Performance Evaluation of a MAC Protocol for Radio over Fiber Wireless LAN operating in the 60-GHz band

Size: px
Start display at page:

Download "Performance Evaluation of a MAC Protocol for Radio over Fiber Wireless LAN operating in the 60-GHz band"

Transcription

1 Performance Evaluation of a Protocol for Radio over Fiber Wireless LAN operating in the 6-GHz band Hong Bong Kim, Adam Wolisz Telecommunication Networks Group Department of Electrical and Computer Engineering Technical University of Berlin Sekr FT- Einsteinufer 87 Berlin Germany {hbkim, wolisz}@ee.tu-berlin.de Abstract Wireless networks using radio over fiber (RoF) technology operating in millimeter-wave (mm-wave) bands have been suggested as promising solutions to meet increasing user bandwidth and mobility demands. Due to the high penetration loss of mm-wave band signal, a wireless LAN (WLAN) based on this technology has properties quite different from those of conventional WLAN systems. That is, every room in a building should have at least one base station (BS). Thus, a challenging problem lies in the medium access control () protocol design so that it can support QoS requirements as well as a fast and easy handover. A protocol (Chess Board Protocol) based on frequency switching (FS) codes has been proposed by the authors considering the situation [7]. In this paper performance evaluation results for simple six variants of it are described and discussed. I. INTRODUCTION In order to meet modern ever increasing user bandwidth and mobility demands, a wireless network based on radio over fiber (RoF) technology operating in millimeter-wave (mmwave) bands has been suggested as a promising solution. In this network mm-wave signal is transmitted over optical fiber between the control station (CS) and base stations (BSs), and the BSs serve as access points for mobile hosts (MHs). Due to the high penetration loss of mm-wave band signal, a wireless LAN (WLAN) based on this technology has properties quite different from conventional WLAN systems operating in.4 or GHz bands. That is, every room in a building should have at least one BS. Therefore, simple and cost-effective BS will be a key to the success of the system. Recent research in this field has been focused on such components operating in mm-wave bands [] [6]. Especially, the 6 GHz band is of much interest since a massive amount of license-free spectrum has been allocated with a worldwide overlab of GHz (9 6 GHz) []. A medium access control () protocol (Chess Board protocol) featuring fast and easy handover and QoS support has been proposed by the authors [7], which is based on This work was supported in part by the Federal German Ministry of Education and Research within the TransiNet project. frequency switching (FS) codes. Adjacent picocells employ orthogonal FS codes to avoid possible co-channel interference. This mechanism allows a MH to stay tuned to its frequency during handover, which is a major characteristic of the proposed protocol. In this paper a simulation study for simple six variants of the Chess Board protocol is described. The paper begins with a brief description of the Chess Board protocol in section II. In section III simulation results are shown and discussed, and section IV summarizes the work. II. CHESS BOARD PROTOCOL DESCRIPTION A. Basic Operations A brief description of the Chess Board protocol [7] is given in this section. The simple structure of the BS and 6-GHz wave characteristics leads to a centralized network architecture with many picocells, where most of the BS functions of conventional WLANs are shifted to the CS (Fig. ). By subdividing the total system bandwidth, M (frequency) channels are obtained, where M channels (f,f,...f M ) are used for down-link transmission and the other M channels (f M+,f M+,...f M ) for up-link transmission. In addition, the time axis is also subdivided into time slots of equal length and M time slots are grouped into a frame. The MH is assigned a pair of channels (f i,f M+i ), i =,,...,M and a pair of time slots (t k mod M,t k+ mod M ), k =,,... for down- and up-link communication, respectively. Only after having received a permit from the down-link channel f i during the time slo k mod M, the MH may transmit up-link packets over the up-link channel f M+i during the nexime slot t k+ mod M. Every BS supports all channels, but each of them is used in the proper time slot. Fig. shows an example FS patterns for down- and up-link, respectively, when M is five. During every frame time, each of the M time slots and M channels is utilized once and only once. Adjacent picocells must not use identical FS patterns to avoid possible co-channel interference. One FS pattern used by one picocell can be reused by other picocells that are sufficiently separated from one another to

2 Optical Fiber Next ch Permit CS BS BS BS DOWN addr. P Data Reserv. Piggyback Down-link Up-link t 4 f f f f t 4 fm+ fm+ fm+ Picocell Picocell Picocell t 4 f f f f t 4 fm+ fm+ fm+ frame (t f ) slot (t s ) t 4 f f f f t 4 fm+ fm+ fm+ Fig.. A radio over fiber wireless LAN system operating in the 6 GHz band. Each room (picocell) has its own base station (BS) and BSs are connected to the control station (CS) using optical fiber. Adjacent picocells have different frequency switching (FS) patterns to avoid co-channel interference. Up-link FS pattern is obtained by shifting (delaying) the corresponding down-link FS pattern by one time slot. This figure shows an example FS patterns when the number of channels (M) is five. avoid interference. For proper operations using FS patterns, we assume thahe system is synchronous. Fig. shows down- and up-link slot formats and essentially, they have the same format. The down-link slot begins with a address indicating the destination of the slot. This address is followed by a permission field, which authorizes transmission of the MH specified in the address in the following up-link slot. The next field is for down-link payload, destined to the MH specified by the address. The last field consists of another address and reservation result, which indicate whether the request for bandwidth from the addressed MH is successfully confirmed or not. The up-link slot constitutes two parts. The first one is used for up-link data transmission consisting of MH s address, piggyback field, and payload field. The second part is for reservation used only by MHs that have not yet succeeded in reservation. If the piggyback field is set, it means that MH still has more data to send and requests assignment of one more slot. Non-setting this field indicates that its transmit buffer is empty. Each payload field (both up-link and downlink) allows packing several small packets or fragmentation for a large size packet. To request a permit for up-link transmission on some channel, the MH sends a requeso the CS using the reservation field in any slot in this channel. B. Mobility Support As long as a MH remains tuned to a certain channel (frequency pair) and time slot pair it can expeche time UP Fig.. time addr. Packet P Data... Packet Reserv. guard time Slot formats for the down- and up-link data transmission. instances at which down-link slots arrive. However, when it moves into an adjacent picocell using a different FS pattern, the MH will receive the down-link slot in an unexpected time instance. Thus, the MH can easily realize within at most a single frame time (t f = Mt s ) that it moved into another picocell (i.e., the number of channels (M) and the slot size (t s ) determines the minimum handover latency). Furthermore, using the following slot for the up-link transmission the MH can and should make a reservation in the new pair of time slots. Note thahe CS knows thahe MH with this address has been transmitting previously in a different picocell, so it is possible a) to treat such request with higher priority than requests for new reservations and b) release any possible reservation in the old picocell. C. Six Variants of Chess Board Protocol Six variants of the Chess Board protocol, classified into two groups, are considered in the paper as shown in Table I. In the first group (group A), MHs are assumed noo have a capability to change channels during operation, whereas MHs in group B are assumed to be able to change channels. A is the simplest among six variants, in which the CS allows a single channel to be used by only one MH, and it has no queue for requests. When the channel is being used, further requests are blocked. In particular, if a MH moves into another picocell in which its channel is already used, there is no way to continue transmission. A is similar with the only difference thahe CS does enqueue requests for busy channels rather than rejecting the request. When the channel is released the CS assigns io the MH ahe head of the queue. In interleaved usage of slots in a single channel by several MHs is performed. Slots are assigned using a simple roundrobin fashion, thereby assuring equal portion of the capacity to each candidate MH. In group B protocols MHs are assumed to be able to change channels. So the CS attempts to find capacity in other channels, not only in the channel on which the request has been issued. In B when a request from a MH arrives ahe BS, the CS investigates each channel if it is reserved or not. If a channel is free it assigns the channel to the MH by sending the channel number. When all channels are reserved the request is rejected. A queue for requesting MHs is maintained in B, and as soon as a channel is released it is allocated to the MH ahe head of the queue. is similar to B with an exception that when

3 the number of requesting MHs is greater than the number of channels, all the channels are shared by the MHs in a roundrobin fashion. In this case whenever the CS transmits a permit to a MH it must also inform the MH of the next channel number in the permit field of downlink slot (see Fig. ). It can be expected that group B protocols will outperform group A protocols ahe expense of increased complexity. m m m m BS MH III. NUMERICAL RESULTS A. Simulation Scenario and Assumptions Since two parameters of the Chess Board protocol (the number of channels and slot length) play an important role in determining handover latency and channel data rate (see [7]), in our simulation study emphasis is placed on the effects of the two parameters on system performance and performance comparison of six variants of the protocol. Because of the centralized nature of the system down-link transmission is so simple that only up-link performance is considered. The indoor environments for simulation includes four picocells and 4 MHs (Fig. ). MHs are assumed to be freely moving across boundaries between picocells according to random waypoint mobility model. Some assumptions for simulations are as follows: After having sent a request a MH receives the reservation result in one frame time from the down-link channel. The capacity of a BS (BT BS ) is. The channel data rate (BT ch ) is equal to BT BS /M O, wherem is the number of channels and O is overhead including address, permit field, reservation field and guard time. Message traffic consists of three packets: 4 bytes (4%), 76 bytes (%), and bytes (%) [8]. Since Chess Board protocol allows for packing small packets into a data slot or fragmenting a large packet into several data slots, different size of packets frequently found in widearea Interneraffic are used to investigate the effect of the slot size on system performance. Interarrival time between packets is exponentially distributed. Channel is perfect (error-free). p-persistent algorithm is used for sending a request packet. MHs use harmonic backoff algorithm (attempting probabilities, /, /,...) in computing their probabilities to transmit a request. Initial channel distribution by MHs is uniform. Other assumptions and parameters for simulation are summarized in Table II. Each simulation was run for at least sec (simulated time) including warm-up phase of sec. 9 % confidence intervals were calculated for the mean packet delay and normalized throughput whose variations from the sample mean were less than % for all results. As a simulation tool CSIM 8 was used. Fig.. Indoor environment for simulation consisting of four picocells and 4 mobile hosts. TABLE I SIX VARIANTS OF THE CHESS BOARD PROTOCOL Channel change Request when the during operation channel is used Group A blocked A NO queued A shared B blocked if not B YES queued if not B shared if not B. Delay Performance The mean packet delay is the average time spent by a packet from the instant it is generated till its transmission is complete. Fig. 4 and show the mean packet delay of group A and B protocols when the number of channels is five and the slot size is bytes, respectively. In Fig. 4 as the traffic load increases, A and perform better than A. Similarly in Fig. B and are better than B as the traffic load grows. We can also see that group B protocols highly outperform group A protocols because of the group B s trunking ability. Since the similar trends are observed with different number of channels and slot size, from now on we will only consider and protocols. The impact of the slot size in is shown in Fig. 6 indicating smaller slot size is better than larger one. However, TABLE II SUMMARY OF THE SIMULATION PARAMETERS Picocells 4 Guard time bytes MHs 4 FCS 4 bytes BS Capacity Buffer Length Mbytes adrs 6 bytes Mobility Model Random Waypoint Permit field byte Speed of MH. m/s Reservation slot 6 bytes Simulated Time sec Flag 8 bytes Statistics Collection after sec

4 A A slot = byte A A Traffic load (Mbps) Fig. 4. The mean packet delay of group A s when M is five and slot size is bytes B B B B. slot = byte Traffic load (Mbps) Fig.. The mean packet delay of group B s when M is five and slot size is bytes. due to the fixed size overhead too small size may cause larger delay under heavy traffic load. In order to investigate the effect of the number of channels on delay performance, simulations were run with a fixed-size slot and various number of channels. Fig. 7 shows that smaller number of channels is beneficial in terms of the mean packet delay, due to the fachahe frame time is directly proportional to the number of channels (t f = M t s ). An interesting fact is observed when the traffic load is Mbps. When M is 9, each of the 7 channels is shared by two MHs and the other two channels are shared by three MHs respectively, since channel distribution of MHs is assumed uniform and the total number of MHs is 4. If the three MHs using the same channel come together in the same picocell their total traffic load (9 Mbps) becomes greater than the channel data rate (8. Mbps /9), thus resulting in high mean packet delay. Similar arguments can be applied for M=7,8. Notice that if the time duration thahe three MHs stay in the same picocell is so long that MH s buffer is not enough to store overflowed packets there must be packet loss. However, as the MH has enough buffer in our simulation compared to the time duration no packet loss is observed when the traffic load per MH is less than or equal to for. Whereas when M is each channel is shared by only two MHs. Thus, if two MHs using the same channel stay in the same picocell their total traffic load (6 Mbps) is smaller than the channel data rate (7.7 /). That is the reason why the mean packet delay is lower when M is than when M is 9. Therefore, we can see thahe mean packet delay in depends not only on the number of channels and slot size but also on the channel distribution of MHs. The impact of slot size of is shown in Fig. 8. Just as in smaller slot size is advantageous in delay performance but due to the fixed-size overhead, small slot is not always beneficial. Fig. 9 shows how the number of channels influences the delay performance. With lighraffic delay grows along with the number of channels since frame time is proportional to it. As traffic load increases the delay has a minimum when M is around ten. Note that in our simulation scenario the average number of MHs in a picocell is ten. So when M is each MH is assigned its own channel resulting in rare 4 Mbps Mbps 4 4 Slot size (bytes) Fig. 6. The mean packet delay of when M is five and the slot size is bytes. collision and minimum reservation delay. If M is over ten the system has more channels than MHs on the average, thereby increasing frame time and wasting of bandwidth. C. Throughput Performance Throughput (normalized) is defined as the ratio between aggregate traffic transferred from MHs to BSs and the total system capacity. In Chess Board protocol throughput is affected by the channel data rate since the maximum bandwidth a MH can use is limited by it. Fig. and show throughput results of and, respectively. When M =throughput is limited by MH s traffic load as each channel is shared by multiple MHs (two MHs on the average) and the channel data Mbps Mbps slot = byte Number of channels Fig. 7. The mean packet delay of when the slot size is bytes and M is.

5 Mbps Mbps 4 4 Slot size (bytes) Fig. 8. Mean packet delay of when M is five and the slot size is bytes. Normalized throughput M=,s= M=,s= M=,s= M=,s= M=,s= M=,s= Traffic load per MH (Mbps) Fig.. Throughput of protocol with different number of channels and slot sizes. Mbps Mbps slot = byte Number of channels Fig. 9. Mean packet delay of when the slot size is bytes and M is. rate is about Mbps ( /). On the other hand, when M =throughput is restricted mainly by channel data rate, which is about Mbps in this case. Furthermore, larger slot size is favorable in terms of throughput although the effect is not noticeable. From the poinhe line is no longer linear packet loss begins to occur. It can also be seen that highly outperforms. IV. CONCLUSION The wireless LAN environment using radio over fiber technology operating in the millimeter-wave (mm-wave) bands imposes quite different requirements on the system design as compared to the conventional WLANs. Since the high Normalized throughput M=,s= M=,s= M=,s= M=,s= M=,s= M=,s= Traffic load per MH (Mbps) Fig.. Throughput of protocol with different number of channels and slot sizes. penetration loss of mm-wave signal many BSs should be employed to cover indoor areas. In such network with high number of small cells, the issue of mobility management has a very special significance. A protocol, called Chess Board protocol, featuring fast and easy handover and QoS support has been proposed in [7]. In this paper six variants of the Chess Board protocol were considered and their performance has been evaluated by a simulation study. Simulation results have shown that group B protocols which are assumed to have a capacity to change channels during operation highly outperform group A protocols where a fixed channel is assumed for each MH. Delay performance of both of them depends on the slot size and the number of channels; moreover, in group A it relies also on channel distribution of MHs. Smaller slot size and smaller number of channels are beneficial in delay performance with lighraffic load; however, that is not always true as traffic load grows. On the other hand larger slot size and smaller number of channels are in favor of throughput performance. REFERENCES [] P. Smulders, Exploiting the 6 GHz Band for Local Wireless Multimedia Access: Prospects and Future Directions, IEEE Commun. Mag. pp. 4 47, Jan.. [] K. Kitayama, et. al, An Approach to Single Optical Component Antenna Base Stations for Broad-Band Millimeter-Wave Fiber-Radio Access Systems, IEEE Trans. Microwave Theory Tech., vol. 48, pp , Dec.. [] T. Kuri, et. al, 6-GHz-Band Full-Duplex Radio-On-Fiber System Using Two-RF-Port Electroabsorption Transceiver, IEEE Photon. Technol. Lett., vol., no. 4, pp. 49 4, Apr.. [4] K. Kitayama, K. Ikeda, T. Kuri, A. Stöhr, and Y. Takahashi, Full-duplex demonstration of single electroabsorption transceiver basestation for mmwave fiber-radio systems, Microwave Photon. MWP, pp. 7 76,. [] G. Grosskopf, D. Rohde, and R. Eggemann, Mbit/s Data Transmission at 6 GHz Using an Optically Steered Antenna, ECOC, Muenchen, Germany, vol., pp. 4, Sep.. [6] R.-P. Braun, G. Grosskopf, D. Rohde, and F. Schmidt, Low-Phase- Noise Millimeter-Wave Generation at 64 GHz and Data Transmission Using Optical Sideband Injection Locking, IEEE Photon. Technol. Lett., vol., no., pp. 78 7, May 998. [7] H. B. Kim, H. Woesner and A. Wolisz, A Medium Access Control Protocol for Radio over Fiber Wireless LAN operating in the 6-GHz Band, in Proc. th European Personal Mobile Commun. Conf., pp. 4 8, Apr.. [8] K. Thompson, G. J. Miller and R. Wilder, Wide-Area Internet Traffic Patterns and Characteristics, IEEE Network, pp., Nov. 997.

THROUGHPUT ANALYSIS OF MAC PROTOCOL IN RADIO OVER FIBER

THROUGHPUT ANALYSIS OF MAC PROTOCOL IN RADIO OVER FIBER THROUGHPUT ANALYSIS OF MAC PROTOCOL IN RADIO OVER FIBER Dr. Sandeep Arya*,Shelly Garg**,Parvin Kumar**,Kapil** *Guru Jambeshwar University of Science & Technology,Hisar,India. **Jind Institute of Engineering

More information

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks

An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks An Adaptive Bandwidth Reservation Scheme for Multimedia Mobile Cellular Networks Hong Bong Kim Telecommunication Networks Group, Technical University of Berlin Sekr FT5 Einsteinufer 25 1587 Berlin Germany

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux

VoIP over wireless networks: a packet scheduling approach to provide QoS using Linux VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

An optically transparent ultra high speed LAN-ring employing OTDM

An optically transparent ultra high speed LAN-ring employing OTDM An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS

NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS David Lecumberri Kai-Yeung Siu* Paolo Narv6ez Massachusetts Institute of Technology Masayoshi Nabeshima Naoaki Yamanaka NlT Network Service

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks

TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks Hyun-Ho Choi and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Implementation of WiFiRe PHY Sectorization in OPNET

Implementation of WiFiRe PHY Sectorization in OPNET P Sreedhar Reddy Roll No. 06305024 24th July, 2007 Under the Guidance Of Prof. Sridhar Iyer Department Of Computer Science and Engineering Indian Institute Of Technology, Bombay Outline WiFiRe overview.

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Anupam Soni and Yatindra Nath Singh anusoni@iitk.ac.in,ynsingh@iitk.ac.in. Abstract In Optical Burst Switching

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 26 proceedings. An Efficient Selective-Repeat ARQ Scheme for

More information

Scheduling of real-time traffic in IEEE networks

Scheduling of real-time traffic in IEEE networks Scheduling of real-time traffic in IEEE 802.11 networks Afonso, José A. Neves, Joaquim E. Universidade do Minho, Departamento de Electrónica Industrial Campus de Azurém, 4800-058 Guimarães, ortugal jose.afonso@dei.uminho.pt

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Sample solution to Midterm

Sample solution to Midterm College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the

More information

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots

Fair Time Sharing Protocol: a Solution for IEEE b Hot Spots Fair Time Sharing Protocol: a Solution for IEEE 802.11b Hot Spots Anelise Munaretto 1,2, Mauro Fonseca 1,4, Khaldoun Al Agha 2,3, and Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 75015 Paris,

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

Networks Homework # 2

Networks Homework # 2 ISLAMIC UNIVERSITY OF GAZA COMPUTER ENGINEERING DEPARTMENT Networks Homework # 2 INSTRUCTIONS: 1. Show your work (i.e., how you derived your answer or the reason behind your thinking) in addition to your

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Multimedia Document Communications over Wireless Network

Multimedia Document Communications over Wireless Network Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany

BIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany BIGAP Seamless Handover in High Performance Enterprise IEEE 802.11 Networks Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany Outline Motivation, System Model, Applications, Design

More information

Burst-mode Transceivers and Differentiated Classes of Service for PON. Dr. Monir Hossen ECE, KUET

Burst-mode Transceivers and Differentiated Classes of Service for PON. Dr. Monir Hossen ECE, KUET Burst-mode Transceivers and Differentiated Classes of Service for PON Dr. Monir Hossen ECE, KUET 1 Concept of Burst-mode Types of Burst-mode ONU Transmitter ~ ON/OFF with time slot fast ON/OFF is required

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Resend in HiperLAN 2

Resend in HiperLAN 2 Contemporary Engineering Sciences, Vol. 5, 2012, no. 10, 481-491 Resend in HiperLAN 2 Faisal Rajeh Hashim Alshreef King Abdulaziz University fshareef64@yahoo.com Abstract The basic idea is to use the transmission

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

5G the next major wireless standard

5G the next major wireless standard 5G the next major wireless standard Klaus Doppler Director, Radio Communications Nokia Technologies, LABS DREAMS Seminar, Jan. 13, 2015 1 Nokia 2015 International activities on 5G Strong academic & government

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Development of MF-TDMA based Satellite Network System Simulation Model

Development of MF-TDMA based Satellite Network System Simulation Model International Global Navigation Satellite Systems Society IGNSS Symposium 2011 University of New South Wales, Sydney, NSW, Australia 15 17 November 2011 Development of MF-TDMA based Satellite Network System

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information