RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks

Size: px
Start display at page:

Download "RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks"

Transcription

1 RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks Weisheng Si, ws4u@cs.virginia.edu Huafeng Lü, hl3d@cs.virginia.edu Dec 6th, 00 1 Introduction In most of the MAC protocols for wireless ad hoc networks today, no reliable multicast service is provided. For example, IEEE 80.11[5], the most widely used MAC protocol at present, only supports reliable unicast with the RTS/CTS/DATA/ACK scheme; while for broadcast or multicast frames 1, it simply performs one transmission of them without any reliability guarantee. In this report, we propose a new MAC protocol called RMAC which provides reliable multicast service to the upper layer. Our propose of this new protocol with reliable multicast support is mainly based on the following observations. First, we notice that multihop multicast communication in wireless ad hoc networks needs reliable multicast service from the MAC layer. Recently, many network layer multicast protocols have been proposed. They can be largely classified into two categories tree-based multicast protocols([4, 9, 14, 1]) and meshbased multicast protocols([7, 3]). However, people find out both of the two kinds of approaches have serious problems if high reliability is needed by the multicast communication. In tree-based multicast protocols, no matter how the tree is built in different protocols, they all eventually use a tree to do multicast. And it is shown by some research works[3, 8] that multicasting with a tree in wireless networks suffers from severe packet loss due to the unreliable wireless channel and the lean connectivity of the tree. An illustration of this problem is given in Figure 1, which shows that if one node in the multicast tree, say node B, does not receive the packet, then all its children can not receive the packet, thus resulting in significant packet loss. R A B C I D E F G H Figure 1: Problem of multicasting with a tree. 1 To comply with the terminology of the IETF and IEEE standards, we call the protocol data units in the network layer packets and those in the MAC layer frames in this report. 1

2 Trying to solve the above problem, people move on to the mesh-based multicast protocols which forward multicast packets along a mesh. In a mesh, there usually exist more than one node sending packets to an arbitrary node, thus increasing the chance that a node can get the packets. However, this class of protocols are inefficient since they introduce redundant packet transmissions and nodes in the multicast group have to memorize previous packets to avoid sending duplicate packets to the upper layer. As shown above, we believe that solely working on the network layer can not provide highly reliable multicast for wireless networks in an efficient way, i.e., multicast reliability support is needed from the MAC layer. Second, in the perspective of functionality provision at different protocol layers of wireless networks, MAC layer is the correct place to put the reliability functionality. In wired networks, the links almost have no loss and errors. So reliability functionality is usually implemented at the end-to-end level in the transport layer(e.g., TCP), since it is not worth to do recovery at each hop that the packets pass through. However, in wireless networks, the links are prone to have loss and errors, which makes local recovery mechanism worth to be performed. In [], it is shown that adding local recovery mechanism at the MAC layer can greatly improve the end-to-end communication performance in case of unicast. Here we believe that providing the reliable multicast functionality at the MAC layer will produce the same effect, which is justified by our later simulations. The rest of the report is structured as follows. Section describes other research works that providing reliable multicast service at the MAC layer. Section 3 presents our RMAC protocol in detail. Section 4 describes how the RMAC is implemented under GloMoSim. Section 5 presents our evaluation results on the RMAC protocol. Finally, section 6 concludes this report. Related Works As far as we know, only two reliable multicast MAC protocols have been proposed up to now. One is called Broadcast Medium Window(BMW) protocol[11] and the other is called Batch Mode Multicast MAC protocol[10]. Both of them provide reliable broadcast or multicast functionality by modifying the IEEE DCF(Distributed Coordination Function) mode. BMW mainly considers supporting reliability for broadcast. The basic idea of BMW is that a node reliably transmit a broadcast frame to each of its neighbors in a round robin fashion. The neighbor list is obtained by both periodical HELLO messages and overhearing. Once a frame other than HELLO message is transmitted by a node, the node will suppress its next HELLO message, assuming neighbor nodes can know its presence by overhearing this frame. The main drawback of BMW is that it uses at least rounds of unicasts for a broadcast frame destined to its neighbors, which not only introduces at least rounds of contention phases but also takes no utilization of the broadcast nature of the wireless channel. Considering the problem of BMW, BMMM proposes to consolidate the contention phases of BMW into one contention phase and transmits the data only one time before the ACK collecting. To transmit a reliable multicast frame in BMMM, a sender first uses its RTS frames to request intended receivers one by one to reply with a CTS. If the sender receives at least one CTS, it transmits the data frame. After the data frame transmission, it uses a new control frame called RAK(Request for ACK) to request ACKs from the intended receivers one by one. In case of missing ACKs, the sender will do retransmission. All the intervals between the above sequence of frames are set to a value less than DIFS, so once the sender grabs the channel, the reliable multicast operation will not be interrupted by other transmissions. Here we point out some drawbacks of the BMMM. First, it introduces rounds of RTS/CTS exchange and RAK/ACK exchange, in which any missing of the frames will cause retransmission. Second, though the four control frames have short length, other overheads of transmitting a frame in the wireless physical layer is high. For example, in IEEE specification, if the DSSS physical layer is used, the preamble

3 length for a frame is 144 micro-seconds and the PLCPHeaderLength is 48 micro-seconds. So we believe using large number of control frames is also not efficient. The RMAC protocol proposed in this report is designed to overcome the drawbacks of the two aforementioned protocols. Since in the BMMM paper it is shown that BMMM is better than BMW, we are planning to give a comparative evaluation of RMAC and BMMM in the future. 3 The RMAC Protocol 3.1 RMAC Overview Due to the inefficiency of realizing reliable multicast with the RTS/CTS like mechanism, we turn to another mechanism called busy tone to achieve the multicast reliability. Busy tone is simply a radio signal transmitted via a narrow-bandwidth channel other than the data channel. The busy tone mechanism is used in several other research works such as [1], [13], and [6]. In [1], the busy tone is used to solve the hiddenterminal problem in the wireless environment where there is a central base station. In [13], the busy tone is also used to solve the hidden-terminal problem, but in an ad hoc wireless environment. In [6], the busy tone used by [13] is kept and another busy tone is added to eliminate the exposed-terminal problem for the RTS transmission, so that both the hidden-terminal and the exposed-terminal problems are solved. It is a general belief that the hardware for a busy tone is very cheap to be equipped. In our RMAC protocol, we also introduce two busy tones in order to realize reliable multicast. We call one busy tone RBT(Receiver Busy Tone), and the other one ABT(Acknowledgement Busy Tone). Basically, we use RBT the same way as [13] and [6] to solve the hidden-node terminal problem, guaranteeing collisionfree data reception. The main idea of RBT is that before receiving a frame in a transmission, the receiver sets up the RBT, whose sensing range is the same as the sensing range of the data channel. Nodes(except the sender) in the sensing range of the receiver shall not start frame transmission or abort their current frame transmission once the RBT is sensed(see Figure ). In this way, the frame transmission to the receiver is guaranteed to encounter no collisions, thus greatly reducing the retransmissions.. S text R can not transmit A Figure : The Basic Idea of Receiver Busy Tone. As a novel use of busy tone, we use the ABT to acknowledge the frame reception. Since the ABT is only a signal, the sender has to no way to tell which node the ABT comes from. So we use a control frame(still called RTS frame) to specify an order of replying ABTs by the multicast receivers. The format of the RTS frame is shown in Figure 3. The ABT from each receiver has the same duration and is expected by the multicast sender at a pre-calculated time slot. For each receiver, it determines its time slot to respond with the ABT according to the order specified in the preceding RTS frame. Using ABT to do acknowledgements mainly has the following two advantages: (1) As a signal, ABT does not need the preamble or PLCP header 3

4 as a frame does, so it can be very short and () ABT does not have the collision or bit error problems suffered by a frame. SRC ADDR # RECEIVERS ADDR 1 ADDR ADDR Figure 3: Format of The RTS Frame in RMAC. Here ADDR1, ADDR,..., are a list of the receiver addresses. As described above, the main idea of our RMAC protocol can be summarized as follows: 1. The mechanism of realizing reliable multicast in RMAC altogether needs the following: a flexiblelength RTS frame containing an address list of the intended multicast receivers, Receiver Busy Tone, and Acknowledgement Busy Tone.. The multicast sender uses the RTS frame to specify an order for the intended receivers to reply with an ABT which is a very short signal. 3. The intended receivers getting the RTS set up the RBT to guarantee the collision-free data reception, thus reducing the number of retransmissions. 3. RMAC Description Generally, the RMAC protocol provides two data transmission service primitives to the upper layer. We call them Reliable Send and Unreliable Send respectively: Reliable Send It has the form reliable-send(payload, receiver list). Here payload is a protocol data unit from the upper layer to be encapsulated in a reliable data frame and receiver list is an address list of the intended receivers. This service primitive guarantees the reliable transmission of payload to the listed receivers for the upper layer unless the number of retransmissions exceeds the limit. Since in a reliable transmission the sender needs to know who are its receivers, this service primitive requires the address list of the receivers be passed from the upper layer, giving MAC layer the flexibility to support various kinds of upper layer protocols. Note that this service primitive covers the case of reliable unicast if only one receiver is specified in the receiver list and the case of reliable broadcast if all neighbors of a node is specified in the receiver list. Unreliable Send It has the form unreliable-send(payload, dst). Here payload is a protocol data unit from the upper layer to be encapsulated in a unreliable data frame and dst is a destination address which has three forms a unicast address, a multicast address, and a broadcast address. This service primitive only transmits payload one time to dst without any recovery mechanism. Note that we provide this service primitive in the RMAC protocol is because many upper layer protocols need a light-weight transmission service when reliability is not a big concern. For example, periodical one-hop broadcasting usually should be performed by this service primitive. In the following two subsections, we present how these two service primitives are realized in the RMAC protocol. 4

5 3..1 The Reliable Send Service Primitive The following concepts or symbols are used in the Reliable Send service primitive description: : The maximum one-way propagation delay. : The duration needed to detect a busy tone. : The timer for waiting for RBT after the RTS transmission. Its length is set to. : The timer for waiting for the reliable data frame after turning on the RBT. Its length is set to. : The location index of an intended receiver in the address list of the RTS frame. For example, the first receiver listed in the RTS frame has "!, and the second receiver has $#, etc. % : The timer for responding with an ABT after the successful data frame reception. Its length % is set to '&)(+*,.-. / : The timer for sensing an ABT at the sender. is initially set to *, right after the data frame transmission for sensing the first ABT and afterwards / is reset to *, 0 at each / expiration for sensing the subsequent ABTs. As mentioned above, this service primitive takes the payload to be transmitted, and the list of intended receivers as input parameters from the upper layer. After receiving such a request from the upper layer, it mainly performs the following steps (illustrated in Figure 4): A-BT Receiver-BT Node B RTS DATA Node A RTS 3 DATA A-BT A-BT Node C RTS DATA Receiver-BT A-BT Figure 4: Time Diagram of Reliable Send Service Primitive. 1. The sender senses both the data channel and the RBT channel. If both of them are idle, it transmits an RTS which contains a list of the addresses of the intended receivers. If either of them is not idle, the sender backs off. 5

6 . Upon receiving an RTS, a node checks if it is one of the intended receivers by looking at the address list in RTS. If it is, it memorizes its index in the RTS address list and turns on the RBT. The RBT has two usages here: one is to tell the sender that some node has received the RTS and the other is to guarantee collision-free data reception at the receiver as illustrated in Subsection If a node which is transmitting an RTS frame or an unreliable data frame senses the RBT during its transimission, it should abort its on-going transmission, ensuring no collisions at the node setting up the RBT. Here we note that this abortion seldom happens, since the only chance is that the interrupted node starts its RTS or unreliable data transmission in a very short interval approximately between the time the RBTing node receives the RTS and the time the interrupted node detects the RBT. 4. After transmitting RTS, the sender sets up the timer.. If RBT is sensed before expires (note that the sender only needs to tell whether at least one RBT is on), it transmits the payload in a data frame upon the timer expiration. Otherwise, the sender backs off upon the timer expiration. Here we set the timer period 1, which is because 1 is the safe time required to allow other RTS or unreliable data transmissions which may interfere this transmission to be aborted. 5. After turning on the RBT, the intended receiver sets up the timer If the data frame arrives before 4 expires, it cancels the timer. Otherwise it stops the RBT upon the timer expiration. If the data frame is correctly received, it immediately turns off the RBT and sets up the timer 5%. Here % is set to 6&)(+*,.-. When % expires, it turns on the ABT for duration *,. 6. After the data frame transmission, the sender sets up the timer / with / 7*, to sense the first ABT and afterwards a new / for later ABTs will be set at the beginning of previous / expiration with / 8*, 9$. So the sender senses each ABT from the intended receivers for a time slot with length *, :;. If in th slot an ABT is not sensed, the sender assumes that the th receiver in the RTS address list does not receives the data frame. After the sensing of the last ABT, if all intended receivers have responded with an ABT, the sender yields for a period so that other nodes may have chance to transmit. Otherwise, the sender constructs a new RTS frame which contains those receivers failing to respond with an ABT and repeats from step 1. Compared with IEEE based reliable multicast solutions, the RMAC Reliable Send service primitive is simple in the following two ways. First, unlike the RTS frame in IEEE 80.11, the RTS frame in RMAC does not have a duration field. This is because data frame reception is protected by the RBT so that NAV no longer needs to be maintained by the wireless nodes. Second, since ABT does not has the problem of collisions or errors, the reception of transmitted ABT is almost guaranteed. So there is no need to put sequence numbers in the data frames and nodes do not need to memorize the sequence number of the previously received data frame. 3.. The Unreliable Send Service Primitive The Unreliable Send service primitive is introduced for protocol operations in which reliability is not necessary. As mentioned in Subsection 3.1, this service primitive takes the payload to be broadcast and the destination address dst as the parameter passed from the upper layer. The basic protocol steps of the Unreliable Send service primitive is described as follows: 1. The sender senses both the data channel and the RBT channel. If both of them are idle, the sender encapsulates the payload into a unreliable data frame in which the destination address field is set to dst. Then it transmit this frame. If either of two channels is not idle, the sender backs off. 6

7 . During the transmission of a data frame, the sender keeps listening to the RBT channel. If RBT is sensed, it will abort the on-going transmission without performing retransmission in the future. 3. Upon correctly receiving a unreliable data frame, a node checks the destination address field in the frame. If it should accept this frame, it decapsulates this frame and passes the payload to the upper layer, without replying an acknowledgement to the sender. Otherwise, it discards the frame RMAC State Transition Combining the implementation of Reliable Send and Unreliable Send service primitives in RMAC, a node in RMAC protocol is running in one of the following nine states: IDLE: Upper layer has no packets to send. BACKOFF: Upon a busy data channel or RBT channel, the node waits for a random period before next contending for the channel. YIELD: After a successful data frame transmission, the node waits for a fixed period so that other nodes have chances to transmit. WF RBT: After the transmission of the RTS frame, the node waits for the RBT to arrive. WF RDATA: After turning on the RBT, the node waits for the reliable data frame to arrive. WF ABT: After the transmission of the reliable data frame, the node waits for the ABT to arrive. TX RTS: The node is in the process of transmitting an RTS frame. TX RDATA: The node is in the process of transmitting a reliable data frame. TX UNRDATA: The node is in the process of transmitting a unreliable data frame. The state transition diagram and the state transition conditions are shown in Figure 5. 4 RMAC Implementation The RMAC protocol is implemented and evaluated under GloMoSim[15], a widely used simulator for wireless networks today. GloMoSim has a very well-organized framework for developing new protocols. It is structured with a layered architecture which consists of five layers-physical layer, MAC layer, network layer, transport layer, and application layer. At each layer, well-defined interfaces make it easy to add new protocols. An advantage of GloMoSim is that it supports multiple network interfaces at a node, which exactly satisfies the multiple-interface requirement of our RMAC protocol. In the implementation of RMAC, each node is initiated with three interfaces and we use one interface as the data channel and the other two interfaces as the RBT channel and ABT channel respectively. The programming tasks for the RMAC implementation include: (1) Implementing a physical layer for the busy tone channel. () Implementing the RMAC protocol. The programming tasks for the RMAC evaluation include: (1) Implementing an application called FLOOD which sends CBR(Constant Bit Rate) traffic to the entire network by flooding and each node only forwards a packet one time. 7

8 WF_RBT C3 TX_RDATA C4 WF_ABT C no BT fail success TX_RTS abort BACKOFF YIELD C1 busy timeout C6 C6 abort C5 IDLE C6 C7 WF_RDATA TX_UNRDATA C8 C9 Figure 5: The State Diagram of The RMAC Protocol. Some state transition conditions are listed as follows. C1: Upper layer has reliable data to send and both the data and RBT channels are idle. C: An RTS frame is transmitted. C3: RBT is sensed before <>=@? ABDC expires. C4: A reliable data frame is transmitted. C5: An unreliable data frame is transmitted. C6: An RTS frame for the node is received. C7: An reliable data frame is received. C8: Upper layer has unreliable data to send and both the data and RBT channels are idle. C9: The period of yielding ends. () Implementing an application called TREECAST which sends CBR traffic to the entire network along a existing tree. The usage of the FLOOD and TREECAST applications will be described in Subsection Evaluation We evaluate the RMAC protocol based on our implementation of it under the GloMoSim. We mainly focus on two aspects of the RMAC in our evaluation. One is the level of reliability it achieves and the other is the overhead introduced for providing reliable multicast. 5.1 Experiment Setup The network used in our evaluation contains 75 wireless nodes which are randomly placed on a FE!HGI& *HJ,!HG plain. The communication range of all nodes is set to K!ML *,!HG. Basically, we use the network-wide broadcast, a special case of multihop multicast, to evaluate our RMAC protocol. With RMAC as the underlying MAC protocol, we run the TREECAST application over a tree covering all the 75 nodes in the network. The CBR traffic rates used in our evaluation are 5 pkts/sec, 10 pkts/sec, 0 pkts/sec,..., and 60 pkts/sec, with packet size 600 bytes. We call this kind of experiment TREE-RMAC in the later description. An example tree topology used in our evaluation is shown in Figure 6. To make a comparison, we also run two other kinds of experiments with the same parameters set as those in TREE-RMAC experiments: (1) running the FLOOD application with IEEE DCF mode as the underlying MAC protocol and () running the TREECAST application with IEEE DCF mode as the underlying MAC protocol, using the same tree topology as TREE-RMAC. We call these two kinds of experiments FLOODING and TREE-DCF respectively. 8

9 Figure 6: An Example Network Tree Topology. 5. Reliability We define the successful packet delivery rate (denoted by N ) as N total number of packets received by all nodes total number of packets that should be received by all nodes (1) We use N as an important metric both for measuring the reliability of the RMAC protocol and for making comparisons with FLOODING and TREE-DCF. Figure 7 plots the experiment results of the TREE-RMAC, FLOODING, and TREE-DCF experiments. From this figure we see that Almost equal to one, N of TREE-RMAC is much higher than N of FLOODING or TREE-DCF. N of FLOODING degrades quickly with the increasing of the traffic rate. N of TREE-DCF is the lowest due to the problem illustrated in Figure Overhead In evaluating the overhead of RMAC, we mainly measure the following total number of frames sent to the channel, average number of retransmissions per packet, and total number of frames dropped. In the overhead experiments, the source node of TREE-RMAC, FLOODING, or TREE-DCF altogether generates 10 packets. And the tree topology used by TREE-RMAC and TREE-DCF has 44 leaf nodes, which means that all nodes can get the 10 packets with ideally 310 ( ( K EPO H -1&Q#R! ) transmissions at the non-leaf nodes. Figure 8 plots the total number of frames sent to channel by experiments TREE-RMAC, FLOODING, TREE-DCF, and the ideal value of 310 frames. Note that we only count the data frames here. From this figure we see that (1) FLOODING sends the most number of frames to the channel, introducing significant overhead to the network capacity, () TREE-RMAC only sends slightly more than the ideal number of frames to the channel, showing its overhead is very limited, and (3) TREE-DCF sends less than the ideal number of frames to the channel due to its severe packet loss. 9

10 Successful Packet Delivery Rate TREE-RMAC FLOODING TREE-DCF Source Traffic Generating Rate(pkts/s) Figure 7: Deliver Rate. Figure 9 plots the average number of retransmissions per packet for TREE-RMAC. From this figure we see that the absolute value of average retransmissions is quite small, though it is increasing with the rising of the traffic rate. So we can draw the conclusion that retransmission does not cause significant overhead in RMAC. Figure 10 plots the total number of packets dropped during the TREE-RMAC experiments. From this figure we see that the number of packets dropped is very small, arguing for the strong reliability of the RMAC protocol. According to our observation of the experiments, all packet droppings are caused by the phenomenon that the number of retransmissions exceed the limit, which is set to 8 in our experiments. 6 Conclusion References [1] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade. Amroute: Ad hoc multicast routing protocol. Internet Draft, IETF, Aug [] David Eckhardt and Peter Steenkiste. Improving wireless lan performance via adaptive local error control. In Proc. IEEE ICNP 98, [3] J.J. Garcia-Luna-Aceves and E.L. Madruga. The core-assisted mesh protocol. IEEE Journal on Selected Areas in Communications, 17: , Aug [4] Mario Gerla, Ching-Chuan Chiang, and Lixia Zhang. Tree multicast strategies in mobile multihop wireless networks. ACM/Balzter Mobile Network and Applications Journal, 4:193 07, [5] IEEE Working Group. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. ANSI/IEEE Std 80.11, 1999 Edition, [6] Z. Haas and J. Deng. Dual busy tone multiple access (dbtma): A multiple access control scheme for ad hoc networks. IEEE Transactions on Communications, 50: , June

11 Total Num of Pkts Sent to Channel TREE-RMAC FLOODING TREE-DCF IDEAL Source Traffic Generating Rate(pkts/s) Figure 8: Total Number of Frames Sent to The Channel. [7] S. Lee, W. Su, and M. Gerla. Ad hoc wireless multicast with mobility prediction. In Proceedings of IEEE ICCCN 99, Boston, MA, October [8] S.J. Lee, W. Su, J. Hsu, M. Gerla, and R. Bagrodia. A performance comparison study of ad hoc wireless multicast protocols. In Proc. IEEE INFOCOM 00, Tel Aviv, Israel, March 000. [9] Elizabeth M. Royer and Charles E. Perkins. Multicast operation of the ad hoc on-demand distance vector routing protocol. In Proceedings of ACM MobiCom 99, pages 07 18, Seattle, WA, August [10] M. T. Sun, L. Huang, A. Arora, and T. H. Lai. MAC layer multicast in IEEE wireless networks. In Proceedings of the International Conference on Parallel Processing (ICPP) 00, 00. [11] K. Tang and M. Gerla. Mac reliable broadcast in ad hoc networks. In Proc. IEEE MILCOM 001, pages , October 001. [1] F.A. Tobagi and L. Kleinrock. Packet switching in radio channels: Part II the hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transactions on Communications, Com-3: , December [13] C. Wu and V.O. Li. Receiver-initiated busy-tone multiple access in packet radio networks. In Proceedings of ACM SIGCOMM 87, pages , [14] C. Wu and Y. Tay. Amris: A multicast protocol for ad hoc wireless networks. In Proceedings of IEEE MILCOM 99, Atlantic City, NJ, Nov [15] Xiang Zeng, Rajive Bagrodia, and Mario Gerla. Glomosim: a library for parallel simulation of largescale wireless networks. In Proc. The 1th Workshop on Parallel and Distributed Simulations, Alberta, Canada, May

12 Average Num of Retransmission per Pkt Source Traffic Generating Rate(pkts/s) Figure 9: Average Retransmission. 3 3 Total Num of Pkts Dropped in Network Source Traffic Generating Rate(pkts/s) Figure 10: Total Number of Packets Dropped. 1

RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks

RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks RMAC: A Reliable Multicast MAC Protocol Wireless Ad Hoc Networks Weisheng Si and Chengzhi Li Department of Computer Science, University of Virginia Email: {ws4u, cl4v}@cs.virginia.edu Abstract This paper

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

MAC RELIABLE BROADCAST IN AD HOC NETWORKS

MAC RELIABLE BROADCAST IN AD HOC NETWORKS MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access

More information

Reliable Multicast MAC Protocol for Wireless LANs

Reliable Multicast MAC Protocol for Wireless LANs Reliable Multicast MAC Protocol for Wireless LANs S. K. S. Gupta, V. Shankar, S. Lalwani Department of Computer Science and Engineering Arizona State University, Tempe, AZ - 85287 Email: Sandeep.Gupta@asu.edu

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Preemptive Multicast Routing in Mobile Ad-hoc Networks Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

Reliable on-demand multicast routing with congestion control in wireless ad hoc networks Reliable on-demand multicast routing with congestion control in wireless ad hoc networks KenTang,MarioGerla Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 ABSTRACT

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL REEARCH REPORT Multicast Routing in Mobile Ad Hoc Networks Using ource Grouped Flooding by Karthikeyan Chandrashekar, John. Baras CHCN TR 00-6 (IR TR 00-) The Center for atellite and Hybrid Communication

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Priority Scheduling in Wireless Ad Hoc Networks

Priority Scheduling in Wireless Ad Hoc Networks Priority Scheduling in Wireless Ad Hoc Networks Xue Yang Nitin H.Vaidya Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

WITH advances in wireless communications and the

WITH advances in wireless communications and the 1 Priority Scheduling in Wireless Ad Hoc Networks (Draft Version) Xue Yang and Nitin.H.Vaidya Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Ad hoc networks formed without

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic

More information

#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.

#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications. Enables communitycentric applications: Military and law enforcement Search and rescue applications Foad Hamidi Amir Ali Ghadiri Online gaming Possibly email and file transfer! Limited radio propagation

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS 1 R. INDIRANI, 2 ARUCHAMY RAJINI 1 M. Phil Research Scholar, 2 Associate Professor 1&2 PG & Research Department of Computer Science, 1&2 Hindusthan

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Ishwari Singh Rajput Department of Computer Science and Engineering Amity School of Engineering & Technology, Amity University, Noida,

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Dimitri Marandin Chair for Telecommunications, Electrical Engineering Department Technical University of Dresden, Dresden, Germany

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS

UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS Lap Kong Law, Srikanth V. Krishnamurthy and Michalis Faloutsos Department of Computer Science & Engineering

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Multicast over Vehicle Ad Hoc Networks

Multicast over Vehicle Ad Hoc Networks 1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh E-: Enhanced with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, and Mario Gerla Computer Science Department, University of California, Los Angeles {soonoh, jspark, gerla}@cs.ucla.edu Abstract On

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Computer Networks (Fall 2011) Homework 2

Computer Networks (Fall 2011) Homework 2 5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information