Medium Access Control Protocols. using Directional Antennas in Ad Hoc Networks. (Preliminary Version) Young-Bae Ko and Nitin H.

Size: px
Start display at page:

Download "Medium Access Control Protocols. using Directional Antennas in Ad Hoc Networks. (Preliminary Version) Young-Bae Ko and Nitin H."

Transcription

1 Medium ccess ontrol Protocols using Directional ntennas in d Hoc Networks (Preliminary Version) Young-ae Ko and Nitin H. Vaidya Department of omputer Science Texas &M University ollege Station, TX fyoungbae, vaidyag@cs.tamu.edu Technical Report May 11, 1999 bstract Using directional antennas can be useful for mobile ad hoc networks consisting of a collection of wireless hosts. To best utilize directional antennas, a suitable Medium ccess ontrol (M) protocol must be designed. urrent M protocols, such as the IEEE standard, do not benet when using directional antennas, because these protocols have been designed for omnidirectional antennas. In this technical report, we attempt to design new M protocols suitable for mobile ad hoc networks based on directional antennas. 1 Introduction mobile ad hoc network (MNET) is an autonomous system of mobile nodes which are free to move arbitrarily and typically assumed to be equipped with omnidirectional antennas 1 [3]. However, it is also possible to use directional antennas [5] or adaptive antennas [9] to improve the ad hoc network capacity. In this report, we consider directional antennas, but the ideas can Research reported is supported in part by Texas dvanced Technology Program grants and National Science Foundation grants D n omnidirectional antenna transmits in all directions (360 degrees) 1

2 be applied to adaptive antennas as well. Using directional antennas may oer several interesting advantages for mobile ad hoc networks. For instance, routing performance could be improved using a directional antenna (for route discovery [7] or for data delivery). To best utilize directional antennas, a suitable Medium ccess ontrol (M) protocol must be used. urrent M protocols, such as the IEEE standard, do not benet when using directional antennas, because these protocols have been designed to exploit omnidirectional antennas. In this technical report, we propose new M protocols using directional antennas. 2 Related Work lthough work on M protocols for directional antennas is limited, some researchers have previously suggested use of directional antennas for a packet radio system. For example, Zander [13] has proposed the use of directional antennas in slotted LOH multihop packet radio networks whose broadcast radio channel is shared by means of some random time division multiple access (RTDM) scheme. More recently, a way of using adaptive directional antennas for the Mobile roadband System (MS) has been proposed [5]. In addition, [5] argues that conventional M protocols are not suitable with directional antennas and suggests a dynamic slot assignment (DS) protocol for directional antennas. Other researchers have also suggested using directional antennas for packet radio networks [8, 11, 12]. 3 Network Model We assume that all mobile hosts in a region share a common channel and communicate on that shared wireless channel. Each host is assumed to be equipped with multiple directional antennas for its transmitter and an omnidirectional antenna for its receiver 2. directional antenna can transmit over a smaller angle (e.g., 90 degrees), and several directional antennas may be used to cover all directions. Therefore, mobile hosts can receive from all directions simultaneously, and transmit in any chosen direction(s). We assume that communication between two hosts is bidirectional, although this assumption may not be always true in reality due to interference and obstacles [10]. Each host has a xed transmission range and two hosts are said to be neighbors if they can communicate with each other over a wireless link. Initially, we assume that each node knows its neighbors' location as well as its own location. t the end of this paper, we briey consider the case when location information is not known accurately. The physical location information may be obtained using the global positioning system (GPS) [1]. ased on location of a receiver, a sender may select an appropriate directional antenna to send packets to the receiver. Most of the current M protocols, such as IEEE M standard [2], use a handshaking mechanism implemented by exchanging small xed-size control packets: Requestto-Send (RTS) and lear-to-send (TS) packets. The successful exchange of these two control packets reserves the channel for guaranteeing undisturbed transmission of the longer data packet 2 n adaptive antenna could also be used instead. 2

3 and a short acknowledgement (K) packet. In our initial discussion, the K packets are not considered, i.e., the M protocols would not send Ks. In Section 5.2, we will consider how the K aects proposed protocols. 4 The urrent RTS/TS Mechanism Figure 1 illustrates a M protocol, similar to M [6] and the IEEE standard, for omnidirectional antennas that uses RTS and TS control messages. In this protocol, any node that wishes to transmit data must send a RTS packet before it can start data transmission. For example, in Figure 1, node broadcasts a RTS packet for its intended receiver, node (please see caption of Figure 1 for an explanation of the gure). If hears the RTS successfully, it replies with a TS packet so that can start transmitting data packets upon receiving the TS. Note that both RTS and TS packets contain the proposed duration of data transmission. Since nodes are assumed to transmit using omnidirectional antennas, all nodes within radio range of and will hear one or both of those control packets (nodes and D in Figure 1) { these nodes must wait for the duration of data transmission before they can transmit anything themselves. Thus, the area covered by the transmission range of sender (node ) and receiver (node ) both is reserved for the data transfer from to, to prevent collisions. This characteristic of RTS/TS mechanism overcomes the hidden terminal problems in wireless LN environments. However, it is easy to see that this mechanism can waste a large portion of the network capacity by reserving the wireless medium over large area. For instance, even though node D has data packets for node E while and are communicating with each other, node D has to defer the transmission to E until the transmission from node to completes. 5 Proposed Directional M Mechanisms 5.1 Directional M Protocol #1 To illustrate how M protocols for directional antennas may be designed, we consider a modication of the above protocol. The modied M protocol utilizes a directional antenna for sending the RTS packets in a particular direction, whereas TS packets are transmitted in all directions (either using multiple directional antennas, or using an omnidirectional antenna). Figure 2 and Figure 3 show how wireless bandwidth eciency of the previous M protocols in Section 3.1 can be improved by using a directional M protocol. In Figure 2, when node has data packets for node, it sends a directional RTS (DRTS) packet including the physical location information of, in the direction of node. Thus, node does not receive the DRTS from node even though node also exists within 's transmission range. If node receives the DRTS packet from successfully, it then returns an omnidirectional TS (OTS) reply. Two location informations are included in the OTS packet: one for its own location (for instance, node 's location in Figure 2) and the other for the sender of the corresponding DRTS packet (for instance, node 3

4 D E RTS RTS TS TS DT DT Figure 1: M protocols with omnidirectional RTS/TS mechanism: The circle centered at each node shows its transmission range. In the lower half of the gure, time progresses from top to bottom. The gure shows messages sent by various nodes. lack bars below nodes and D indicate that these nodes are not allowed to transmit in the duration covered by the bars (to avoid interference with the transfer from to ). 4

5 in Figure 2). fter the successful exchange of DRTS and OTS packets the actual data packet can be sent by node using a directional antenna. Now, during the proposed length of transmission between and, node D, which is a neighbor of node, wishes to transmit data to node E. ecause node D can use directional antennas, and knows location of nodes and, it can determine that data transmission to E cannot interfere with the data transfer from to. Therefore, node D can send a directional RTS packet towards node E. Thus, if node D can verify that its data transmission to node E would not interfere with data transfer from to, D is allowed to send a DRTS control packet to E. s a result, our modied M protocols for directional antennas can improve performance by allowing simultaneous transmissions that are disallowed when using only omnidirectional antennas. D E DRTS () OTS (, ) OTS (, ) DRTS (D) DT OTS (D, E) OTS (D, E) DT Figure 2: Example of using a directional M #1 protocol: This gure uses notation similar to Figure 1. Letters in parentheses, such as DRTS() or OTS(,), denote the physical location information included in the message. The white box below node D denotes that node D may transmit to node E in the corresponding duration, unlike when using omnidirectional antennas. Similarly, in Figure 3, node is allowed to transmit to node F while transmission between and is taking place. This is possible because node does not receive the DRTS from node, so node is not blocked from transmitting DRTS to node F. Note that, with standard omnidirectional RTS/TS mechanisms, node in Figure 3 must defer transmission to node F until the transmission from node to nishes, causing performance degradation. 5

6 F D DRTS () DRTS () OTS (, F) OTS (, F) OTS (, ) OTS (, ) DT DT Figure 3: nother Example of using directional M mechanism #1 6

7 Now consider some other node X in Figure 3 whose location is covered under the directional antenna of pointing towards node. learly, node X may also receive the DRTS from when node sends the DRTS packet to node, as shown in Figure 4(a). With this scenario, we suggest two options for how node X may react. a) Node X MUST Defer Transmission The rst alternative does not allow node X to initiate any data transmission when it has already received the DRTS from someone else (node in Figure 4(a)), until the data transfer indicated in that DRTS is complete. This is because any attempt at data transmission by node X may cause unexpected interference, as in Figure 4(b). In Figure 4(b), node Y's OTS packet following the DRTS by X may cause a collision at node with data packets from node. b) Node Y MY Defer Transmission In the second approach, node X sends a DRTS packet to node Y even though it has already received a DRTS from node. Thus, when X needs to send a DRTS to Y after receiving node 's DRTS, it will check to see whether its directional transmission to node Y can interfere with the ongoing data transfer from to. If it can interfere, node X will not send DRTS to node Y. Otherwise, X will send the DRTS. When a node Y, gets a DRTS packet from some node X, Y may or may not reply with the OTS to X. In order to decide whether or not to reply, Y checks if it has received an OTS packet from any neighbors previously and if the data transfer indicated in that OTS is nished. If node Y has never received any OTS from its neighbors or the proposed data transfer time in the previously receiving OTS is over, node Y will send the OTS back to node X, being followed by the actual data transfer from X to Y. Otherwise, Y will not reply with OTS to node X. For instance, in Figure 4(d), node Y can know the fact that its returning OTS packet for DRTS from node X may cause a collision with data packets from to. Therefore, it will not reply to the OTS for node X. 5.2 Directional M Protocol #2: Impact of K packets In the current IEEE M protocol standard, immediate link layer acknowledgements 3 are employed to determine if the data packet was successfully received. Thus, RTS-TS-DT- K exchange mechanism is used to enhance reliability of data transmission. Note that, in our proposed directional RTS mechanism explained above, no K packet is assumed. Now, let us consider the case when we include the K packet immediately after the DT. Figure 5 shows the case when adding the K packet aects our proposed protocol. In both Figure 5(a) and (b), the K packet is returned after successful data transmission from to. During the transmission session between nodes and, assume that node G whose transmission range includes both nodes and wants to send data packets to node by using a directional antenna in Figure 5(a). lso, let us assume that the directional antenna used for 3 Here, an K is treated as a control packet sent by a M layer. Therefore, no RTS is sent for the K. 7

8 OTS(X,Y) DRTS() X Y DT DRTS(X) DT X Y OTS(X,Y) (a) (b) DRTS(, ) Y DT Y X X DRTS(X,Y) (c) (d) Figure 4: How to react when node receives DRTS? 8

9 sending the DRTS from G to covers node as well, meaning that node also gets the DRTS sent by node G and may experience a collision with the returning K. Node cannot know the fact that is communicating with so it responds with the OTS packet to G, following which node G transmits data. Since this data packet transmitted by node G reaches node as well as, it may cause a collision at node with the K packet returned by node. Of course, the OTS from node can also collide with the K. These collisions harm reliability of data transmission from to. Unlike Figure 5(a), Figure 5(b) shows no impact of K packets because data transmission from node G to node H does not aect node (i.e., no collision at node ). K OTS (,G) DRTS(G) DRTS OTS DT K OTS D DRTS OTS DT K OTS D G DT G DRTS OTS DT K H "ollision" (a) (b) Figure 5: Impact of K packets in the directional M #1 protocol: oth nodes and are covered by the same directional antenna of node G. (a) DRTS and DT from node G destined for would also reach node, potentially causing collisions with a returning K from node. Similarly, OTS from node can collide with the K. (b) No collision occurs in this case. In order to tackle the case of Figure 5(a), our proposed directional M protocol #1 needs to be modied as follows: Use omnidirectional RTS: To take K packets into account, using omnidirectional RTS (ORTS) packets has to be considered. Recall that the proposed directional M mechanism #1 discussed above consists of directional RTS, omnidirectional TS, and directional DT (DRTS-OTS-DT). In Figure 6, unlike the rst directional M protocol, node broadcasts an ORTS for data transmission to node. The ORTS would then reach nodes and G which are within radio range of. In the current RTS/TS mechanism with omnidirectional RTS and TS packets explained in Section 4, nodes and G have to wait for the duration of data transmission from to. This is because any attempt at data transmission by them may cause a collision at node. However, in our proposed directional M protocol #2, nodes receiving the ORTS are allowed to transmit data in 9

10 some cases (explained further below). This is possible because we assume the use a directional antenna for data transmission. For example, node G will be allowed data transfer to node H in Figure 6(b), but not to node in Figure 6(a). In Figure 6(b), collisions may still occur at node between the K from node and the ORTS from node G. However, there will be no collision with the long data packets. heck if any nodes receiving an ORTS is allowed for data transfer: When node X receives an ORTS packet from node Y, which is destined for another node Z, X notes node Y's on-going transmission to node Z. If node X now wants to begin data transfer to node Q, it may or may not be allowed to initiate an ORTS transmission. The decision is based on where node Q is, i.e., node Q's location information. In the case when Q is close enough to node Y so a directional antenna of node X in the direction of node Q also covers node Y, the decision of ORTS transmission from X will be negative. Otherwise, the decision will be positive. Figure 6(a) belongs to the case when the above decision is negative. Nodes and exist within the transmission range of node G. In addition, both nodes are covered under the same directional antenna of node G. Therefore, when G sends directional DT packets towards node, the packets also reach node. ecause node G knows that DT for node can collide at node with an K returned by node, G will not send the ORTS to. Instead, node G stays silent for the intended transmission duration from to. In contrast, Figure 6(b) shows the case where node G may perform an ORTS packet transmission. With this scenario, G concludes that a directional DT for node H will never collide with the returning K packet from. Of course, in order for the data transmission between G and H to occur, node H has to send an OTS back to G. Node H will not send OTS for the corresponding ORTS packet if it has heard an OTS packet for a data transfer that is not guaranteed to have completed yet. Otherwise, H will send the OTS. onict-free K packets To avoid the collision of an K with the long DT packets, our directional M protocol #2 requires omnidirectional RTS, omnidirectional TS, directional DT, and directional K (ORTS-OTS-DT-DK). However, as shown in Figure 6(b), the probability of K collisions with small control packets, such as ORTS or OTS, still remains non-zero. To remedy this problem, we present here some approaches. a) Use Two hannels To guarantee no conicts of K packets, the single common channel is split into two separate channels: one for DT and K packet transmission, and the other for ORTS and OTS packet transmission. M-level acknowledgement requires the receiving node of data packets to respond with an K immediately, without exchanging RTS/TS control packets. This implies that K packets are generated by the M layer and they are sent on the data channel which has been used for the corresponding DT reception. 10

11 ORTS () ORTS () G ORTS () OTS (,) DT () K OTS (,) D ORTS (G) ORTS () G ORTS () OTS (G,H) DT (G) K ORTS (G) ORTS () OTS (,) DT () K OTS (,) D ORTS (G) (a) H (b) Figure 6: The proposed directional M mechanism #2: Dotted lines indicate an angle of directional antennas. Observe that, in (a) and (b), node G takes dierent actions when it has data packets for node and H, respectively. Since K packets are transmitted on a dierent channel than other control packets (RTS/TS), conict-free transmission for the K can be guaranteed. b) Exchange nother RTS/TS for K packets We can think of another possible solution for conict-free K packets: RTS/TS exchange for the K itself. single common channel is assumed here. The basic idea is that an K packet is considered as another data packet requiring a successful RTS/TS exchange. Unlike immediate M-level acknowledgement mechanisms described above, K packets are generated by an upper layer such as logical link control (LL). To send the K successfully, another successful exchange of RTS and TS packets is required. Of course, this additional RTS/TS exchange mechanism would decrease bandwidth ef- ciency due to overhead. Thus, there exists a trade-o between reliability of data transmission and the control packet overhead. c) Utilize the Duration Information Omnidirectional RTS packets contain a duration eld that denes the period of time that the channel is to be reserved to complete the actual data transmission and the returning K packets. Therefore, if all nodes within the reception range of an ORTS avoid transmitting the ORTS at the time corresponding OTS or K are expected to be transmitted, collision with Ks will not occur. For the scenario in Figure 6(b), Figure 7 compares the current RTS/TS mechanism in the standard with the second directional M protocol for conict-free Ks in terms of deferred access time at node G. Node G in Figure 7(b) has greater possibility of accessing the medium, compared to that in Figure 7(a), since node uses a directional antenna to transfer data in Figure 7(b). 11

12 Node DIFS RTS SIFS SIFS DT SIFS Node TS K Node G NV (RTS) DIFS ontention Window Defer ccess (a) The urrent RTS/TS Mechanism Node DIFS ORTS SIFS SIFS DT SIFS Node OTS K Node G DIFS ontention Window Defer ccess Defer ccess (b) The Directional M #2 Mechanism Figure 7: onict-free K packets by using duration information (for the topology in Figure 6(b)). 12

13 6 Optimization: dd directional Wait-To-Send (DWTS) packet We showed in Section 5.1 that a simple modication of using directional RTS packets (DRTSs) can potentially improve performance of mobile ad hoc networks. Let us consider another scenario for using DRTS packets. In Figure 8, nodes and communicate with each other for some duration of time, similar to Figure 2. However, unlike Figure 2, where node D has data packets for node E during that period of time, now node E wishes to transmit to node D. When using the rst directional M mechanism, node E sends a DRTS in the direction of node D and expects a OTS packet to be returned from D. Node D may know the fact that node is receiving data packets from node so its OTS reply for node E can disturb node 's data reception from node. Therefore, node D will be silent despite a DRTS from node E until the proposed transmission between and is done. This can cause unnecessary retransmission of directional RTS from E to D (See Figure 8). This situation would happen in the current IEEE protocol as well. D? E DRTS() OTS (, ) OTS (, ) DRTS(E) DT retransmitted DRTS (E) DRTS(E) Figure 8: Useless retransmission of RTS packets One solution to prevent this situation is to introduce a short control packet, a directional Wait-To-Send (DWTS). DWTS messages can be used for preventing useless retransmission of RTS packets by telling how much time to wait before retrying the RTS packets. Thus, a DWTS packet contains a duration eld that indicates the period a node must wait for transmission. When a node receives a directional RTS (DRTS) packet from its neighbor while it is aware of another ongoing transmission, it replies with a DWTS packet to the neighbor that sent the 13

14 DRTS packet. Figure 9 illustrates this mechanism. In the gure, a DRTS packet from node E follows an omnidirectional TS (OTS) packet from node. Upon receiving the DRTS, node D returns a DWTS packet back to node E because D cannot reply with a OTS packet for node E at this time. Using directional WTS packets can avoid retransmission of DRTS packet by node E until the time specied in the duration eld of DWTS packet has elapsed. When E sends the next DRTS (after waiting appropriate duration), node D replies with an OTS (See Figure 9). The main idea of using DWTS packet is to let node E know about how much to wait before retrying the DRTS packet. There may also be other situations where using the DWTS packet is useful. D E DRTS() OTS (, ) DT OTS (, ) DRTS (E) DWTS (D) DRTS(E) OTS (D, E) OTS (D, E) DT Figure 9: Example of adding directional Wait-To-Send (DWTS) packets 14

15 7 Location Information The assumption in the above discussion is that a mobile node knows its own location and neighbors' location accurately { this information is necessary to determine which directional antenna to use either to send DRTS or DT. When the nodes are mobile, it is hard to know precise location of a node at all times. mobile node may inform its location to its neighbor periodically using beacons. lso, the location information could be included in other messages (such as RTS and TS). However, due to node mobility, the location information can become stale. Since we suggest using directional antennas for DRTS and/or data, it is useful to consider how the protocol should be modied when location information is not known accurately. When a node X wishes to send data to node Y, it may send DRTS or ORTS, using our protocols. Of course, for sending ORTS, node X need not know Y's location. However, to send a DRTS, X needs to know the location. If X does not have any location information for Y, then the DRTS may be replaced by ORTS, without loss of correctness. On the other hand, if node X does know, potentially out-dated, location of node Y, then X can transmit the DRTS in the appropriate direction. reply may not received to the rst DRTS, due to various reasons, such as transmission errors or because the out-dated location information resulted in the use of a directional antenna that does not cover the current location of node Y. To deal with causes such as errors, node X may retransmit the DRTS after a suitable back-o interval. However, to recover from out-dated location information, an ORTS must be transmitted. Thus, in general, node X may retransmit the DRTS upto a specied threshold, and then default to using an ORTS. It is important to note that using an ORTS instead of a DRTS does not aect correctness of the M protocol. When sending the data as well, node X uses a directional antenna. Since an RTS/TS exchange precedes data transmission, and since location information of node Y can be included in the TS message, node X has accurate location information. Node X can use this information to choose the appropriate directional antennas. There is always a (small) probability that host Y moves out of scope of the chosen directional antenna during the data transfer. This may result in the loss of the data packet, and may be handled similar to a loss due to transmission errors. 8 Performance Evaluation To evaluate proposed M protocols, we plan a simulation study using a modied version of the ns-2 simulator [4]. In addition, we will also attempt a mathematical analysis. 9 onclusions The current M protocols using omnidirectional Request-to-Send (RTS) and lear-to-send (TS) can waste wireless bandwidth by reserving the wireless medium over large area. To improve bandwidth eciency of the previous M protocols, we propose a new approach, named \directional M", utilizing the directional transmission capability of a directional antenna. 15

16 We considered several possible cases and argued that our directional mechanisms can improve performance by allowing simultaneous transmissions that are not allowed in the current M protocols. We also discussed an optimization using directional Wait-to-Send (DWTS). We are presently doing a simulation study to evaluate our protocols. References [1] \Iowa State University GPS page." Web site at [2] \Wireless LN medium access control (M) and physical layer (PHY) specications," Draft Standard IEEE , P802.11/D1: The editors of IEEE [3] S. orson and J. Macker, \Mobile ad hoc networking (MNET): Routing protocol performance issues and evaluation considerations (Internet-Draft)," Mobile d-hoc Network (MNET) Working Group, IETF, Oct [4] K. Fall and K. Varadhan, \ns Notes and Documentation," ugust Web site at [5] M. Horneer and D. Plassmann, \Directed antennas in the mobile broadband system," in Proc. of IEEE INFOOM '96, pp. 704{712, [6] P. Karn, \M - new channel access method for packet radio," in Proc. of RRL/RRL mateur Radio 9th omputer Networking onfere nce, September [7] Y.-. Ko and N. H. Vaidya, \Location-aided routing (LR) in mobile ad hoc networks," in M/IEEE the 4th nnual Intl. onference on Mobile omputing and Networking (Mobi- om'98), October [8]. Lau and. Leung, \ slotted LOH packet radio networks with multiple antennas and receivers," IEEE Transactions on vehicular technology, vol. 39, no. 3, pp. 218{226, [9] G. T. Okamoto, Smart ntenna Systems and Wireless LNs. Kluwer cademic Publishers, [10] R. Prakash and M. Singhal, \Impact of unidirectional links in wireless ad hoc networks," in The DIMS Workshop on Mobile Networking and omputing, Mar [11] N. Pronios, \Performance considerations for slotted spread-spectrum random access networks with directional antennas," in Proc. of IEEE GLOEOM '89, Nov [12] T.-S. Yum and K.-W. Hung, \Design algorithms for multihop packet radio networks with multiple directional antennas stations," IEEE Transactions on communications, vol. 40, no. 11, pp. 1716{1724, [13] J. Zander, \Slotted LOH multihop packet radio networks with directional antennas," Electronics Letters, vol. 26, no. 25,

Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks

Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks Medium ccess ontrol Protocols Using irectional ntennas in d Hoc Networks Young-ae Ko, Vinaychandra Shankarkumar, and Nitin H. Vaidya epartment of omputer Science Texas &M University ollege Station, TX

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Balanced Media Access Methods for Wireless Networks. Babak Rezvani b and John A. Copeland a

Balanced Media Access Methods for Wireless Networks. Babak Rezvani b and John A. Copeland a alanced Media Access Methods for Wireless Networks Timucin Ozugur a, Mahmoud Naghshineh b, Parviz Kermani b,. Michael Olsen b, abak Rezvani b and John A. opeland a a ommunications Systems enter, Georgia

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

College of Engineering

College of Engineering ollege of Engineering Drexel E-Repository and rchive (ide) http://idea.library.drexel.edu/ Drexel University Libraries www.library.drexel.edu The following item is made available as a courtesy to scholars

More information

MACA-BI (MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Networks. Mario Gerla.

MACA-BI (MACA By Invitation) A Receiver Oriented Access Protocol for Wireless Multihop Networks. Mario Gerla. ( y Invitation) Receiver Oriented ccess Protocol for Wireless Multihop Networks Fabrizio Talucci talucci@cs.ucla.edu Dipartimento di Elettronica Politecnico di ari, Italy Mario Gerla gerla@cs.ucla.edu

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Ad-Hoc Networks Seminar

Ad-Hoc Networks Seminar ellular Network Topology hu backbone network, e.g. leased line d-hoc Networks Seminar Introduction SoSe 2007 2 Terminals communicate only with base stations. ssociation between terminal and base station.

More information

The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas

The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas Hrishikesh Gossain, Carlos Cordeiro, Dave Cavalcanti, and Dharma P. Agrawal OBR Center for Distributed and Mobile

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA. TCP over noisy links. Link layer challenges. Wireless deployments

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA. TCP over noisy links. Link layer challenges. Wireless deployments Overview 15-441: omputer Networking Lecture 25: Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Internet t mobility TP over noisy links Link layer challenges Wireless deployments 2 IEEE

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected to wired relay - responsible for sending

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Multi-channel MAC protocol with Directional Antennas in Wireless Ad hoc Networks

Multi-channel MAC protocol with Directional Antennas in Wireless Ad hoc Networks Multi-channel MA protocol with irectional Antennas in Wireless Ad hoc Networks uc Ngoc Minh ang, Huong Tra Le, Hyo Sung Kang, hoong Seon Hong and Jongwon hoe epartment of omputer Engineering, Kyung Hee

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free

Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free Analyzing and Improving the IEEE 802.11-MAC Protocol for Wireless LANs Jost Weinmiller, Hagen Woesner, Adam Wolisz Electrical Engineering Department Technical University Berlin, Sekr. FT5 Einsteinufer

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks

Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks Hrishikesh Gossain, Carlos Cordeiro, Tarun Joshi, and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

AD hoc wireless networks have attracted a growing

AD hoc wireless networks have attracted a growing IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 12, DECEMBER 2007 1 CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks Thanasis Korakis, Member, IEEE, Gentian

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless CS/ECE 439: Wireless Networking MAC Layer Road to Wireless Multiple Access Media Media access Controlling which frame should be sent over the link next Easy for point-to-point links; half versus full duplex

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Effectiveness of DSDV Protocol Under Hidden Node Environment

Effectiveness of DSDV Protocol Under Hidden Node Environment Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi

More information

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax: Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*,

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Distributed power control over multiple channels for ad hoc wireless networks

Distributed power control over multiple channels for ad hoc wireless networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2012) Published online in Wiley Online Library (wileyonlinelibrary.com)..2266 RESEARCH ARTICLE Distributed power control over multiple

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information