Fairness in the IEEE network. Shun Y. Cheung

Size: px
Start display at page:

Download "Fairness in the IEEE network. Shun Y. Cheung"

Transcription

1 Fairness in the IEEE network Shun Y. Cheung

2 Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing delay Not fair

3 Fairer way of queueing High data rate flow Output queue Low data rate flow Problem: define fair

4 Flow isolation Flow with data rate r 1 Queueing method Capacity C Flow with data rate r 2 r 2 < C r 1 +r 2 > C

5 Flow isolation Capacity r 2 Flow with data rate r 2 Behaves as if the link capacity is r 2

6 Fairness among flows Flow f 1 and f 2 request a data rate of r 1 and r 2, respectively If f 1 is inactive, the f 2 can use all remaining bandwidth, and vice versa!! 1 2 If f 1 and f 2 are both active, then: " r r 1 2 ρ 1 and ρ 2 are actual data rates of flows f 1 and f 2, respectively

7 Ideal fairness: unweighted flows One bit each Output queue Not practical

8 Practical fairness: unweighted flows Output queue Schedule packet according to finish time

9 Practical fairness: weighted Flow f receives a data rate of r f Packet length l f Finish time for packet: Schedule packets according to weighted finish times Method called Weighted Fair Queueing (very computationally intensive) l r f f

10 SCFQ: Efficient approx. of WFQ Self-clocked Fair Queueing (SCFQ) System variable: virtual time τ(t) t = real time, τ(0) = 0 Packet timestamp: t ( p ) j j = max( " ( A ( p ), t ( p )) j j! 1 + r j t(p 0 ) = 0 τ(t) = t(p current ) current transmitting packet l

11 QoS guarantees in SCFS Throughput guarantee: Flow is guarantee to receive at least r f bps Hard delay guarantee: Delay can be guaranteed if SCFS does not over-allocate bandwidth Fairness guarantee Normalized difference in actual throughput is bounded by a constant

12 Fairness in wireless network Fairness problem in routers are wellresearched Fairness problem in a wireless network is an active research area Same problem, but different pre-conditions: A wireless node does not have complete information on all flows Distributed fairness problem

13 Overview IEEE network network can operate in 2 modes: Infra-structure: mobile nodes with base station Ad-hoc: mobile nodes among themselves Ad-hoc network is more interesting: Self-organizing Distributed control Military applications (field units)

14 The IEEE DCF Collision

15 The IEEE DCF New packet (collision avoidance) r = random number No Channel idle for DIFS sec Yes Decrement r while channel is idle Pause decrement r Yes r = 0 Transmit packet Channel busy (can result in collision if multiple nodes transmit) No

16 The IEEE DCF Collision detection is very hard in wireless network due to widely different signal strengths Uses explicit ACK: Sender DIFS SIFS < DIFS Receiver SIFS ACK ACK packet has higher priority

17 The IEEE Back-off No ACK received for packet r = larger random number (exponential backoff) No Channel idle for DIFS sec Yes Decrement r while channel is idle Pause decrement r Yes r = 0 Transmit packet Channel busy (can result in collision if multiple nodes transmit) No

18 The IEEE DCF

19 The IEEE DCF 1. Packet arrival 2. Pick random number 3. Assume: r=1 1. Packet arrival 2. Pick random number 3. Assume: r=2

20 The IEEE DCF 1. Finish transmission r=1 r=2 time t=0

21 The IEEE DCF (Finish transmission) r=1 1. Sense idle channel 2. Wait DIFS time r=2 1. Sense idle channel 2. Wait DIFS time DIFS time now (DIFS = DCF InterFrame Space)

22 The IEEE DCF (Finish transmission) r=1 r=0 1. Wait 1 slot time 2. Transmit!! r=2 r=1 1. Wait 1 slot time DIFS τ time now (τ = slot time)

23 The IEEE DCF r=0 Transmiting DIFS τ τ r=1 1. < 1 slot time 2. Detects channel busy 3. Freezes countdown time now

24 The IEEE DCF Finish r=1 DIFS τ τ time now

25 The IEEE DCF Finish r=1 1. Sense idle channel 2. Wait DIFS time DIFS τ τ DIFS time now

26 The IEEE DCF Finish r=0 r=1 1. Wait 1 slot time 2. Transmit!! DIFS τ τ DIFS τ time now

27 The IEEE DCF-Collision

28 The IEEE DCF-Collision 1. Packet arrival 2. Pick random number 3. Assume: r=1 1. Packet arrival 2. Pick random number 3. Assume: r=1

29 The IEEE DCF-Collision 1. Finish transmission r=1 r=1 t=0 time

30 The IEEE DCF-Collision (Finish transmission) r=1 1. Sense idle channel 2. Wait DIFS time r=1 1. Sense idle channel 2. Wait DIFS time DIFS time now (DIFS = DCF InterFrame Space)

31 The IEEE DCF-Collision (Finish transmission) r=1 r=0 1. Wait 1 slot time 2. Transmit!! r=1 r=0 1. Wait 1 slot time 2. Transmit!! DIFS τ time now (τ = slot time)

32 The IEEE DCF-Collision r=0 Transmiting Transmiting r=1 DIFS τ time now

33 The IEEE DCF-Collision r=2 Pick new random numbers r=3 DIFS τ time now

34 The IEEE DCF-Collision r=2 1. Sense idle channel 2. Wait DIFS time r=3 1. Sense idle channel 2. Wait DIFS time DIFS τ DIFS time now

35 The IEEE DCF-Collision r=2 r=0 1. Wait 2 slot time 2. Transmit!! r=3 1. Wait 2 slot time r=1 DIFS τ DIFS τ τ time now

36 The IEEE DCF Summary Uses exponential back-off (just like Ethernet) Uses different interframe spacing to implement priority: ACK frames preceded by SIFS (Short InterFrame Spacing) Data frames preceded by DIFS Shorter SIFS allows MAC level ACK packets to be transmitted before data packets

37 Survey paper on QoS enhancements A survey of QoS enhancements for IEEE wireless LAN Qiang Ni, Lamia Ramdhani and Thierry Turletti Wireless Comm. And Mobile Comp., 2004 Categorizes and overviews existing techniques to provide QoS in IEEE

38 Aad and Castelluccia Studied various mechanisms to affect Priority Changing backoff increase function: Each priority level uses a different backoff increment function Cahinging DIFS: Each priority level is assigned a different DIFS Maximum frame length Each priority level can send a different number of byte at one time

39 Aad and Castelluccia Change backoff increase function: Priority level j uses back-off function: CW new = P j 2+i * Cw old Pick back-off interval from uniform[0.. CW new ] P j = window increase factor for level j P j < P j-1 (higher priority uses a smaller value) Result: Performs well with UDP TCP performance is poor due to TCP (transport level) ACK packets not receiving higher priority

40 Aad and Castelluccia Changing DIFS length: Recall that nodes detects an idle DIFS interval before starting/resuming count down Priority level j uses DIFS j and count down CW j Result: DIFS j > DIFS j+1 CW j < (DIFS j-1 DIFS j ) Very poor performance for low priority traffic TCP ACKs from lower priorities need higher priority to achieve better performance

41 Aad and Castelluccia Changing max. packet length: Priority level j uses max j max j > max j-1 Higher priority stations can transmit more data (per successful turn) than lower priority stations Result: Does not perform well in noisy environments

42 Distributed Fair Scheduling Distributed Fair Scheduling in a wireless LAN Vaidya, Bahl and Gupa Propose a protocol that provide Priority Fairness Uses ideas from SCFQ

43 Distributed Fair Scheduling Packets of flow j tagged with a timestamp: l t ( p ) j j = max( " ( A ( p ), t ( p )) j j! 1 + f r j Scaling factor f used to choose a suitable scale for virtual time When a node hears or transmits a packet with timestamp Z, it sets its virtual time to: τ(t) = max(τ(t), Z) Initial Backoff interval B 0 = "! ρ is uniform[ ] f l r j j

44 Distributed Fair Scheduling Subsequent Backoff intervals (after collision): B k = uniform[1.. 2 k-1 x CW] slots CW = small constant Problems: Short term unfairness Large initial back off interval when reserved rate is small Uses a log-scaled mapping function to reduce large initial back off intervals

45 Distributed Fair Scheduling DFS with different timestamp functions Weighted throughput for 32 nodes Wireless network

46 Virtual MAC Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control Andras Veres, Andrew T. Campbell, Michael Barry, 2001 Overview: Constructs an analytical model of the MAC protocol A Virtual MAC algorithm monitors channel activities and obtain estimates of parameters in model Estimate current achievable performance level Allows applications to adapt current network load Service differentiation through using different backoff window sizes

47 Performance estimation Actual delay measured VMAC s estimate

48 The Blackburst Scheme Real-Time Traffic over the IEEE MAC J. L. Sobrinho, A. S. Krishnakumar. Design goal: Minimize the delay of real-time traffic High priority real-time traffic (Not about fairness) High priority stations use: Access medium in equal and constant intervals (t sch ) Can jam the medium for a period of time

49 The Blackburst Scheme Real time data Jam channel for τ sec Channel idle for PIFS? Yes No Channel idle? No Wait till Channel is idle Wait duration τ Transmit data (Note: PIFS < DIFS) Schedule next transmission in t sch

50 The Blackburst Scheme Real-time flows will eventually synchronize When flows are all real-time, wireless network becomes TDMA (no collisions) Blackburst can support more real-time traffic volume than CSMA/CA (802.11) Has low delay and low jitter even at high traffic load (only real-time traffic present)

51 A 4-level priority scheme A Priority Scheme for IEEE DCF Access Method Deng and Chang Defines 4 different priority levels Each priority level uses Different Inter-frame space (IFS) Different back-off interval

52 A 4-level priority scheme Priority IFS used Back-off interval used 0 DIFS r x 2 i i DIFS PIFS PIFS r x 2 i+1 r x 2 i i+1 r x 2 i+1 Note: PIFS < DIFS i = number of collisions, r = random(0,1) variable

53 Summary Schemes can provide service differentiation Which is a pre-requisite for QoS Wireless schemes can provide Priority Only statistical QoS guarantees (fair over a long period of time) Wireless schemes do not provide hard QoS guarantees (research opportunity)

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University A SURVEY OF QOS TECHNIQUES IN 802.11 Drabu, Yasir Department of Computer Science, Kent State University Contents 1. Abstract 2. Introduction 3. Background 3.1. 802.11 Mac Sub layer 3.2. Distributed Coordination

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Quality of Service Schemes for IEEE Wireless LANs An Evaluation

Quality of Service Schemes for IEEE Wireless LANs An Evaluation Mobile Networks and Applications 8, 223 235, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Quality of Service Schemes for IEEE 802.11 Wireless LANs An Evaluation ANDERS LINDGREN,

More information

A survey of QoS enhancements for IEEE wireless LAN

A survey of QoS enhancements for IEEE wireless LAN WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2004; 4:547 566 (DOI: 10.1002/wcm.196) A survey of QoS enhancements for IEEE 802.11 wireless LAN Qiang Ni*,y,, Lamia Romdhani and

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Lower-Priority-Triggered Distributed MAC-layer Priority Scheduling in Wireless Ad Hoc Networks

Lower-Priority-Triggered Distributed MAC-layer Priority Scheduling in Wireless Ad Hoc Networks Lower-Priority-Triggered Distributed MAC-layer Priority Scheduling in Wireless Ad Hoc Networks Wei Zhou and Turgay Korkmaz Computer Science University of Texas at San Antonio San Antonio, Texas 78249 Email:

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Enhanced Fair Scheduling for IEEE e Wireless LANs *

Enhanced Fair Scheduling for IEEE e Wireless LANs * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1707-1721 (2007) Enhanced Fair Scheduling for IEEE 802.11e Wireless LANs * KUN-NAN TSENG, KUOCHEN WANG + AND HUNG-CHENG SHIH Department of Computer Science

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

DIFS Modifications to Support QoS in IEEE g DCF Ad-hoc Networks

DIFS Modifications to Support QoS in IEEE g DCF Ad-hoc Networks Modifications to Support QoS in IEEE 802.11g DCF Ad-hoc Networks Mohd Najwan Md Khambari a, Shahrin Sahib b, Mohd Fairuz Iskandar Othman c Fakulti Teknologi Maklumat dan Komunikasi Universiti Teknikal

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study A new Traffic Separation Mechanism (TSm) in Wireless 802.11e Networks: A simulation study Ricardo Moraes 1, Francisco Vasques 1, Paulo Portugal 1, José Alberto Fonseca 2 1 Faculdade de Engenharia Universidade

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Performance Evaluation of MAC DCF Scheme in WLAN

Performance Evaluation of MAC DCF Scheme in WLAN International Conference on Wireless Technology: Current Issues and Applications 14th July 27, Regional College of Management Bhubaneswar India Performance Evaluation of MAC DCF Scheme in WLAN Dillip Kumar

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

WITH advances in wireless communications and the

WITH advances in wireless communications and the 1 Priority Scheduling in Wireless Ad Hoc Networks (Draft Version) Xue Yang and Nitin.H.Vaidya Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Ad hoc networks formed without

More information

Priority Scheduling in Wireless Ad Hoc Networks

Priority Scheduling in Wireless Ad Hoc Networks Priority Scheduling in Wireless Ad Hoc Networks Xue Yang Nitin H.Vaidya Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Infrastructure CSMA/CA Network With Multiple Service Classes

Infrastructure CSMA/CA Network With Multiple Service Classes Traffic and QoS Analysis of an Infrastructure CSMA/CA Network With Multiple Service Classes Ritabrata Roy December 13, 2002 Abstract This treatise aims at analysing a CSMS/CA network operating in an access

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Survey of QoS Techniques and Enhancements for IEEE Wireless LANs

A Survey of QoS Techniques and Enhancements for IEEE Wireless LANs A Survey of QoS Techniques and Enhancements for IEEE 802.11 Wireless LANs Lassaâd Gannoune*, Stephan Robert* and Daniel Rodellar** *Lassaad.Gannoune@eivd.ch, and Stephan.Robert@eivd.ch Tel: +41 24 4239783

More information

{mingli, praba,

{mingli, praba, On Flow Reservation and Admission Control for Distributed Scheduling Strategies in IEEE82. Wireless LAN Ming Li, B. Prabhakaran, Sathish Sathyamurthy The University of Texas at Dallas Dept. of Computer

More information

Optimized WLAN MAC Protocol for Multimedia Applications

Optimized WLAN MAC Protocol for Multimedia Applications Research Online ECU Publications Pre. 2011 2008 Optimized WLAN MAC Protocol for Multimedia Applications Hushairi Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542484 This article

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Fair and Effective Transmissions in IEEE e WLAN

Fair and Effective Transmissions in IEEE e WLAN GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea

More information