A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

Size: px
Start display at page:

Download "A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks"

Transcription

1 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua Su,Xuebing Li Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China *Corresponding author, yqinsg@gmail.com Abstract Multi-Input Multi-Output (MIMO) technology can improve the throughput of wireless networks, and many Media Access Control (MAC) protocols have been proposed to support simultaneous transmissions. But there also exist some limitations or drawbacks in those MAC protocols. They can not utilize the communication resources efficiently, such as MIMA-MAC, - MAC, etc. In this paper, we propose a MAC protocol based on dynamically adjusting the waiting time of CTS packets in MIMO ad hoc networks called -MAC. It can allocate the antenna resources optimally by dynamically adjusting the priority of CTS. The shorter the waiting time of CTS is, the higher the priority of CTS is. We analyze the performance of -MAC and evaluate it through extensive simulations. The simulation results show that -MAC can enhance the throughput of wireless networks compared with -MAC. Keywords- MIMO; MAC; throughput I. INTRODUCTION In recent years, with the rapid development of wireless communication technology, different types of wireless terminals connected to each other by way of point to point links, form Mobile Ad hoc network (MANET) [1]. However, the throughput of non-infrastructure point to point link is very low. It is well known that spectrum resources are scarce, and an effective way of improving throughput can improve the spectrum efficiency. Now Multi-Input Multi- Output (MIMO) technology is considered as a key technique for future wireless communications which can greatly increase the date rate of wireless networks without increasing transmitting power and bandwidth. However, most of the Media Access Control (MAC) protocols are based on a single antenna, and do not support the simultaneous transmissions, so these transmission strategies also do not apply to the networks using MIMO technique in physical layer. Therefore, many MAC protocols using MIMO have been proposed [2]-[9]. These protocols, using MIMO technology, can be divided into two categories generally. In the first one, they transmit the same signal, but weighted differently, out of each antenna element and exploit the array not to increase the throughput of a single transmit/receive pair but to enable reuse across pairs through proper beamforming of the MIMO links. NULLHOC [4] and SPACE-MAC [5] belong to this type of protocols. NULLHOC, which is based on MIMO type beamforming, allows multiple data streams at the same time in the same collision domain, thereby increasing overall capacity of a network. But it divides the link layer bandwidth into two separate sub-channels for data and control, which limits the link layer bandwidth. SPACE-MAC overcomes the drawback of NULLHOC, without splitting the channel into two subchannels, and performs better than NULLHOC. The main drawback of SPACE-MAC is the use of silence period. MA- MAC [6] eliminates dependence on the silence period, so it improves the throughput and delay performance. Another type of MIMO technology uses Spatial Multiplexing(SM) technology. The data is multiplexed into N distinct streams and then each stream is transmitted out of a different antenna with the same power at the same frequency. MIMA-MAC [7] uses two contention slots constituted by an slot and a CTS slot in a fixed-size frame, and is capable of simultaneous data reception from two transmitters. The main drawback of MIMA-MAC is that the stream allocation is not based on the transmission demand of neighbor nodes, and the number of transmitted streams must be half of the number of the antennas. So the transmitted stream is always not maximized. When taking into account rich link adaptation capabilities in MIMO systems, MIMA-MAC's link throughput may be lower than that of single link MAC. So Zhao [8] presents a design that can adaptively switch between single link scheme and concurrent link scheme to improve the link throughput by simultaneously guaranteeing each link's throughput to be no less than its single link scheme's counterpart. The principle of the MAC protocol with Parallel Processing (-MAC) [9] is that the receiver receives up to two continuous packets, then determines the maximum allowable number of data streams and responds with different CTS packets. It can guarantee the optimal distribution of stream. However, because the receiver of -MAC does not immediately return a CTS packet after receiving an packet, but chooses to wait for the next packet to determine the distribution of stream. In some special cases, especially in areas with high node density, -MAC cannot guarantee that the antenna resources of all nodes are utilized effectively, and some of the resources are wasted. Moreover, as technology evolves, the nodes will have more and more antennas, the optimal number of divisions will increase, while the -MAC is not able to adapt to this change well. In this paper, we propose a MIMO-based dynamic adjusting CTS waiting time MAC protocol (-MAC). It allocates the antenna resources effectively by dynamically adjusting the waiting time of CTS. Our simulation results show that -MAC has a good scalability, no matter how many antennas the nodes have and what the optimal number of divisions is, moreover it can achieve the global optimum allocation of resources, and enhance the network throughput /12/$ IEEE

2 compared with -MAC. -MAC assumes that there are four antennas on each node, the communication range of each node is one hop, that is, each node can only communicate with its neighbors, carrier sense range is two hops which means that each node can confirm whether there were nodes that are sending message in the range of two hops, and the optimal number of divisions is two. For convenience to compare with it, our proposed protocol uses the same conditions as -MAC. The rest of the paper is organized as follows. Section II discusses the motivation behind pursuing this work. Section III provides detailed description of the proposed protocol (-MAC). Section IV contains a performance evaluation. Section V we present the simulation results. Section VI is the conclusion of this paper. II. MOTIVATION Though -MAC is a MAC protocol which can enable simultaneous communications and improves the throughput of wireless networks, there also exist some drawbacks, which provide the foundations for our further study. In Fig. 1a), there are only two nodes A and B in the collision domain, the arrow indicates the direction of communication for the two nodes. Fig. 1b) shows the process of the communication, the number in the bracket denotes the number of stream allocated for some node. Node A sends an packet in the first time slot, and node B doesn't immediately return a CTS-S packet after receiving the packet, but to wait for the second packet. In the second time slot, nothing will be done due to no other transfer requests. Node B sends CTS-S packet in the third time slot, which contains the number of available flow for node A, and then node A starts to send data using four antennas. Here, it is not necessary to wait a whole time slot for node B, and it should reply a CTS-S packet in this time slot, because it means that there is no more packet that will reach in the time slot, if the backoff time has been expired. A a) Two nodes in a collision domain b) -MAC wastes one time slot c) The case that Node E is an external node B A B C D E CTS-D CTS-S DATA(2) DATA(2) ACK ACK d) Timing Diagram that conflict at Node C Figure 1. Limitations of -MAC In addition, when the node density is high and the number of nodes that have transfer request in the same collision domain becomes larger, the topology in Fig. 1c) often occurs. We can know that the optimal stream allocation is to allocate two streams for each transmitting node, that is, node A sends data to node B with two antennas, node C sends data to node D with two antennas, node E also uses two antennas to send data to node D. However, the procedure of -MAC protocol is shown in Fig. 1d). Firstly, node A and E send in the first time slot, and no interference will happen. Then, node C sends its in the second time slot. Now both node B and node D have receive two, so they will send their CTS-D or CTS-S at the same time, which contain the allocated stream number for A and C, or C and E. So the conflict will happen, which results in the case that node C can not receive the packet successfully and will not send data in next time slot. We can see that there are a total of four streams which are allocated for node A and E. In such case, -MAC protocol does not achieve the optimal allocation of data streams, which does not reach the maximum utilization of the antennas. Motivation is derived from these observations to improve resource utilization of the antennas and the throughput of the whole network. Next section will give detailed description of the proposed protocol (-MAC). III. PROPOSED PROTOCOL A) Description of protocol In this paper, we propose a MAC protocol called - MAC, and the core idea of the protocol is that it dynamically adjusts the waiting time of CTS, to change their priorities. The shorter the waiting time of CTS is, the higher its priority is. Thus, it will not distinguish and CTS time slot. When a node wants to send data, it sends an packet beforehand, and the node that receives for the first time will modify the waiting time of its CTS to the maximum backoff time of, which means that the priority of CTS is lowest. If there is no another request in the next time slot while the backoff time is expired, then the node will send CTS in this time slot, without having to wait until the next time slot, thus saving a time slot. If it receives another in the next time slot, two cases will happen. Firstly, if the packet is not sent to itself, the waiting time of CTS will be modified to, the priority of CTS will be the highest, that means at the beginning of the next time slot the node will immediately send CTS. Secondly, if the packet received is sent to itself, then the backoff time of CTS will be changed to one time slot (the priority is still higher than the node that just receives an packet, and it is higher 531

3 than the priority of ). Otherwise, the CTS priority of the node will not be changed. In addition, we should note that if the node receives a CTS packet whose priority is the highest, then it will wait a time slot to send its data, because other nodes will send CTS in this time slot. In the example below, we will illustrate this point. For other conditions, the nodes will send their data in the next time slot while receiving CTS without waiting a time slot. After sending the data, the order to send ACK is as follows: the priority of ACK is higher than, but according to the priority of CTS packet, the priority of ACK is also different. The higher the priority of CTS is, the lower the priority of ACK is. B) Examples of protocol operation -MAC protocol is suitable for various network topologies. It can perform well in the topologies where - MAC performs badly. Here are some examples. Through them, we can know how the -MAC operates and why it works better than -MAC. 1) Different collision domains, same receiving node: There are two different transmission requests to the same receiving node in different collision domains, as shown in Fig. 2a). Node A sends after the backoff time randomly selected. Node B adjusts its CTS backoff time to the maximum backoff time after receiving the. And then, Node C sends a packet in the second time slot. Node B adjusts its CTS backoff time to one after it receives the second packet, and sends CTS in the next time slot. The CTS packet contains IDs of node A and node C and their maximum number of available flows. Then node A and C will send data at the beginning of the next time slot. Finally, node B will send an ACK packet. a) Topology for the example b) -MAC timing diagram Figure 2. Different collision domains, same receiving node 2) Different collision domains, different receiving nodes: This is a more complex situation, as shown in Fig. 3a). This example explains why node A should wait a time slot while it receives the CTS from B, this issue mentioned in the previous section. The procedure for this communications is shown in Fig. 3b). a) Topology for the example b) -MAC timing diagram Figure 3. Different collision domains, different receiving nodes According to the protocol, node A first selects a random number of backoff time slots, after that, sends a packet, only node B receives this, and node C only senses that a node is sending data but cannot successfully receive. While node B receives the, it adjusts its CTS waiting time to the maximum backoff time. Then node C sends a in the next time slot and this is successfully received by node B and node D. When node D receives this, it adjusts its CTS waiting time to the maximum backoff time. When node B receives the, it adjusts its CTS waiting time to. In the third slot, node B first sends CTS, and node D sends CTS in the next time slot. These CTS packets contain the allocated stream number for each node, respectively. Then, node A and C send data at the same time in the next time slot. Note that if node A does not wait a time slot, node A and C can not be coordinated. At the end of transmission, node D sends ACK first, and in the next time slot node B also sends an ACK. These topologies have been resolved by the protocol - MAC, and also gain the optimal flow allocation in the whole networks. When node density increases, -MAC cannot achieve the optimal allocation, but our proposed protocol can also achieve the optimal flow allocation. For the topology shown in Fig. 1c), -MAC does not work well, but our proposed protocol can get better performance. In Fig. 1c), nodes A, C and E have communication requests. Node A and E first send in the first time slot and there is no interference. Node B and D both receive one packet, so they adjust their CTS waiting time to the maximum backoff time, and then node C sends a in the next time slot. At this time, node B adjusts its CTS waiting time to ; node D adjusts its CTS waiting time to one time slot. So in the next time slot, node B has a higher priority. It sends CTS first, and node D sends CTS in the next time slot. It should be noticed that node A should send data after waiting a time slot when it received node B's CTS, we have explained it above. Finally node D and B will reply ACK respectively. We can see that there are a total of six parallel data flows and it gains the optimal flow allocation in the whole networks. 532

4 The probability that some node successfully sends packets in some time slot when there are z nodes which want to send packets simultaneously is 3 z n 1 z 1 (3) Pss ( z) = z((1 p ) ) p (1 p ) n 1 sl sl = sl Figure 4. Procedure for -MAC in the topology shown in Fig. 1c) C) Data frame format of -MAC Fig.5 shows the frame format of -MAC. The difference between -MAC and -MAC is that we no longer distinguish and CTS time slot, all named as contention time slot. The competition includes not only the competition between and, but also between and CTS. In each control slot, nodes can send or CTS. This is implemented by dynamically adjusting CTS waiting time to change the priority of CTS. These mini time slots are used to avoid the collision of, CTS, etc. The use of time slots in -MAC is more flexible than that in -MAC, and it reinforces competition between and CTS. Backoff Mini slots 1 -MAC Frame Backoff Mini slots 2/CTS1 2/CTS1 -MAC Frame 2/CTS1 Backoff -MAC Frame DATA ACK1 ACK2 Contention Contention Contention Contention DATA slot ACK slot Slot1 Slot2 Slot3 Slot4 Figure 5. Data frame format of -MAC IV. PERFORMANCE ANALYSIS In this section, we present the performance analysis of -MAC protocol. We first make the following assumptions: the number of nodes is fixed [1], the channel is ideal (packet transmission won't be failure caused by the noise), and at any moment the sending queues of all nodes are not empty, which means that any node always has data to be transmitted, and the probability that each node sends packet per time slot isτ. In addition, we also assume that each node has four antennas, and the largest number of divisions is two. Based on above assumptions, we can easily obtain the probability that no packet will be sent in one time slot in the case of n nodes is P ( n) = (1 τ ) n (1) idle The probability that there are z nodes sending packets in some time slot is z n z z () = (1 ) (2) P send z C n τ τ Where n is the total number of the nodes. Where mini-slot. psl is the probability that a node sends packets in a So using (2) (3), we can obtain the probability P s that a node sends packets successfully in a time slot. n Ps ( n) = P ( z) Pss ( z) z = 1 send Therefore, we can approximately describe the number of divisions, and we use P (1) and P(2) to represent the probability that the number of the divisions is one or two respectively. (4) P(1) = Ps ( n)( P idle ( n 1) + (1 Ps ( n 1))) (5) P(2) Ps ( n) Ps ( n 1) = (6) In addition, the probability that in a time slot there are no nodes sending packets or the transmission fails is p fault P fault = P idle ( n) + (1 Ps ( n)) (7) Based on the above derivation, we can easily calculate the system throughput, using S to represent the system throughput, then E[The average size of transmission load in unit time slot] (8) S = E[The average length of time slot] It means that system throughput is equal to the expected value of load information size transmitted in unit time slot [11]. We use E 1 ( P ) and E ( P) to denote the average size of payload 2 when the division is one or two respectively, σ to denote the slot time, T 1 and 2 s T to denote the time that packet is s successfully sent for different divisions, then we can obtain: (9) S P (1) E 1 ( P ) + P ( 2 ) E 2 ( P ) = 1 2 P fa ult σ + P (1 ) Ts + P ( 2 ) Ts V. SIMULATION RESULTS In this section, we evaluate our protocol through extensive simulation in MATLAB and give the performance comparison of -MAC and -MAC in different topologies. The main parameters of protocol are summarized in Table I. According to the formula (9) and the parameters which are in Table I, we can calculate the throughput and the result is shown in Fig.6. We can find that with the interval of sending packet decreasing, the throughput of the entire network rises sharply at the beginning. The reason for this phenomenon can be explained as follows. While the interval of sending packet is long, the packets sent into the network are fewer, so the throughput is lower. But with the interval decreasing, the 533

5 packets sent into the network increase and so the throughput gets higher. TABLE I. PARAMETERS USED IN SIMULATION Parameter Value Parameter Value Packet 228bytes Channel Bit Rate 2Mbit/s payload MAC header 272bits Propagation Delay 5μs PHY header 128bits Slot Time 2μs Throughput (kbps) Throughput ()kbps) ACK bytes+PHY header 24bytes+PHY header ACK_Timeout CTS Figure 6. Performance of -MAC protocol μs 24bytes+PH Y header MIMA Figure 7. The comparison of three protocols in the first topology (as shown in Fig.1a)) As shown in Fig. 7, it is the comparison with the - MAC, MIMA-MAC and -MAC protocol in the topology shown in Fig. 1a). Compared with MIMA-MAC, a major improvement of -MAC is that when there is only a pair of nodes transmitting data within the collision domain, MIMA-MAC can only use half of the antennas to send data, which wastes another half antenna resource, and -MAC can use the entire antenna resources to transmit data in this situation. Therefore, the throughput is greatly improved compared with MIMA-MAC. -MAC is an improvement of -MAC, aimed at the shortcoming that -MAC must wait an empty time slot. So the throughput of -MAC is also greatly improved. In Fig.7, the abscissa denotes the packet sending interval; the ordinate denotes throughput. Decreasing the packet sending interval indicates that the packet sending rate increases. When sending a packet every ms, the throughput of three protocols is the same, and it is relatively small. Because at this time there are only a few packets sent into the network, basically they do not conflict or lose. Similarly, the throughput of three protocols is the same until the interval of 1ms. Starting from 1ms, as the packet sending rate increases, the efficiency of MIMA-MAC declines obviously, the reason for the decline is MIMA-MAC can only use two antennas to send data in this topology, it takes more time to send the same size packet, therefore, in the same time, the number of packets sent is much less than the other two protocols, and the throughput is also much smaller. The throughput of -MAC is almost same as -MAC until the time of 5ms, but when the packet sending intervals are more frequent, the maximum throughput of -MAC achieves 3.5Mbps, while the maximum throughput of -MAC can achieve 3.7Mbps. The reason is that -MAC will not waste a blank slot, therefore, the average length of a frame is shorter, that is, more packets will be sent per unit time, and the throughput will be greater. Troughput ()kbps Figure 8. The performance comparison between -MAC and - MAC (for the topology shown in Fig.2a)) Thoughput ()kbps Figure 9. The performance comparison between -MAC and - MAC(for the topology shown in Fig.3a)) For the topology shown in Fig. 2a) and the topology shown in Fig. 3a), -MAC has achieved the maximum antenna utilization, at this moment, -MAC maintains this efficiency. As shown in Fig. 8 and Fig. 9, in the topology 534

6 shown in Fig. 2a), the maximum throughput of the entire network can achieve 4.413Mbps; in the topology shown in Fig. 3a), the maximum throughput of the entire network can achieve 3.785Mbps and the performance of these two protocols are the same. In the topology shown in Fig. 1c), if there is no external node E as interference node, the performance of -MAC and -MAC are the same. However, if there is an external interference from node E, -MAC will fail. In this case, -MAC results in wasting part of antenna resources after receiving CTS. But -MAC will still be able to maximize the use of antenna resources. That is, in this network topology, the existence of such an interference node E will result in only two antennas being used to send data by - MAC, which the overall throughput reduces by half. Nevertheless, -MAC still can guarantee the performance unchanged, as shown in Fig. 1. Throughput (kbps) Throughput (kbps) Figure 1. The performance of -MAC and -MAC (for the topology shown in Fig.1c)) Figure 11. The performance comparison between -MAC and - MAC in the average situation However, in the actual network structure, the probabilities of various topologies are random. If simply considering the probability of all the four topologies is the same, the average throughput of -MAC and -MAC is shown in Fig. 11. As shown in Fig. 11, with the sending packet interval decreasing, the throughput of these two protocols is gradually increasing and the throughput of -MAC is always higher than -MAC. That is, in some topologies, - MAC has better performance; in other topologies, - MAC maintains the same performance as -MAC. The performance of -MAC will not be worse than - MAC, so it means that the overall performance of - MAC is better than that of -MAC. In the case of the probabilities of all topologies are equal, the best throughput of -MAV can achieve 3.762Mbps, while the best throughput of -MAC can only achieve 3.31Mbps. VI. CONCLUSION In this paper, we have proposed a MAC protocol based on dynamically adjusting the waiting time of CTS packet for MIMO ad hoc networks called -MAC, which can make the allocation of antenna resources more rational, and can improve the performance of wireless networks in some topologies where -MAC cannot make full use of the antenna resources. Our simulation results show that - MAC has a higher throughput, and can optimally allocate antenna resources in any topologies. REFERENCES [1] S. Corson and J. Macker, Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation consideration, IETF RFC251, Jan, [2] K. Sundaresan, R. Sivakumar, M. A. Ingram and T.-Y. Chang, Medium access control in Ad Hoc networks with MIMO links: optimization considerations and algorithms, IEEE Transactions on Mobile Computing, vol.3, no.4, pp , Oct.-Dec. 24. [3] J. S. Park and M. Gerla, MIMOMAN: a MIMO MAC protocol for Ad Hoc networks, 4th International Conference on Ad Hoc Networks and Wireless (AD HOC NOW 25), pp.27-22, Oct. 25. [4] J.C. Mundarath, P. Ramanathan and B.D. Van Veen, NULLHOC: a MAC protocol for adaptive antenna array based wireless Ad Hoc networks in multipath enviroments, In Proceedings of IEEE GLOBECOM 24. [5] J. Park, A. Nandan, M. Gerla, and L. Heechoon, SPACE-MAC: enabling spatial reuse using MIMO channel-aware MAC, IEEE ICC 25, 25. [6] D.J. Dechene, K.A. Meerja, A. Shami, S. Primak, A novel MIMO- Aware distributed media access control scheme for IEEE wireless local area networks, Local Computer Networks, 27. LCN 27, pp [7] M. Park, S.H. Choi and S.M. Nettles, Cross-layer MAC design for wireless networks using MIMO, Proceeding of GLOBECOM 25, vol.5, pp , Nov.-Dec. 25. [8] P.K. Zhao, B. Daneshrad, An optimal single/concurrent link MAC scheme for a single-hop MIMO network, MILITARY COMMUNICATIONS CONFERENCE, 211. [9] M. Shirasu and I. Sasase, "A MAC protocol for maximum stream allocation depending on the number of antennas and received packets in MIMO ad hoc networks," in Proc. IEEE International Conference on Communications, pp , June 27. [1] IEEE standard for wireless LAN medium access control (MAC) and physical layer (PHY) specifications, Nov P [11] G. Bianchi, Performance analysis of the IEEE distributed coordination function, IEEE Journal on Selected Areas in Communications, Vol. 18, March

Performance Evaluation of MIMO-Aware Media Access Control Protocol

Performance Evaluation of MIMO-Aware Media Access Control Protocol 1 Performance Evaluation of MIMO-Aware Media Access Control Protocol Dan J. Dechene, Student Member, IEEE, Khalim Amjad Meerja, Student Member, IEEE, and Abdallah Shami, Member, IEEE Abstract Multiple-Input

More information

Improving Performance of TCP with Efficient MIMO-based MAC

Improving Performance of TCP with Efficient MIMO-based MAC Improving Performance of TCP with Efficient MIMO-based MAC Ankit Jindal and Anirudha Sahoo Department of Computer Science and Engineering Indian Institute of Technology, Bombay, Powai, Mumbai, India 400076.

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Physical Communication. Performance evaluation of MIMO-aware media access control protocol

Physical Communication. Performance evaluation of MIMO-aware media access control protocol Physical Communication 2 (2009) 204 216 Contents lists available at ScienceDirect Physical Communication journal homepage: www.elsevier.com/locate/phycom Full length article Performance evaluation of MIMO-aware

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS

MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS Soon Y. Oh*, Mario Gerla*, Pengkai Zhao**, Babak Daneshrad** *Computer Science Department, **Electrical Engineering Department University

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks XinMing Zhang, Guoqing Qiu,

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS

PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS PNC BASED DISTRIBUTED MAC PROTOCOL IN WIRELESS NETWORKS Gowdara Rajasekhar Gowda 1, Dr. B R Sujatha 2 1MTech (DECS) student, E&C Dept, Malnad College of Engineering, Karnataka, India. 2Associate professor,

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

MIMO AND TCP: A CASE FOR CROSS LAYER DESIGN

MIMO AND TCP: A CASE FOR CROSS LAYER DESIGN MIMO AND TCP: A CASE FOR CROSS LAYER DESIGN Soon Y. Oh, Mario Gerla Computer Science Department, University of California, Los Angeles Los Angeles, CA 995-1596 USA {soonoh, gerla}@cs.ucla.edu and Joon-Sang

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Mitigating Deafness in Multiple Beamforming Antennas

Mitigating Deafness in Multiple Beamforming Antennas Mitigating Deafness in Multiple Beamforming Antennas Vivek Jain and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing Department of ECECS, University of Cincinnati, Cincinnati, OH 45221-0030

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

A Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network

A Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network A Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network Yuan LIU 1, Yuhao WANG* 1, Siyue CHEN 2, Xiao LI 1 and Zhengfa RAO 1 1 Department of Electronic and Information Engineering,

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

LANCOM Techpaper IEEE n Overview

LANCOM Techpaper IEEE n Overview Advantages of 802.11n The new wireless LAN standard IEEE 802.11n ratified as WLAN Enhancements for Higher Throughput in september 2009 features a number of technical developments that promise up to six-times

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Medium Access Control Protocols: scheduled schemes

Medium Access Control Protocols: scheduled schemes Medium Access Control Protocols: scheduled schemes Redes ad hoc Sem Fio Prof. Marco Aurélio Spohn DSC/UFCG 2009.1 Excerpt from presentation by Prof. Garcia-Luna-Aceves and Katia O. (CMPE 257 - Wireless

More information

Efficient Power MAC Protocol in Ad-hoc Network s

Efficient Power MAC Protocol in Ad-hoc Network s Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Distributed power control over multiple channels for ad hoc wireless networks

Distributed power control over multiple channels for ad hoc wireless networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2012) Published online in Wiley Online Library (wileyonlinelibrary.com)..2266 RESEARCH ARTICLE Distributed power control over multiple

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols

Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols Effect of Turn-Around Times on the Performance of High Speed Ad-hoc MAC Protocols Ajay Chandra V. Gummalla and John O. Limb Georgia Insitute of Technology, Atlanta GA 30332, USA Abstract. Many random access

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

On the Optimizing of LTE System Performance for SISO and MIMO Modes

On the Optimizing of LTE System Performance for SISO and MIMO Modes 2015 Third International Conference on Artificial Intelligence, Modelling and Simulation On the Optimizing of LTE System Performance for SISO and MIMO Modes Ali Abdulqader Bin Salem, Yung-Wey Chong, Sabri

More information

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information