: px
Start display at page:

Download "Grid-Based Channel Resource Allocation and Access Scheduling Using Latin Squares in Wireless Mesh Networks"

Transcription

1 Grid-Based Channel Resource Allocation and Access Scheduling Using Latin Squares in Wireless Mesh Networks Di Wu and Lichun Bao Donald Bren School of ICS, University of California, Irvine, USA Abstract Wireless communication channels are scarce shared resources in large scale wireless mesh networks (WMNs), and the network system performance is frequently plagued by hidden terminal interference in multi-hop scenarios. We propose a set of efficient channel resource allocation and access scheduling algorithms based on Latin squares for WMNs with multichannel communication capabilities, called (Grid-based channel Allocation and Access scheduling using Latin Squares). By forming grids over the WMN deployment area with nodal location information, maps Latin squares to the grids, and dynamically assigns multiple channels to the WMN grids for channel access scheduling purposes. The fairness of is analyzed in multi-flow multi-hop mesh networks with multichannel capabilities. The simulation results show that achieves much better performance than IEEE. DCF and other multi-channel access control protocols. I. INTRODUCTION Wireless mesh networks (WMNs) provide a cost-effective and performance-adaptive networking paradigm to deliver ad hoc and last-mile Internet access services. WMNs based on IEEE. standards [], also known as WiFi, have attracted special interests due to its simplicity of channel access control functions, low unit cost, flexibility for reconfigurations and wide acceptance in both -users and research communities. The medium access control (MAC) protocols in IEEE. standards [], such as DCF (distributed coordination function), all based on CSMA (carrier sensing multiple access) mechanisms. In mission critical applications, WMNs based on IEEE. protocol suite are unable to deliver the full channel capacity to the applications due to increasing channel overheads and severe interference caused by hidden terminals. One of the core issues is to address the channel resource sharing problem in distributed wireless environments. New coordination functions that compreh the various requirements of the wireless applications are long sought after. In this paper, we focus on the channel resource sharing problem under two research thrusts in wireless networks with single-radio multi-channel (SRMC) communication capability assumptions, ) the channel resource allocation problem, which asks for dynamic and adaptive conflict-free channel assignments to individual nodes or clusters in wireless networks in the macro-time scale; ) the multiple channel access control problem, which asks for collision-free packet transmissions in the micro-time scale. Such channel resource coordination functions are especially challenging due to inherent distributed nature of large scale wireless networks. This work was sponsored in part by the Raytheon Company under Grant No. RC //$. c IEEE The channel allocation and access scheduling problems have been extensively studied in the literature. MMAC used the beacon messages to synchronize the wireless nodes and negotiate the channel allocations []. The allocation and scheduling of partially overlapped channels in WMNs were discussed in []. WMNs with SRMC capabilities were addressed in []. Although beneficial for channel throughput, switching among multiple channels may results in disconnections in WMNs. Interference-aware topology control and QoS routing in multichannel wireless mesh networks were considered in []. In this paper, we propose a set of algorithms, called (Grid-based channel Allocation and Access scheduling using Latin Squares), that applies Latin squares [] on the aforementioned two research thrusts the channel resource allocation problem and the multiple channel access control problem in WMNs with SRMC communication capabilities. applies Latin squares in two time scales macrotime scale for the channel assignment, and micro-time for the channel access, both are deterministic due to the use of Latin squares. In addition, is capable of dynamic ondemand allocation of channel resources so as to improve the channel utilization efficiency. The basic ideas and contributions of include: To organize the network into grids and clusters according to location information; To guarantee the network connectivity using grid shifting; To achieve efficient channel utilization in each cluster using compact Latin square based channel access schedules; To guarantee fairness of the channel allocation to each grid point and each node. The rest of paper is organized as follows. Section II introduces the Latin squares concept. Section III describes the on-demand channel access scheduling mechanisms, and Section IV presents the channel allocation algorithm in WMNs, including grid infrastructure formation, channel allocation, channel access scheduling, network connection maintenance, and transmission schemes. Section V presents the simulation results of in WMNs with SRMC communication capabilities. Section VI concludes the paper. II. RELATED WORK A Latin square of order n is an n n square matrix that consists of n symbols {,,,n}, in which the symbols of each row and column are also distinct. Exting the Latin square concept, a k-dimensional Latin hypercube of order n is a k-dimensional array H k = [h i,i,,i k ] in which each row is a permutation of symbols,,,n []. Suppose n +

2 is a prime number, and vectors A = [a i ] and B = [b i ] (i =,,,n) are two permutation arrays of symbol set {,,,n}, then a Latin square L n n =[l i,j ] of order n can be generated by multiplying the transpose of vector A, and vector B using the modulo multiplication operation: L n n = A T B, in which () l i,j = a i b j mod (n +), i,j {,,,n}. Although IEEE. DCF works in small networks, the BEB (binary exponential backoff) mechanism does not eliminate packet collisions due to its randomness in deriving the backoff intervals. MALS [] applied Latin square to calculate the backoff interval. In MALS, the rows of a Latin square are assigned to individual nodes, and the columns to time slots. A B C D A B C D A B C D A B C D t t t t Time Frame T Fig.. Channel Access Backoff Mechanism According to Latin Squares For instance, Fig. illustrates the Latin square assignments to nodes and time slots in a small network with four nodes A, B, C and D. In Fig., the time is structured by periodic time frames, which are further divided into time slots of period t i, i =,,,. In each time slot, the backoff intervals of each node for channel access (represented by the yellow hexagons) is equal to the Latin square symbol of the corresponding time slot. Because of the distinctiveness of Latin square symbols assigned to the nodes in each time slot, MALS eliminates potential packet collisions from different nodes. Using this mechanism, MALS can be implemented by simply replacing the backoff computation module in IEEE. DCF. In practice, the duration of a time frame can be around tens of milliseconds, and a time slot can last a few milliseconds. III. : CHANNEL ACCESS SCHEDULING A. Network Assumptions We consider wireless mesh networks (WMNs), in which each node knows enough location information of itself and its neighbors. In addition, we assume that each node in WMNs is equipped with a single radio and an omni-directional antenna, capable of switching between multiple channels, and each radio only works in half-duplex mode, i.e. may only receive or transmit at a time, but not both. In WMNs, we follow the protocol model discussed in [], and model the effective ranges of radio communications in three categories, namely the transmission range R tx, the carrier sensing range R cs and interference range R i. The carrier sensing range R cs is an adjustable parameter in the physical layer modules, and is usually set to to. times R tx []. Therefore, the two-hop distance in WMNs is a good approximation of the carrier sensing range, and node activation scheduling usually requires all neighbors of a node within two hops be silent when the node transmits. time B. On Demand Channel Access Scheduling It is usually the case that only a subset of the network nodes require channel access for data forwarding purposes. Hence, instead of assigning a Latin square row to each node in the wireless networks, we map the Latin square rows to different colors, and in turn assign colors to nodes with traffic forwarding demands using graph coloring algorithms. The graph coloring is to achieve conflict-free color assignments to nodes within two hops of each node. For coloring purposes, each node maintains a coloring table, denoted by ctab, consisting of the following information: Node ID, denoted by nodeid, which is usually the MAC address of the node. Color assigned to node i, denoted by mycolor i. When a node has no color assigned, its mycolor i =. The color bitmap of node i s one-hop neighbors, denoted by onehop. Expiration time. Each coloring tuple is refreshed when the tuple is updated by the corresponding node. The basic mechanism of the conflict-free color assignment is to exchange one-hop neighbor colors between adjacent nodes by piggybacking the color tuple (nodeid, mycolor i, onehop i ) information in every data frame sent by node i. Fig.. MAC Header mycolor onehop bits bits Payload Packet Format with Coloring Information. Fig. illustrates the coloring information included in the header of data frames in. As we see beside the normal MAC header and payload fields, the colors are represented using two bitmaps, one for the transmitting node itself, and the other for its one-hop neighbors. Assuming that two-hop neighborhood has less than nodes active for data packet transmissions, the coloring bitmap is set -bit long, in which each bit represents a color that has been taken or not by setting the bit to or, respectively. The color assignment algorithm consists of two parts at the transmitter and the receiver, respectively. Algorithm : Piggybacking Color Information on Outgoing Packets Input: node i s color table ctab, and an outgoing packet p Output: Outgoing packet p with color information p.mycolor ctab[i].mycolor; p.onehop ; for j ctab do if j p.dst then p.onehop p.onehop ctab[j].mycolor; S p; Algorithm specifies the steps to attach coloring information on the outgoing data frame at a node. On line, the packet registers the transmitter s own color information. On lines -, the transmitter finds all the colors of its onehop

3 neighbors, and maps them to the bitmap p.onehop using the logic OR operation, denoted by on line. Line calls the S function to transmit the packet. Note that, on Algorithm line, the one-hop color map excludes a special one-hop neighbor the destination of the packet. This is because the bitmap p.onehop is used by the destination to search for its own color and resolve possible color assignment collisions. If the destination has no color assignment, it will use the coloring information from all its one-hop neighbors to find an unused color for itself. Otherwise, if it finds that it own color has been used in the color bitmap of the received packet, it finds a color assignment collision, and has to look for another color, again. Algorithm : Node Coloring Using Received Packet Input: node i s color table ctab, and received packet p Output: node i s color // Broadcast destination? if p.dst then if ctab[i].mycolor then // Mask out node i s color. p.onehop p.onehop & ctab[i].mycolor; // unicast packet to node i? else if p.dst i then if ctab[i].mycolor then if ctab[i].mycolor & p.onehop then conflict true; // unicast packet to other nodes? else if p.dst i and ctab[i].mycolor then p.onehop p.onehop & ctab[i].mycolor; // Record coloring information in ctab RecordColor(p.src, p.mycolor, p.onehop); if conflict then // Search for a new color. RecomputeColor(i); Algorithm specifies the coloring conflict resolution process once a node i receives a packet p. Several logic operation notations are used in the algorithm, such as binary negation of a binary number using the overline, and operation using &. The broadcast address is represented using all s, which is equal to. Two functions, RecordColor(i) and RecomputeColor(i), are not provided but explicit and simple enough to implement easily. In Algorithm, lines - and - simply record the coloring information of packet p after masking off node i s own color. If packet p is destined to node i itself, then the existence of the same color as node i s in packet p s onehop color map indicates a coloring conflict with node i, as shown on lines -, which invokes the re-computation of node i s color assignment on lines -. If packet p is destined to other nodes, node i simply records the coloring information after masking off its own color on lines -. Once the color assignment to each node is derived, the Latin square row assignments to different nodes is automatically achieved according to color to Latin square row mapping. In multi-hop wireless networks, the color assignment happens when a routing path is established between a source and its destination. That is, when a unicast RREP (route reply) message is sent from the destination to the source. While in the first phase of route discovery that uses RREQ (route request) broadcast messages, color assignments are learned but not assigned to the nodes along the source to destination path. IV. : GRID-BASED CHANNEL ALLOCATION IEEE. DCF has implemented several collision avoidance mechanisms, such as RTS, CTS and ACK handshaking to avoid hidden terminal problems. However, due to the different impact ranges of wireless transmissions, i.e., the ranges for transmission, carrier sensing and interference, These mechanisms occasionally fail to avoid hidden terminal problems in multi-hop wireless networks. Instead, a grid-based spatial division multiple access scheme has to be applied in, and CSMA scheme has to be limited within individual grids. A. Network Grid Formation Similar to the channel allocation scheme in cellular networks, we allocate channel resources in a grid formation. Fig.. Network Grid Formation The left-hand side of Fig. shows the -cell clustering scheme, which is applied in channel reuse by the cells with the same number assignments. Similarly, we organize WMNs by the grid and the grid cluster. For simplicity, we choose a square grid formation scheme with -grid clusters as shown on the right-hand side of Fig.. Given multiple channels in a multi-hop wireless network, we will apply the same channel assignment results to all the -grid clusters. We assume the wireless nodes have the same transmission range. Similar to cellular technology, each grid edge is set to be twice the transmission range so that the distance between two nearby grids with the same channel allocation is about three times the side length. Such a separation of the same channel allocation guarantees interference freedom for concurrent transmissions over the same channel. B. Channel Allocation In WMNs, especially those based on IEEE. standards, we have limited number of channels for a full and conflict-free channel assignment to the wireless grids. These limited amount of channels have to be time-shared among all the network

4 grids. There are two methods to assign channels, namely the one based on Latin square and the other based on Latin cube. Fig. (a) shows a sample Latin square of size, which is generated by prime number as illustrated in Eq. (), for channel allocation purposes. In this example, we assume there are available channels. In order to assign these channels into each -grid cluster, we map the grids to the rows of the Latin square, and the time slots to the columns. (a) Latin Square Based Allocation Fig.. T TTT C C C C C C C C C C T TTT T T G G G G G G G G G G N/A (b) Latin Cube Based Allocation Channel Allocation in. For each grid cluster, channels,,, will be allocated to grids that have been assigned with Latin square symbols,,, during every time slot, correspondingly. For instance in Fig. (a), in time slot T, gridsg, G, and G are allocated with channel C, C, C, respectively. However, when we apply the Latin square in the -grids cluster, the required Latin square symbols may appear on the last row of the Latin squares in some time slots, which does not map to any existing grids. In this case, we swap the required Latin square symbols on the th row with the Latin square symbol located on other rows, so as to map the corresponding channels to the existing grids. Fig. (b) shows another way of allocating the channels to grids of each -grid cluster using Latin cubes. The Latin cube used in Fig. (b) was generated by prime number too. The grids, channels and time slots are mapped to the columns, rows and layers of the Latin cube. In each time slot, the channels are allocated to individual grids if the grid has a symbol on the corresponding rows. Similar to Latin square based channel allocation, the symbol may appear on the last column, which maps to none of the grids in our scenario. In this case, we shift the channel mapping by skipping the rows that give no channel allocations. For instance, because row does not map symbol to any of the existing grids, the channel mapping skips over row and maps channel to row in Fig. (b). In other cases, the number of channels may be more than that of the grids. It can be resolved by taking a modulo operation on the number of channels by the number of grids, and the remainder number of channels still follows the same channel allocation algorithms as illustrated in Fig. (a) and (b). As for the other channels which are multiples of the number of grids, we evenly allocate them over all the grids. However, the utilization of multiple channels with each grid is a separate issue, not addressed in this paper. Once a grid is assigned a channel, the wireless nodes inside the grid can communicate using the channel access protocol, specified in Section II. While wireless nodes that are inside grids without any channel allocated have to remain silent during the corresponding time slots. C. Grid Shifting Note that time slot for channel allocation is different from the time slot for channel access. In order to explain the temporal relationship between the time units for channel access scheduling and channel allocation, we introduce the notation: Denote t acc and T acc as the time slot and time frame durations for channel access schedules, respectively, and t all and T all for channel allocation schedules. In addition, denote the size of the Latin square for channel access scheduling as L acc, and that for channel allocation as L all. Then the relations between these components are: T acc = t acc L acc, () t all = T acc, () T all = t all L all = t acc L acc L all. () The reason that each channel allocation time slot includes four access time frames T acc in Eq. () is due to the grid shifting operation to maintain network connectivities. This is because when different channels are allocated to the grids in the virtual grid based mesh network, wireless nodes that belong to different grids and channels cannot communicate with each other, thus potentially breaking the existing network connections. In order to guarantee the network connectivity, we have to apply a grid shifting algorithm so as to ensure that every pair of neighbor nodes have a chance to stay in the same channel to communicate. (a) (b) Step : Right (c) Step : Down Fig.. (d) Step : Left Four-Step Grid Shifting for Channel Allocations (e) Step : Up We schedule channel access periods in four steps, as shown in Fig.. In each step, the grid coordinate origin shifts in four directions consecutively, which are right, down, left and up directions, respectively. During each step, the grid only shifts half of the grid size. Because nodes may belong to different grids of a grid cluster in the four steps, every node needs to re-calculate its channel number in each step. In practice when we build a WMN using IEEE. devices, a reasonable configuration about the temporal relations between channel access and channel allocation periods is to set t acc =ms, T acc =ms, t all = ms and T alloc =.s, when the Latin square size for channel access is L acc =, and L all =. That is, the longest interval for activating a grid

5 is up to. seconds using our grid-based channel allocation scheme in the worse case scenario. Lemma : The four-step grid shifting algorithm guarantees that each and every network connection can be activated on the same channel. Proof: We prove the lemma using a heuristic by throwing sticks into the grids, as shown in Fig.. The length of a stick is the transmission range of the wireless nodes in WMNs. Because each grid in Fig. represents an area in which all wireless nodes have the same channel assignment, the fact that the stick crosses none of the grid boundaries proves that the points of the stick can communicate over the same channel within one of the four steps in the grid shifting algorithm. In Section IV-A, we have designed the grid formation such that the edge length of each grid is twice the transmission range of wireless nodes. In addition, the grid shifting algorithm has applied grid shifting steps by half of the grid size, which is exactly the transmission range of wireless node. Therefore, we have these intermediate conclusions: The grids are symmetric, which means that the analysis about any grid applies to all other grids. Fig.. ) ) ) ) Stick contained in a grid. ) ) ) ) Stick contained after the first shift. ) ) ) ) Stick contained after two shifts. Network Connection Activation in One of the Grid Shifting Steps. The stick, representing the spatial one-hop neighbor relation, has only three ways of placement in a grid: ) completed contained in a grid, ) crossing boundary of two adjacent grids, and ) crossing two boundaries of adjacent grids, which are represented in Fig.. Figure shows that all the three possible placements of sticks can be contained within a grid in one of the four-step grid shifts. Otherwise, the length of stick would have to be longer than half the grid size. D. Channel Transmission Scheduling Because the channels are allocated and accessed according to grids in, the neighbors of a node may not always be on the same channel as the node. Therefore, the node needs to carefully schedule in which time slot(s) to transmit a packet, and how many times the packet has to be transmitted. If the node transmits a broadcast packet, it has to schedule the transmission of the broadcast packet for up to times in order to reach each and every one-hop neighbor. If the node transmits a unicast packet, it has to schedule the packet transmission while the node and its one-hop destination are located within the same grid. If the packet is unicast, the packet only has to be sent once to the correct receiving one-hop neighbor in the corresponding time slot, when the two neighbors are in the same grid point. If the packet is broadcast or multicast, the packet has to be resent in multiple time slots so that the corresponding neighbors could receive the packet. One way to implement such multi-channel packet transmission scheduling is to maintain a separate packet buffer for each channel. Data packets are placed in a channel buffer on a node if the one-hop neighbor will join the the same channel as the node itself in the nearest future. V. PERFORMANCE EVALUATIONS In order to evaluate the effectiveness of mechanism in more practical scenarios, we implemented in NCTUns v. []. The channel access scheduling problem is completely indepent of the routing protocols. Therefore, we use AODV to test our algorithms, and compare the performance of our protocols with other existing solutions. The performance of, compared with. DCF and MMAC, is evaluated in two simulation scenarios. The first is in a fully connected network scenarios with multiple CBR (constant bit rate) flows, and the second is in a multi-hop multi-flow networks with SRMC communication capabilities. The Latin squares are assigned using graph coloring. In our simulations, the transmission range of each node is set to m and the carrier sense range is m. The packet size of the CBR traffic is set to bytes, and the link bandwidth for each channel is Mbps. We assume that nine non-overlapping channels are available for SRMC operations. A node may be the source and destination for multiple flows. Each simulation was carried out for a duration of seconds, and the delay, jitter and network throughput performance metrics are collected in each run. A. Fully Connected Network In fully connected networks, we placed nodes in a m m area and created CBR flows between random pairs of nodes. All nodes are within each other s transmission range. Such a scenario is rather to examine the performance of channel access scheduling protocols by comparing with IEEE. DCF protocol. Fig. shows the average -to- CBR traffic performance. Because adopts the CSMA scheme as well as a deterministic backoff function based on Latin square assignments, and removes the control overhead on RTS/CTS and ACK frames, provides about % higher throughput, % lower average delay and % lower delay jitters than IEEE. DCF under different network loads in -node network scenarios. B. Multi-hop Multi-flow Network In order to evaluate the performance of in multihop multi-channel WMNs, we simulated another multichannel access control protocol, MMAC [], along with and IEEE. DCF. Unfortunately, the only available MMAC implementation was programmed in NS

6 Nodes ( CBR Flows) Nodes ( CBR Flows) Nodes ( CBR Flows) Average Delay (s).. Delay Jitter... Throughput (KBps) Load Rate (Mbps) Load Rate (Mbps) Load Rate (Mbps) (a) End-to-End Delay (b) End-to-End Delay Jitter (c) End-to-End Throughput Fig.. Average End-to-End Attributes in -Node Scenario with CBR Flows Nodes ( CBR Flows) Nodes ( CBR Flows) Nodes ( CBR Flows) Normalized Delay (ratio)... MMAC Normalized Jitter (ratio)... MMAC Normalized Throughput (ratio)..... MMAC Packet Arrival Rate per flow (packet/sec) Packet Arrival Rate per flow (packet/sec) Packet Arrival Rate per flow (packet/sec) (a) End-to-End Delay (b) End-to-End Delay Jitter (c) End-to-End Throughput Fig.. Performance Comparisons in -Node Multi-hop Wireless Networks with CBR Flows. simulator [], and a side-by-side direct comparison between MMAC, and IEEE. DCF is impossible. Fortunately, both NCTUns and NS simulators have implemented IEEE. protocols for ad hoc and wireless mesh networks, enabling us to use the performance of IEEE. DCF in the respective simulators as a baseline for overall comparisons. That is, we run the same simulation scenarios, which is to place = nodes over an area of size m m, and to use channels and create CBR flows in the multi-hop wireless networks. After the delay, jitter and throughput metrics are collected, we compare the performance of the three protocols, relative to the corresponding performance of IEEE. DCF. Therefore, the performance of. is normalized to be in every metric. Such an approach eliminates a lot of non-critical simulation assumptions, such as the network data rate, packet size, wireless signal propagation models etc., and keeps only the critical information about the relative advantages or disadvantages of different protocols. In addition, normalization based on a reference protocol also allows to compare different simulation results in fewer figures. Fig. shows the relative performance of and MMAC, normalized on the corresponding performance of IEEE. DCF. As we can see, provides the lowest delay and jitter and the highest network throughput under most network loads, while IEEE. DCF performs the worst. VI. CONCLUSION We have presented, a novel grid-based medium access protocol using Latin squares for channel allocation and channel access scheduling purposes in wireless mesh networks with multiple channel communication capabilities. In, the network is organized into grids and clusters according to location information, and guarantees the network connectivity using the grid shifting algorithm. The channel access efficiency and fairness were achieved by using compact Latin square based channel access and channel allocation schedules. Especially, we have applied Latin squares to the IEEE. DCF backoff algorithm to avoid the hidden terminal problem in multi-hop WMNs. Our simulation results show that has strong advantages over IEEE. DCF and MMAC, in fully connected network and in multi-hop multi-flow WMNs with SRMC capabilities. REFERENCES [] IEEE Std.. Wireless LAN Medium Access Controlf (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, Jul.. [] E. Aryafar, O. Gurewitz, and E.W. Knightly. Distance- Constrained Channel Assignment in Single Radio Wireless Mesh Networks. In INFOCOM,. [] L. Bao. MALS: Multiple Access Scheduling Based on Latin Squares. In Proc. IEEE MILCOM, Monterey, CA, Oct. - Nov.. [] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, :,. [] C.E. Laywine and G.L. Mullen. Discrete Mathematics Using Latin Squares. Wiley-Interscience,. [] A.H. Mohsenian and V.W.S. Wong. Partially Overlapped Channel Assignment for Multichannel Wireless Mesh Networks. In ICC,. [] J. So and N. H. Vaidya. Multi-channel MAC for ad hoc networks: Handling multichannel hidden terminals using a single transceiver. In MOBIHOC, pages,. [] J. Tang, G. Xue, and W. Zhang. Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks. In MOBIHOC,. [] S.Y. Wang, C.L. Chou, C.H. Huang, C.C. Hwang, Z.M. Yang, C.C. Chiou, and C.C. Lin. The Design and Implementation of the NCTUns. Network Simulator. Computer Networks, ():, Jun.. [] NS- web site. availabe at [] K. Xu, M. Gerla, and S. Bae. How effective is the IEEE. RTS/CTS handshake in ad hoc networks? In GLOBECOM, pages,.

J. Parallel Distrib. Comput. Large-scale access scheduling in wireless mesh networks using social centrality

J. Parallel Distrib. Comput. Large-scale access scheduling in wireless mesh networks using social centrality J. Parallel Distrib. Comput. 73 (2013) 1049 1065 Contents lists available at SciVerse ScienceDirect J. Parallel Distrib. Comput. journal homepage: www.elsevier.com/locate/jpdc Large-scale access scheduling

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

New Channel Access Coordination Functions in Large Scale Wireless LAN Systems

New Channel Access Coordination Functions in Large Scale Wireless LAN Systems New Channel Access Coordination Functions in Large Scale Wireless LAN Systems Lichun Bao Dept. of Computer Science, University of California, Irvine 3019 Donald Bren Hall, Irvine, California 92697-3435,

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Distributed power control over multiple channels for ad hoc wireless networks

Distributed power control over multiple channels for ad hoc wireless networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2012) Published online in Wiley Online Library (wileyonlinelibrary.com)..2266 RESEARCH ARTICLE Distributed power control over multiple

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Medium Access Control Protocols: scheduled schemes

Medium Access Control Protocols: scheduled schemes Medium Access Control Protocols: scheduled schemes Redes ad hoc Sem Fio Prof. Marco Aurélio Spohn DSC/UFCG 2009.1 Excerpt from presentation by Prof. Garcia-Luna-Aceves and Katia O. (CMPE 257 - Wireless

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

A Channel Hopping Multi-Channel MAC Protocol for Mobile Ad Hoc Networks

A Channel Hopping Multi-Channel MAC Protocol for Mobile Ad Hoc Networks A Channel Hopping Multi-Channel MAC Protocol for Mobile Ad Hoc Networks Chih-Min Chao and Hsien-Chen Tsai Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan E-mail:

More information

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks Haixia Tan, Weilin Zeng and Lichun Bao Donald Bren School of Information and Computer Sciences University of California,

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks

Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 1, JANUARY 2015 71 Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks Ting-Yu Lin, Member, IEEE, Kun-Ru Wu,

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Mitigating Deafness in Multiple Beamforming Antennas

Mitigating Deafness in Multiple Beamforming Antennas Mitigating Deafness in Multiple Beamforming Antennas Vivek Jain and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing Department of ECECS, University of Cincinnati, Cincinnati, OH 45221-0030

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Effectiveness of DSDV Protocol Under Hidden Node Environment

Effectiveness of DSDV Protocol Under Hidden Node Environment Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network

Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network ENSC 85: High-Performance Networks Spring 2008 Implementation of a Multi-Channel Multi-Interface Ad-Hoc Wireless Network Chih-Hao Howard Chang howardc@sfu.ca Final Project Presentation School of Engineering

More information

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Cross Layer Design in d

Cross Layer Design in d Australian Journal of Basic and Applied Sciences, 3(3): 59-600, 009 ISSN 99-878 Cross Layer Design in 80.6d Ali Al-Hemyari, Y.A. Qassem, Chee Kyun Ng, Nor Kamariah Noordin, Alyani Ismail, and Sabira Khatun

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

On-demand channel switching for multi-channel wireless MAC protocols

On-demand channel switching for multi-channel wireless MAC protocols On-demand channel switching for multi-channel wireless MAC protocols Priyank Porwal and Maria Papadopouli Department of Computer Science University of North Carolina at Chapel Hill {porwal, maria}@cs.unc.edu

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information