RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks
|
|
- Lindsey Harrell
- 5 years ago
- Views:
Transcription
1 RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks Weisheng Si, ws4u@cs.virginia.edu Huafeng Lü, hl3d@cs.virginia.edu Dec 6th, 00 1 Introduction In most of the MAC protocols for wireless ad hoc networks today, no reliable multicast service is provided. For example, IEEE 80.11[5], the most widely used MAC protocol at present, only supports reliable unicast with the RTS/CTS/DATA/ACK scheme; while for broadcast or multicast frames 1, it simply performs one transmission of them without any reliability guarantee. In this report, we propose a new MAC protocol called RMAC which provides reliable multicast service to the upper layer. Our propose of this new protocol with reliable multicast support is mainly based on the following observations. First, we notice that multihop multicast communication in wireless ad hoc networks needs reliable multicast service from the MAC layer. Recently, many network layer multicast protocols have been proposed. They can be largely classified into two categories tree-based multicast protocols([4, 9, 14, 1]) and meshbased multicast protocols([7, 3]). However, people find out both of the two kinds of approaches have serious problems if high reliability is needed by the multicast communication. In tree-based multicast protocols, no matter how the tree is built in different protocols, they all eventually use a tree to do multicast. And it is shown by some research works[3, 8] that multicasting with a tree in wireless networks suffers from severe packet loss due to the unreliable wireless channel and the lean connectivity of the tree. An illustration of this problem is given in Figure 1, which shows that if one node in the multicast tree, say node B, does not receive the packet, then all its children can not receive the packet, thus resulting in significant packet loss. R A B C I D E F G H Figure 1: Problem of multicasting with a tree. 1 To comply with the terminology of the IETF and IEEE standards, we call the protocol data units in the network layer packets and those in the MAC layer frames in this report. 1
2 Trying to solve the above problem, people move on to the mesh-based multicast protocols which forward multicast packets along a mesh. In a mesh, there usually exist more than one node sending packets to an arbitrary node, thus increasing the chance that a node can get the packets. However, this class of protocols are inefficient since they introduce redundant packet transmissions and nodes in the multicast group have to memorize previous packets to avoid sending duplicate packets to the upper layer. As shown above, we believe that solely working on the network layer can not provide highly reliable multicast for wireless networks in an efficient way, i.e., multicast reliability support is needed from the MAC layer. Second, in the perspective of functionality provision at different protocol layers of wireless networks, MAC layer is the correct place to put the reliability functionality. In wired networks, the links almost have no loss and errors. So reliability functionality is usually implemented at the end-to-end level in the transport layer(e.g., TCP), since it is not worth to do recovery at each hop that the packets pass through. However, in wireless networks, the links are prone to have loss and errors, which makes local recovery mechanism worth to be performed. In [], it is shown that adding local recovery mechanism at the MAC layer can greatly improve the end-to-end communication performance in case of unicast. Here we believe that providing the reliable multicast functionality at the MAC layer will produce the same effect, which is justified by our later simulations. The rest of the report is structured as follows. Section describes other research works that providing reliable multicast service at the MAC layer. Section 3 presents our RMAC protocol in detail. Section 4 describes how the RMAC is implemented under GloMoSim. Section 5 presents our evaluation results on the RMAC protocol. Finally, section 6 concludes this report. Related Works As far as we know, only two reliable multicast MAC protocols have been proposed up to now. One is called Broadcast Medium Window(BMW) protocol[11] and the other is called Batch Mode Multicast MAC protocol[10]. Both of them provide reliable broadcast or multicast functionality by modifying the IEEE DCF(Distributed Coordination Function) mode. BMW mainly considers supporting reliability for broadcast. The basic idea of BMW is that a node reliably transmit a broadcast frame to each of its neighbors in a round robin fashion. The neighbor list is obtained by both periodical HELLO messages and overhearing. Once a frame other than HELLO message is transmitted by a node, the node will suppress its next HELLO message, assuming neighbor nodes can know its presence by overhearing this frame. The main drawback of BMW is that it uses at least rounds of unicasts for a broadcast frame destined to its neighbors, which not only introduces at least rounds of contention phases but also takes no utilization of the broadcast nature of the wireless channel. Considering the problem of BMW, BMMM proposes to consolidate the contention phases of BMW into one contention phase and transmits the data only one time before the ACK collecting. To transmit a reliable multicast frame in BMMM, a sender first uses its RTS frames to request intended receivers one by one to reply with a CTS. If the sender receives at least one CTS, it transmits the data frame. After the data frame transmission, it uses a new control frame called RAK(Request for ACK) to request ACKs from the intended receivers one by one. In case of missing ACKs, the sender will do retransmission. All the intervals between the above sequence of frames are set to a value less than DIFS, so once the sender grabs the channel, the reliable multicast operation will not be interrupted by other transmissions. Here we point out some drawbacks of the BMMM. First, it introduces rounds of RTS/CTS exchange and RAK/ACK exchange, in which any missing of the frames will cause retransmission. Second, though the four control frames have short length, other overheads of transmitting a frame in the wireless physical layer is high. For example, in IEEE specification, if the DSSS physical layer is used, the preamble
3 length for a frame is 144 micro-seconds and the PLCPHeaderLength is 48 micro-seconds. So we believe using large number of control frames is also not efficient. The RMAC protocol proposed in this report is designed to overcome the drawbacks of the two aforementioned protocols. Since in the BMMM paper it is shown that BMMM is better than BMW, we are planning to give a comparative evaluation of RMAC and BMMM in the future. 3 The RMAC Protocol 3.1 RMAC Overview Due to the inefficiency of realizing reliable multicast with the RTS/CTS like mechanism, we turn to another mechanism called busy tone to achieve the multicast reliability. Busy tone is simply a radio signal transmitted via a narrow-bandwidth channel other than the data channel. The busy tone mechanism is used in several other research works such as [1], [13], and [6]. In [1], the busy tone is used to solve the hiddenterminal problem in the wireless environment where there is a central base station. In [13], the busy tone is also used to solve the hidden-terminal problem, but in an ad hoc wireless environment. In [6], the busy tone used by [13] is kept and another busy tone is added to eliminate the exposed-terminal problem for the RTS transmission, so that both the hidden-terminal and the exposed-terminal problems are solved. It is a general belief that the hardware for a busy tone is very cheap to be equipped. In our RMAC protocol, we also introduce two busy tones in order to realize reliable multicast. We call one busy tone RBT(Receiver Busy Tone), and the other one ABT(Acknowledgement Busy Tone). Basically, we use RBT the same way as [13] and [6] to solve the hidden-node terminal problem, guaranteeing collisionfree data reception. The main idea of RBT is that before receiving a frame in a transmission, the receiver sets up the RBT, whose sensing range is the same as the sensing range of the data channel. Nodes(except the sender) in the sensing range of the receiver shall not start frame transmission or abort their current frame transmission once the RBT is sensed(see Figure ). In this way, the frame transmission to the receiver is guaranteed to encounter no collisions, thus greatly reducing the retransmissions.. S text R can not transmit A Figure : The Basic Idea of Receiver Busy Tone. As a novel use of busy tone, we use the ABT to acknowledge the frame reception. Since the ABT is only a signal, the sender has to no way to tell which node the ABT comes from. So we use a control frame(still called RTS frame) to specify an order of replying ABTs by the multicast receivers. The format of the RTS frame is shown in Figure 3. The ABT from each receiver has the same duration and is expected by the multicast sender at a pre-calculated time slot. For each receiver, it determines its time slot to respond with the ABT according to the order specified in the preceding RTS frame. Using ABT to do acknowledgements mainly has the following two advantages: (1) As a signal, ABT does not need the preamble or PLCP header 3
4 as a frame does, so it can be very short and () ABT does not have the collision or bit error problems suffered by a frame. SRC ADDR # RECEIVERS ADDR 1 ADDR ADDR Figure 3: Format of The RTS Frame in RMAC. Here ADDR1, ADDR,..., are a list of the receiver addresses. As described above, the main idea of our RMAC protocol can be summarized as follows: 1. The mechanism of realizing reliable multicast in RMAC altogether needs the following: a flexiblelength RTS frame containing an address list of the intended multicast receivers, Receiver Busy Tone, and Acknowledgement Busy Tone.. The multicast sender uses the RTS frame to specify an order for the intended receivers to reply with an ABT which is a very short signal. 3. The intended receivers getting the RTS set up the RBT to guarantee the collision-free data reception, thus reducing the number of retransmissions. 3. RMAC Description Generally, the RMAC protocol provides two data transmission service primitives to the upper layer. We call them Reliable Send and Unreliable Send respectively: Reliable Send It has the form reliable-send(payload, receiver list). Here payload is a protocol data unit from the upper layer to be encapsulated in a reliable data frame and receiver list is an address list of the intended receivers. This service primitive guarantees the reliable transmission of payload to the listed receivers for the upper layer unless the number of retransmissions exceeds the limit. Since in a reliable transmission the sender needs to know who are its receivers, this service primitive requires the address list of the receivers be passed from the upper layer, giving MAC layer the flexibility to support various kinds of upper layer protocols. Note that this service primitive covers the case of reliable unicast if only one receiver is specified in the receiver list and the case of reliable broadcast if all neighbors of a node is specified in the receiver list. Unreliable Send It has the form unreliable-send(payload, dst). Here payload is a protocol data unit from the upper layer to be encapsulated in a unreliable data frame and dst is a destination address which has three forms a unicast address, a multicast address, and a broadcast address. This service primitive only transmits payload one time to dst without any recovery mechanism. Note that we provide this service primitive in the RMAC protocol is because many upper layer protocols need a light-weight transmission service when reliability is not a big concern. For example, periodical one-hop broadcasting usually should be performed by this service primitive. In the following two subsections, we present how these two service primitives are realized in the RMAC protocol. 4
5 3..1 The Reliable Send Service Primitive The following concepts or symbols are used in the Reliable Send service primitive description: : The maximum one-way propagation delay. : The duration needed to detect a busy tone. : The timer for waiting for RBT after the RTS transmission. Its length is set to. : The timer for waiting for the reliable data frame after turning on the RBT. Its length is set to. : The location index of an intended receiver in the address list of the RTS frame. For example, the first receiver listed in the RTS frame has "!, and the second receiver has $#, etc. % : The timer for responding with an ABT after the successful data frame reception. Its length % is set to '&)(+*,.-. / : The timer for sensing an ABT at the sender. is initially set to *, right after the data frame transmission for sensing the first ABT and afterwards / is reset to *, 0 at each / expiration for sensing the subsequent ABTs. As mentioned above, this service primitive takes the payload to be transmitted, and the list of intended receivers as input parameters from the upper layer. After receiving such a request from the upper layer, it mainly performs the following steps (illustrated in Figure 4): A-BT Receiver-BT Node B RTS DATA Node A RTS 3 DATA A-BT A-BT Node C RTS DATA Receiver-BT A-BT Figure 4: Time Diagram of Reliable Send Service Primitive. 1. The sender senses both the data channel and the RBT channel. If both of them are idle, it transmits an RTS which contains a list of the addresses of the intended receivers. If either of them is not idle, the sender backs off. 5
6 . Upon receiving an RTS, a node checks if it is one of the intended receivers by looking at the address list in RTS. If it is, it memorizes its index in the RTS address list and turns on the RBT. The RBT has two usages here: one is to tell the sender that some node has received the RTS and the other is to guarantee collision-free data reception at the receiver as illustrated in Subsection If a node which is transmitting an RTS frame or an unreliable data frame senses the RBT during its transimission, it should abort its on-going transmission, ensuring no collisions at the node setting up the RBT. Here we note that this abortion seldom happens, since the only chance is that the interrupted node starts its RTS or unreliable data transmission in a very short interval approximately between the time the RBTing node receives the RTS and the time the interrupted node detects the RBT. 4. After transmitting RTS, the sender sets up the timer.. If RBT is sensed before expires (note that the sender only needs to tell whether at least one RBT is on), it transmits the payload in a data frame upon the timer expiration. Otherwise, the sender backs off upon the timer expiration. Here we set the timer period 1, which is because 1 is the safe time required to allow other RTS or unreliable data transmissions which may interfere this transmission to be aborted. 5. After turning on the RBT, the intended receiver sets up the timer If the data frame arrives before 4 expires, it cancels the timer. Otherwise it stops the RBT upon the timer expiration. If the data frame is correctly received, it immediately turns off the RBT and sets up the timer 5%. Here % is set to 6&)(+*,.-. When % expires, it turns on the ABT for duration *,. 6. After the data frame transmission, the sender sets up the timer / with / 7*, to sense the first ABT and afterwards a new / for later ABTs will be set at the beginning of previous / expiration with / 8*, 9$. So the sender senses each ABT from the intended receivers for a time slot with length *, :;. If in th slot an ABT is not sensed, the sender assumes that the th receiver in the RTS address list does not receives the data frame. After the sensing of the last ABT, if all intended receivers have responded with an ABT, the sender yields for a period so that other nodes may have chance to transmit. Otherwise, the sender constructs a new RTS frame which contains those receivers failing to respond with an ABT and repeats from step 1. Compared with IEEE based reliable multicast solutions, the RMAC Reliable Send service primitive is simple in the following two ways. First, unlike the RTS frame in IEEE 80.11, the RTS frame in RMAC does not have a duration field. This is because data frame reception is protected by the RBT so that NAV no longer needs to be maintained by the wireless nodes. Second, since ABT does not has the problem of collisions or errors, the reception of transmitted ABT is almost guaranteed. So there is no need to put sequence numbers in the data frames and nodes do not need to memorize the sequence number of the previously received data frame. 3.. The Unreliable Send Service Primitive The Unreliable Send service primitive is introduced for protocol operations in which reliability is not necessary. As mentioned in Subsection 3.1, this service primitive takes the payload to be broadcast and the destination address dst as the parameter passed from the upper layer. The basic protocol steps of the Unreliable Send service primitive is described as follows: 1. The sender senses both the data channel and the RBT channel. If both of them are idle, the sender encapsulates the payload into a unreliable data frame in which the destination address field is set to dst. Then it transmit this frame. If either of two channels is not idle, the sender backs off. 6
7 . During the transmission of a data frame, the sender keeps listening to the RBT channel. If RBT is sensed, it will abort the on-going transmission without performing retransmission in the future. 3. Upon correctly receiving a unreliable data frame, a node checks the destination address field in the frame. If it should accept this frame, it decapsulates this frame and passes the payload to the upper layer, without replying an acknowledgement to the sender. Otherwise, it discards the frame RMAC State Transition Combining the implementation of Reliable Send and Unreliable Send service primitives in RMAC, a node in RMAC protocol is running in one of the following nine states: IDLE: Upper layer has no packets to send. BACKOFF: Upon a busy data channel or RBT channel, the node waits for a random period before next contending for the channel. YIELD: After a successful data frame transmission, the node waits for a fixed period so that other nodes have chances to transmit. WF RBT: After the transmission of the RTS frame, the node waits for the RBT to arrive. WF RDATA: After turning on the RBT, the node waits for the reliable data frame to arrive. WF ABT: After the transmission of the reliable data frame, the node waits for the ABT to arrive. TX RTS: The node is in the process of transmitting an RTS frame. TX RDATA: The node is in the process of transmitting a reliable data frame. TX UNRDATA: The node is in the process of transmitting a unreliable data frame. The state transition diagram and the state transition conditions are shown in Figure 5. 4 RMAC Implementation The RMAC protocol is implemented and evaluated under GloMoSim[15], a widely used simulator for wireless networks today. GloMoSim has a very well-organized framework for developing new protocols. It is structured with a layered architecture which consists of five layers-physical layer, MAC layer, network layer, transport layer, and application layer. At each layer, well-defined interfaces make it easy to add new protocols. An advantage of GloMoSim is that it supports multiple network interfaces at a node, which exactly satisfies the multiple-interface requirement of our RMAC protocol. In the implementation of RMAC, each node is initiated with three interfaces and we use one interface as the data channel and the other two interfaces as the RBT channel and ABT channel respectively. The programming tasks for the RMAC implementation include: (1) Implementing a physical layer for the busy tone channel. () Implementing the RMAC protocol. The programming tasks for the RMAC evaluation include: (1) Implementing an application called FLOOD which sends CBR(Constant Bit Rate) traffic to the entire network by flooding and each node only forwards a packet one time. 7
8 WF_RBT C3 TX_RDATA C4 WF_ABT C no BT fail success TX_RTS abort BACKOFF YIELD C1 busy timeout C6 C6 abort C5 IDLE C6 C7 WF_RDATA TX_UNRDATA C8 C9 Figure 5: The State Diagram of The RMAC Protocol. Some state transition conditions are listed as follows. C1: Upper layer has reliable data to send and both the data and RBT channels are idle. C: An RTS frame is transmitted. C3: RBT is sensed before <>=@? ABDC expires. C4: A reliable data frame is transmitted. C5: An unreliable data frame is transmitted. C6: An RTS frame for the node is received. C7: An reliable data frame is received. C8: Upper layer has unreliable data to send and both the data and RBT channels are idle. C9: The period of yielding ends. () Implementing an application called TREECAST which sends CBR traffic to the entire network along a existing tree. The usage of the FLOOD and TREECAST applications will be described in Subsection Evaluation We evaluate the RMAC protocol based on our implementation of it under the GloMoSim. We mainly focus on two aspects of the RMAC in our evaluation. One is the level of reliability it achieves and the other is the overhead introduced for providing reliable multicast. 5.1 Experiment Setup The network used in our evaluation contains 75 wireless nodes which are randomly placed on a FE!HGI& *HJ,!HG plain. The communication range of all nodes is set to K!ML *,!HG. Basically, we use the network-wide broadcast, a special case of multihop multicast, to evaluate our RMAC protocol. With RMAC as the underlying MAC protocol, we run the TREECAST application over a tree covering all the 75 nodes in the network. The CBR traffic rates used in our evaluation are 5 pkts/sec, 10 pkts/sec, 0 pkts/sec,..., and 60 pkts/sec, with packet size 600 bytes. We call this kind of experiment TREE-RMAC in the later description. An example tree topology used in our evaluation is shown in Figure 6. To make a comparison, we also run two other kinds of experiments with the same parameters set as those in TREE-RMAC experiments: (1) running the FLOOD application with IEEE DCF mode as the underlying MAC protocol and () running the TREECAST application with IEEE DCF mode as the underlying MAC protocol, using the same tree topology as TREE-RMAC. We call these two kinds of experiments FLOODING and TREE-DCF respectively. 8
9 Figure 6: An Example Network Tree Topology. 5. Reliability We define the successful packet delivery rate (denoted by N ) as N total number of packets received by all nodes total number of packets that should be received by all nodes (1) We use N as an important metric both for measuring the reliability of the RMAC protocol and for making comparisons with FLOODING and TREE-DCF. Figure 7 plots the experiment results of the TREE-RMAC, FLOODING, and TREE-DCF experiments. From this figure we see that Almost equal to one, N of TREE-RMAC is much higher than N of FLOODING or TREE-DCF. N of FLOODING degrades quickly with the increasing of the traffic rate. N of TREE-DCF is the lowest due to the problem illustrated in Figure Overhead In evaluating the overhead of RMAC, we mainly measure the following total number of frames sent to the channel, average number of retransmissions per packet, and total number of frames dropped. In the overhead experiments, the source node of TREE-RMAC, FLOODING, or TREE-DCF altogether generates 10 packets. And the tree topology used by TREE-RMAC and TREE-DCF has 44 leaf nodes, which means that all nodes can get the 10 packets with ideally 310 ( ( K EPO H -1&Q#R! ) transmissions at the non-leaf nodes. Figure 8 plots the total number of frames sent to channel by experiments TREE-RMAC, FLOODING, TREE-DCF, and the ideal value of 310 frames. Note that we only count the data frames here. From this figure we see that (1) FLOODING sends the most number of frames to the channel, introducing significant overhead to the network capacity, () TREE-RMAC only sends slightly more than the ideal number of frames to the channel, showing its overhead is very limited, and (3) TREE-DCF sends less than the ideal number of frames to the channel due to its severe packet loss. 9
10 Successful Packet Delivery Rate TREE-RMAC FLOODING TREE-DCF Source Traffic Generating Rate(pkts/s) Figure 7: Deliver Rate. Figure 9 plots the average number of retransmissions per packet for TREE-RMAC. From this figure we see that the absolute value of average retransmissions is quite small, though it is increasing with the rising of the traffic rate. So we can draw the conclusion that retransmission does not cause significant overhead in RMAC. Figure 10 plots the total number of packets dropped during the TREE-RMAC experiments. From this figure we see that the number of packets dropped is very small, arguing for the strong reliability of the RMAC protocol. According to our observation of the experiments, all packet droppings are caused by the phenomenon that the number of retransmissions exceed the limit, which is set to 8 in our experiments. 6 Conclusion References [1] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade. Amroute: Ad hoc multicast routing protocol. Internet Draft, IETF, Aug [] David Eckhardt and Peter Steenkiste. Improving wireless lan performance via adaptive local error control. In Proc. IEEE ICNP 98, [3] J.J. Garcia-Luna-Aceves and E.L. Madruga. The core-assisted mesh protocol. IEEE Journal on Selected Areas in Communications, 17: , Aug [4] Mario Gerla, Ching-Chuan Chiang, and Lixia Zhang. Tree multicast strategies in mobile multihop wireless networks. ACM/Balzter Mobile Network and Applications Journal, 4:193 07, [5] IEEE Working Group. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. ANSI/IEEE Std 80.11, 1999 Edition, [6] Z. Haas and J. Deng. Dual busy tone multiple access (dbtma): A multiple access control scheme for ad hoc networks. IEEE Transactions on Communications, 50: , June
11 Total Num of Pkts Sent to Channel TREE-RMAC FLOODING TREE-DCF IDEAL Source Traffic Generating Rate(pkts/s) Figure 8: Total Number of Frames Sent to The Channel. [7] S. Lee, W. Su, and M. Gerla. Ad hoc wireless multicast with mobility prediction. In Proceedings of IEEE ICCCN 99, Boston, MA, October [8] S.J. Lee, W. Su, J. Hsu, M. Gerla, and R. Bagrodia. A performance comparison study of ad hoc wireless multicast protocols. In Proc. IEEE INFOCOM 00, Tel Aviv, Israel, March 000. [9] Elizabeth M. Royer and Charles E. Perkins. Multicast operation of the ad hoc on-demand distance vector routing protocol. In Proceedings of ACM MobiCom 99, pages 07 18, Seattle, WA, August [10] M. T. Sun, L. Huang, A. Arora, and T. H. Lai. MAC layer multicast in IEEE wireless networks. In Proceedings of the International Conference on Parallel Processing (ICPP) 00, 00. [11] K. Tang and M. Gerla. Mac reliable broadcast in ad hoc networks. In Proc. IEEE MILCOM 001, pages , October 001. [1] F.A. Tobagi and L. Kleinrock. Packet switching in radio channels: Part II the hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transactions on Communications, Com-3: , December [13] C. Wu and V.O. Li. Receiver-initiated busy-tone multiple access in packet radio networks. In Proceedings of ACM SIGCOMM 87, pages , [14] C. Wu and Y. Tay. Amris: A multicast protocol for ad hoc wireless networks. In Proceedings of IEEE MILCOM 99, Atlantic City, NJ, Nov [15] Xiang Zeng, Rajive Bagrodia, and Mario Gerla. Glomosim: a library for parallel simulation of largescale wireless networks. In Proc. The 1th Workshop on Parallel and Distributed Simulations, Alberta, Canada, May
12 Average Num of Retransmission per Pkt Source Traffic Generating Rate(pkts/s) Figure 9: Average Retransmission. 3 3 Total Num of Pkts Dropped in Network Source Traffic Generating Rate(pkts/s) Figure 10: Total Number of Packets Dropped. 1
RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks
RMAC: A Reliable Multicast MAC Protocol Wireless Ad Hoc Networks Weisheng Si and Chengzhi Li Department of Computer Science, University of Virginia Email: {ws4u, cl4v}@cs.virginia.edu Abstract This paper
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationMAC RELIABLE BROADCAST IN AD HOC NETWORKS
MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access
More informationReliable Multicast MAC Protocol for Wireless LANs
Reliable Multicast MAC Protocol for Wireless LANs S. K. S. Gupta, V. Shankar, S. Lalwani Department of Computer Science and Engineering Arizona State University, Tempe, AZ - 85287 Email: Sandeep.Gupta@asu.edu
More informationReview of Medium Access Control protocol for MANET
Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network
More information/99/$10.00 (c) 1999 IEEE
COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US
More informationBEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks
: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,
More informationA Survey on Modified RTS/CTS Mechanism
A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur
More informationApplication Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support
Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationService Discovery and Invocation for Mobile Ad Hoc Networked Appliances
Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationA Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks
A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University
More informationDirectional Antenna based Time Division Scheduling in Wireless Ad hoc Networks
Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationPreemptive Multicast Routing in Mobile Ad-hoc Networks
Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationReliable on-demand multicast routing with congestion control in wireless ad hoc networks
Reliable on-demand multicast routing with congestion control in wireless ad hoc networks KenTang,MarioGerla Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 ABSTRACT
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationIEEE Ad Hoc Networks: Performance Measurements
IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More informationReliable Multicast Scheme Based on Busy Signal in Wireless LANs
Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium
More informationSimulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks
Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden
More informationA Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks
A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering
More informationTECHNICAL RESEARCH REPORT
TECHNICAL REEARCH REPORT Multicast Routing in Mobile Ad Hoc Networks Using ource Grouped Flooding by Karthikeyan Chandrashekar, John. Baras CHCN TR 00-6 (IR TR 00-) The Center for atellite and Hybrid Communication
More informationA Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks
A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca
More informationCongestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks
Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los
More informationCSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks
CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department
More informationPriority Scheduling in Wireless Ad Hoc Networks
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang Nitin H.Vaidya Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationA Multi-channel MAC Protocol for Ad Hoc Wireless Networks
A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationWITH advances in wireless communications and the
1 Priority Scheduling in Wireless Ad Hoc Networks (Draft Version) Xue Yang and Nitin.H.Vaidya Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Ad hoc networks formed without
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationCHAPTER 7 SIMULATION OBSERVATIONS
CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationProposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting
Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic
More information#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.
Enables communitycentric applications: Military and law enforcement Search and rescue applications Foad Hamidi Amir Ali Ghadiri Online gaming Possibly email and file transfer! Limited radio propagation
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationMULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS
MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS 1 R. INDIRANI, 2 ARUCHAMY RAJINI 1 M. Phil Research Scholar, 2 Associate Professor 1&2 PG & Research Department of Computer Science, 1&2 Hindusthan
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More informationRouting Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:
Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationEfficient & Robust Multicast Routing Protocol in Mobile Adhoc Network
Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Ishwari Singh Rajput Department of Computer Science and Engineering Amity School of Engineering & Technology, Amity University, Noida,
More informationTarek Sheltami. CCSE COE 3/8/2008 1
Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationTMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks
: A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer
More informationPerformance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks
Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Dimitri Marandin Chair for Telecommunications, Electrical Engineering Department Technical University of Dresden, Dresden, Germany
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationUNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS
UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS Lap Kong Law, Srikanth V. Krishnamurthy and Michalis Faloutsos Department of Computer Science & Engineering
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationCongestions control through cloud computing with MANET
Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc
More informationCollision Free and Energy Efficient MAC protocol for Wireless Networks
110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationMulticast over Vehicle Ad Hoc Networks
1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationA Comparative Analysis on Backoff Algorithms to Optimize Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationA Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks
A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase
More informationE-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh
E-: Enhanced with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, and Mario Gerla Computer Science Department, University of California, Los Angeles {soonoh, jspark, gerla}@cs.ucla.edu Abstract On
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationPerformance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu
More informationH-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationComputer Networks (Fall 2011) Homework 2
5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationAMRIS: A Multicast Protocol for Ad hoc Wireless Networks
of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationA Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs
A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More information