SAUCeR : a QoS-aware slotted-aloha based UWB MAC with cooperative retransmissions

Size: px
Start display at page:

Download "SAUCeR : a QoS-aware slotted-aloha based UWB MAC with cooperative retransmissions"

Transcription

1 WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2011; 11: Published online 24 May 2010 in Wiley Online Library (wileyonlinelibrary.com)..987 SPECIAL ISSUE PAPER : a QoS-aware slotted-aloha based UWB MAC with cooperative retransmissions Hwee-Xian Tan 1*, Mun Choon Chan 1, Peng-Yong Kong 2 and Chen Khong Tham 2 1 Department of Computer Science, National University of Singapore, Singapore 2 Institute for Infocomm Research, Agency for Science, Technology and Research (A*STAR), Singapore ABSTRACT The inherent temporal connectivity and existence of impairments in wireless channels pose challenges to network performance. Cooperative communication has been proposed as an effective technique to mitigate the imperfections of the wireless medium by exploiting channel diversity and availability of neighboring nodes that can act as relays. Although numerous cooperative communication techniques have been proposed in the literature, most of them do not consider Quality of Service (QoS) issues in a wireless sensor network. In this work, we study how cooperative communication can be applied to achieve differentiated QoS in a sensor network that uses Ultra-Wideband (UWB) as its underlying PHY layer technology. is a slotted-aloha based ultra-wideband medium access control protocol with cooperative retransmissions that provides differentiated QoS in networks with varying traffic classes. Despite the high transmission rates provided by UWB, its impulse-based nature renders many conventional carrier sensing MAC protocols incompatible. Consequently, utilizes slotted-aloha to reduce packet collisions without the need for carrier sensing. Differentiated QoS is provided by allocating different resources (time slots) to varying traffic classes to segregate the contention between them. A QoS-aware cooperative retransmission technique and two distributed relay selection schemes are also introduced to improve overall traffic throughput and reduce end-to-end delay, while preventing the starvation of any traffic class. Copyright 2010 John Wiley & Sons, Ltd. KEYWORDS cooperative communication; medium access control; quality of service; ultra-wideband * Correspondence Hwee-Xian Tan, Department of Computer Science, National University of Singapore, Singapore. hweexian@comp.nus.edu.sg 1. INTRODUCTION The inherent temporal connectivity and existence of impairments in wireless channels have long posed challenges to the performance of wireless networks. Cooperative communication [1--6] has been proposed as an effective technique to mitigate the imperfections of the wireless medium by exploiting channel diversity and availability of neighboring nodes that can act as relays of the transmitter. Effectively, instead of the source node retransmitting over the same intermittent link after a failed transmission, an intermediate relay can be used to cooperatively retransmit the overheard packet to the intended destination. Such a communication paradigm has several notable advantages, including high spatial diversity, robustness to channel variations, increased reliability and improved overall network performance. Following the release of First Report and Order [7] by the Federal Communications Commission (FCC) in 2002, which legalized the commercial use of unlicensed Ultra- Wideband (UWB) [8], there has been mounting interest in the adoption of cooperative networking techniques in UWB-based networks. Using very narrow duration pulses for the transmission of bits, UWB is able to achieve extremely large bandwidths and data rates [9]. This makes it a viable physical (PHY) layer technology for use in wireless sensor networks, which can be deployed for a multitude of applications such as healthcare monitoring and tactical surveillance. Cooperative communication techniques have been applied to UWB-based networks at various layers of the networking protocol stack. At the PHY layer, the receiver can combine and decode signals from multiple simultaneous retransmissions using either Amplify and Forward (AF) or Decode and Forward (DF) [10]. In medium access control (MAC) layer cooperative solutions such as UCoRS [11], the receiver can decode only one signal at a time and multiple simultaneous collisions result in packet collisions. Network layer cooperative communication has also 410 Copyright 2010 John Wiley & Sons, Ltd.

2 been proposed [12,13], whereby the next-hop of a routing path is dynamically selected depending on prevailing link conditions. A joint cooperative MAC and routing (JCMR) protocol is presented in Reference [14] to reduce the number of attempts required for successful packet transmissions. However, these existing protocols for UWB-based networks typically do not consider Quality of Service (QoS) issues in their designs. QoS is of particular importance in UWB-based networks [15] as the high bit rates supported by UWB allows data of varying information quality and bandwidth or delay requirements to be collected from the nodes. One such application scenario is a continuous health monitoring system [16], whereby sensors of varying modalities may be deployed for data acquisition. Multimedia data, such as video and voice that are captured by cameras and acoustic arrays, can typically provide richer information content about the environment. Consequently, data traffic that is generated from these sources should be provisioned with better QoS than text-based data containing pressure or temperature information. On the other hand, it is also crucial not to starve low priority data as these may provide valuable information diversity. Although QoS schemes have been proposed in the literature [17], most of them are designed for generic wireless systems and do not exploit the unique characteristics of impulse-based UWB, such as availability of precise location information at low cost and multipath resolution. In this paper, we study how cooperative communication can be used to provide differentiated QoS in a network that uses UWB as its underlying PHY layer technology. is a slotted-aloha based ultra-wideband medium access control protocol with cooperative retransmissions that provides differentiated QoS in a network with varying traffic classes. Despite the high transmission rates provided by UWB, its impulse-based nature renders many conventional carrier sensing MAC protocols incompatible. Consequently, utilizes slotted-aloha to reduce packet collisions without the need for carrier sensing. Differentiated QoS is provisioned by allocating different resources (time slots) to varying traffic classes to segregate the contention between them. A QoS-aware cooperative retransmission technique and two distributed relay selection schemes, viz. Strongest Overall Signal Strength (SOSS) and Random Relay (RR), are proposed to improve overall traffic throughput and reduce end-to-end delay, while preventing the starvation of any traffic class. SOSS exploits localization information that is cheaply available using the UWB PHY to select the best relay. In contrast, RR does not have pre-determined relays; instead, potential relays are assigned relaying probabilities using little overheads such that packet collisions and duplicates are minimized. The efficacy of is demonstrated through both theoretical analysis and simulations. The rest of the paper is organized as follows. Section 2 discusses background and related work. Protocol details of and its analytical framework are presented in Section 3. In Section 4, we evaluate and discuss the performance Beacon CAP active period superframe duration CFP inactive period Beacon Figure 1. Superframe structure of IEEE of using extensive simulations. We conclude this work in Section BACKGROUND AND RELATED WORK 2.1. Medium access control in UWB networks The MAC layer is responsible for the arbitration of resources to the nodes in the network. Existing MAC protocols for wireless networks typically utilize carrier sensing for Clear Channel Assessment (CCA) and to avoid collisions between concurrent transmissions that are within interference ranges. However, the impulse-based nature and low transmission power of UWB makes it difficult for the efficient detection of UWB signals. Consequently, conventional carrier sensing based MAC protocols are incompatible with a UWB PHY [18,19] and special considerations must be given to the design of the UWB MAC protocol [20] to exploit the unique characteristics of UWB [21]. Aloha is considered the most feasible MAC in impulsebased Time-Hopping (TH) UWB networks [21], due to its direct applicability without the need for excessive signaling or control overheads, low duty-cycles which significantly reduces packet collision probability, and in-built medium access mechanism based on TH codes. As such, a number of aloha-based MAC protocols for UWB networks have been proposed in the literature [19,22--26]. The IEEE a standard for LR-WPANs (Low- Rate Wireless Personal Area Networks) [23] which includes UWB as an alternative PHY uses slotted-aloha for medium access. It adopts a superframe structure (Figure 1) similar to IEEE [27] to allow for interoperability between existing narrowband WPANs and UWB-based WPANs. Each superframe comprises of a beacon, an active period and an inactive period. The time slots within the active period can be further divided into contention access period (CAP) and contention free period (CFP). U.C.A.N. [24] adapts the IEEE MAC standard with the inclusion of additional ranging and relaying features, and uses slotted-aloha instead of CSMA/CA for random access during the CAP of the superframe. (UWB) 2 [25] is a multi-channel MAC protocol that adopts a pure aloha approach and uses a common TH code as the control channel. Dedicated data channels are provided via transmitter-oriented TH codes that are distributed using a Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 411

3 code assignment algorithm. In Reference [26], the authors show that the performance of (UWB) 2 improves when slotted-aloha is used instead of pure aloha in high traffic loads, due to lower probability of packet collisions. Tan et al. [19] evaluates the performance of slotted-aloha over TH-UWB in a single-hop sensor network. SASW-CR [22], which is a QoS MAC protocol for UWB networks, utilizes slotted-aloha for medium access in each MAC frame. A UWB-based joint PHY/MAC protocol based on Dynamic Channel Coding (DCC) has also been proposed in Reference [28]. Instead of enforcing mutual exclusion, DCC-MAC adapts channel codes and uses incremental redundancy to mitigate interference. Contention among sources with the same intended destination is then resolved using a private MAC that is achieved via a combination of receiver-based and invitation-based selection of TH sequences. Despite the widespread adoption of aloha to avoid carrier sensing in impulse-based UWB networks, it should be noted that there exists alternative mechanisms for CCA in these networks. August et al. [29] proposes the use of a pulse sense mechanism which enables the detection of a busy medium by examining the spectral power components of the received signal. It thus provides a service that is synonymous to carrier sensing in the narrowband domain, at the cost of additional circuit complexity MAC layer cooperative communication Cooperative communication is an effective technique to leverage the advantages of spatial diversity without the need for complex signal processing and presence of multiple antennas on a tiny sensor node. By overhearing and buffering packets that are transmitted by the neighbors, a node can potentially help to retransmit a failed direct transmission to the destination and thus improve transmission quality. Existing work on MAC layer cooperative communication includes [4,11,30--32] and involves two main issues: (i) selection of neighbors to help in the relaying process; and (ii) assignment of relaying probability to each selected neighbor. The selection of neighbors as relays may be based on the shortest distance to the destination, best link quality, lowest traffic load, and/or highest remaining energy. In situations where multiple relays are selected to help in the cooperative retransmission process, different relaying probabilities (or backoff delays) are usually assigned to potential relays to minimize packet collisions and duplicates. However, these schemes do not consider QoS issues in the network. Although SASW-CR [22] studies cooperative communication with resource allocation based on QoS, it uses a deterministic relay selection mechanism that is not robust in the face of temporal link connectivity QoS MAC protocols in UWB networks Generally, network QoS can be provisioned in two ways: (i) guaranteed QoS; and (ii) differentiated QoS. In guaranteed high priority CW total CW size low priority CW Figure 2. Contention window (CW) of IEEE e. QoS, a specific traffic class (usually the one with higher priority) is provided with specific performance guarantees. For instance, the delay incurred for high priority traffic should always be less than a certain threshold. However, in a wireless network where channel quality is transient and time-varying, it may be more practical to provide differentiated QoS, whereby relatively better service is provided to a particular traffic class over another, without any guarantee on the qualitative performance. For instance, the delay incurred for high priority traffic should always be lesser than that incurred by low priority traffic. The standard protocol which provides QoS support for WLANs (Wireless Local Area Networks) is IEEE e [33]. The Distributed Coordination Function (DCF) in IEEE e uses CSMA/CA and a backoff mechanism for contention resolution within a contention window. In order to provide QoS support, Enhanced Distributed Channel Access () is used to assign different traffic priority classes to varying types of traffic. The different priority classes in each node utilize non-overlapping contention windows of varying sizes. The contention window for high priority traffic precedes that for low priority traffic (see Figure 2); this is achieved by using shorter backoff periods for high priority traffic. Consequently, the high priority traffic from a particular node can achieve higher average throughput and less average delay than the low priority traffic that is generated from the same node. However, contention between high and low priority traffic from different nodes can still happen as contention windows belonging to a particular class of traffic at one node may overlap with another traffic class at another node. Low priority traffic may be delayed infinitely by high priority traffic, and vice versa. Starvation of one traffic class may also occur when traffic is dominated by the other traffic class. In addition, IEEE e is not suitable for UWB WSN as it requires carrier sensing. A centralized MAC for QoS support has been proposed in the context of UWB-based sensor networks [34,35]. A joint scheduling and resource control algorithm is used to assign each transmission session to a time slot, as well as to dynamically assign transmission rates and powers to nodes. The algorithm is based on a superframe structure and can differentiate between QoS and best effort traffic types; however, it does not prevent starvation of best effort traffic. Reference [36] presents a distributed MAC that uses separate data and control channels based on different TH sequences. The adaptive resource allocation algorithm assigns power and bit rates according to prevailing traffic conditions; however, each node has to keep track of the current condition of the entire network. 412 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

4 Our proposed MAC protocol for UWB sensor networks combines the frame structure of IEEE with differentiated contention windows in the component of IEEE e to provide differentiated QoS. In addition, it utilizes a QoS-aware cooperative retransmission technique and two distributed relay selection schemes that exploit the unique characteristics of UWB to improve overall throughput and reduce packet delays. T beacon H cwin T frame T data L cwin T slot time 3. : PROTOCOL DESCRIPTION In this section, we describe the protocol details of a slotted-aloha based UWB medium access control protocol with cooperative retransmissions that provides differentiated QoS in networks with varying traffic classes. We first present the network and traffic models, followed by the three main mechanisms of : (i) resource allocation; (ii) cooperative retransmission; and (iii) relay selection Network model is a distributed MAC protocol that can be applied in generic sensor networks. For ease of illustration, we consider a subset of the network comprising of N sensor nodes connected to a destination node via a single hop link. The underlying PHY layer used by is TH-UWB, whereby each signal is transmitted over several symbols, and each of these symbols comprises of a burst of extremely short pulses. The transmitted signal undergoes large scale fading, which can be characterized by Reference [37]: PL(d) = PL n log 10 d d 0 + S (1) where d is the distance between the transmitter and the receiver; d 0 is the reference distance of 1 meter; PL 0 is the pathloss at the reference distance; n is the pathloss exponent; and S is a Gaussian-distributed random variable with zero mean and standard deviation σ S. Due to the impulse nature of TH-UWB, carrier sensing is not feasible. Although slotted-aloha requires time synchronization and incurs more control overheads than pure aloha, it has been shown to provide better throughput performance than the latter [26], and is directly inter-operable with the IEEE a standard [23], which also uses slotted-aloha. Furthermore, time synchronization can be provided with high accuracies at low cost in impulse-based TH-UWB networks [38]. Consequently, makes use of slotted-aloha as the MAC protocol with TH-UWB incorporated into the frame structure [19]. In the simplified frame structure as shown in Figure 3, a beacon slot B of length T beacon precedes each MAC frame and is used for various purposes such as synchronization, signaling and other network status updates. To minimize B m Figure 3. Slotted-aloha with TH-UWB. collisions in dense and/or multihop networks, each node transmits beacons only when updates are necessary. The beacon frequency is dependent on various factors such as node mobility and link transitivity, and has to be selected such that adapts its resource allocation quickly enough without excessive overheads. A frame also comprises of m time slots, each of length T slot. A node selects only one out of the m possible time slots within each T frame to transmit its data. Each data packet (and its corresponding ACK) is assumed to be transmitted within T slot. A packet collision (and subsequently packet loss) arises whenever one or more packets are transmitted in the neighborhood using the same time slot. Packet losses may also arise due to radio propagation impairments Traffic model and QoS provisioning We assume that all the N neighboring nodes of the destination in the network can be classified as high priority or low priority nodes, depending on the traffic class (or modality) of the data they generate. Figure 4 shows a network topology whereby the different nodes in the network generate data of different priorities to be transmitted to a particular destination. provides differentiated QoS support in the following ways: Maximize the total traffic throughput; Prevent starvation in all traffic classes by allocating as least R proportion of the resources (time slots) to each traffic class; and Improve transmission quality and QoS of high priority traffic whenever possible through exploitation of cooperative retransmissions by low priority nodes Resource allocation To segregate contention between the two different traffic classes and prevent starvation of either class, the T data portion of the frame structure of slotted-aloha with TH-UWB (as shown in Figure 3) is further divided into two disjoint components: (i) high priority contention window H cwin ; Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 413

5 destination high priority node low priority node high priority traffic low priority traffic Figure 4. Network topology. and (ii) low priority contention window L cwin. High priority nodes uniform-randomly select one slot within H cwin to transmit data, while low priority nodes in the network select from L cwin to transmit data. Recall that m is the total number of time slots within each MAC frame. We further denote the number of time slots within H cwin and L cwin as H cwin and L cwin, respectively, where H cwin + L cwin =m. Let the number of active nodes (as seen by the destination) within the previous time epoch be N a N; the number of active high priority nodes and low priority nodes within the previous time epoch are given by N H and N L, respectively, where N a = N H + N L. The corresponding values of H cwin and L cwin are adaptively adjusted based on N H and N L using Algorithm 1, and broadcasted by the destination to its neighboring nodes during the beacon duration T beacon after each update. Algorithm 1 Resource allocation in. Require: N H - number of active high priority nodes N L - number of active low priority nodes N a - total number of active nodes m - total number of time slots in each T frame R - minimum proportion of resources to be allocated to each traffic class Ensure: H cwin R m and L cwin R m if N H <= R N a then H cwin =R m L cwin =m H cwin else L cwin =R m H cwin =m L cwin end if return The following describes the resource allocation component of as illustrated in Algorithm 1. If the proportion of active high priority nodes in the last time epoch is less than or equal to R (i.e., N H R N a ), where 0 < R 0.5 is a pre-determined threshold, prevents starvation of high priority traffic by allocating R m slots to H cwin. The remaining (1 R) m slots are allocated to low priority nodes, which can use them for direct transmission of low priority traffic or cooperative retransmission of high priority traffic. Otherwise, if the proportion of active low priority nodes in the last time epoch is less than or equal to R (i.e., N H > R N a ), allocates R m slots to L cwin to prevent starvation of low priority traffic. The remaining slots are allocated to H cwin to improve the QoS of high priority traffic. By ensuring that the minimum proportion of resources allocated to each class at any time is at least R, can effectively minimize starvation of either traffic class. In addition, through the use of differentiated contention windows such that H cwin precedes L cwin within each MAC frame, can achieve differentiated QoS between high and low priority traffic Cooperative retransmission utilizes cooperative retransmissions to improve overall transmission quality and QoS of the higher priority traffic class. It exploits the broadcast nature and channel diversity of wireless communications by overhearing neighboring packet transmissions and opportunistically relaying packets that are lost during the initial direct transmission between the source node and the intended destination. Each node i in the network maintains two buffers (or queues): (i) data queue, which stores data packets generated by i; and (ii) overhearing buffer, which stores data packets that are successfully overheard by i. It should be noted that only the originally transmitted data packet will be buffered by neighboring nodes; a cooperatively retransmitted packet that is overheard will not be buffered by any node. This eliminates the ping-pong effect of having multiple relays that cooperatively retransmit the same data packet in subsequent MAC frames. During each MAC frame, node i may transmit a data packet from either its data queue or overhearing buffer, depending on its current mode: Selfish Mode Node i always transmits its own packet from the data queue if the queue is not empty. If the data queue of node i is empty, it selects a packet from its overhearing buffer to transmit. Selfless Mode Node i always selects a packet from the overhearing buffer to relay (if the overhearing buffer is not empty), instead of transmitting from its own 414 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

6 LP overhearing dest data packet HP LP overhearing dest ACK HP Figure 5. Overhearing behavior without cooperative retransmission. (a) LP node overhears data packet; (b) LP node overhears ACK. data queue. If the overhearing buffer is empty, node i transmits its own packet from the data queue. A high priority node is always in selfish mode and will cooperatively retransmit only when its data queue is empty. In contrast, a low priority node may be in either of the two modes. A low priority node i is in selfless mode only when the following two conditions are satisfied: 1. the packet delivery ratio of data packets generated by i is at least R; and 2. the proportion of low priority nodes is at least R, i.e., N L R N a. Otherwise, node i will be in selfish mode to prevent starvation of low priority data. It is assumed that the ACK corresponding to each data packet can be received correctly by all the one-hop neighbors of the destination node within the same time slot. This is a common assumption in many wireless network models, as ACK packets are usually small in size and therefore have lower packet error probabilities. Hence, all copies of an arbitrary data packet D (in the data queue of the source node and overhearing buffers of all nodes that have overheard D) will be removed when the destination has received D and transmitted a corresponding ACK. Figure 5 illustrates the overhearing behavior between a high priority node (HP), a low priority node (LP), and the destination node, when cooperative retransmission is not required. In Figure 5(a), HP transmits its data packet to the destination. LP, which is currently idle, overhears the data packet and stores it in its overhearing buffer. Upon successful reception of the data packet, the destination sends an ACK to HP, which subsequently removes the data packet from its data queue. Since LP overhears the ACK in Figure 5(b), it knows that the data packet has been successfully received by the destination and thus, LP also removes the data from its overhearing buffer. Figure 6 illustrates the overhearing behavior between the high priority node HP, low priority node LP and the destination when cooperative retransmission is triggered. At time t 1, HP transmits data packet D 1 to the destination during H cwin. Due to radio propagation impairments, the destination is unable to receive D 1 ; however, LP is able to overhear D 1 and stores it in its overhearing buffer. At time t 2 (during L cwin ), LP selflessly retransmits (relays) D 1 on behalf of HP (since D 1 is of a higher priority and no ACK has been transmitted for D 1 from the destination yet). Upon successful reception of D 1 from LP, the destination transmits an ACK, which is received by both HP and LP. Both HP and LP then remove D 1 from the data queue and overhearing buffer, respectively. Hence, at time t 3, HP need not retransmit D 1 and can proceed on to send the next packet D 2 from its data queue. Due to the cooperative retransmission by LP, the delay of D 1 is reduced by at least t 3 t Relay selection In a realistic network, the direct transmission of a data packet D may be overheard by more than one neighboring nodes. Figure 7 illustrates a network whereby the transmission of D by a high priority node HP may be overheard by 3 low priority nodes LP 1, LP 2, and LP 3 which are of varying distances to the destination. If D does not reach the destination successfully, LP 1, LP 2, and LP 3 become the H cwin L cwin H cwin dest D 1 D 1 A HP dest does not receive D1 dest receives D1 dest receives D2 D 1 LP overhears D1 and transmits it D 1 LP D 1 A D 2 A D 2 D 2 HP transmits D1 HP transmits D2 A A LP overhears D2 A t 1 t 2 t 3 time Packet transmission Packet reception Figure 6. Overhearing behavior with cooperative retransmission. Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 415

7 HP LP 1 LP 2 high priority node dest LP 3 low priority node overhearing potential retransmission Figure 7. Cooperative retransmission with multiple relays. potential relays to cooperatively retransmit the overheard packet to the destination. However, it is inefficient to have all LP 1, LP 2, and LP 3 retransmitting the same data packet to the sink on behalf of HP, as this may increase packet collisions as well as unnecessarily deteriorate the throughput performance of low priority data. It is therefore important to select an appropriate number of suitable relays to participate in each cooperative retransmission process. It has been shown in existing literature that the optimal number of relays that should help to cooperatively retransmit a packet is one, when the link quality of the cooperative transmission is relatively good [11]. Instead of using an election algorithm to select the optimal relay(s), which is expensive as it requires inter-nodal communications, makes use of simple and distributed schemes to select the best relay(s) in a network. In the following, we describe our generic relay selection framework and two specific schemes that can be incorporated into, viz. SOSS and RR. Table I summarizes the symbols and notations used in the description and analysis of our proposed relay selection schemes. The one-hop neighborhood of a source node s is denoted as N s. When the direct transmission of a data packet D from the source node s to the destination node d fails, each node i N s independently and distributively determines if it should be a relay for D; the probability that i is willing to cooperatively retransmit D to d under such circumstances is denoted as p i r. Note that here, a potential relay helps to cooperatively retransmit only packets generated by nodes from the other traffic class, i.e., traffic originating from high priority nodes will only be relayed by low priority nodes, and vice versa. This is due to the structure of the MAC frame, whereby the high priority contention windows H cwin and low priority windows L cwin alternate; hence, selecting a relay from the same priority class may not yield significant delay savings. In addition, a high priority node that helps to relay packets for a low priority node will not cause detrimental effects to the performance of high priority traffic, since a high priority node is always is selfish mode and will help to relay packets only when it does not have any data to send. With the use of cooperative retransmissions, a packet D may still fail to reach the destination under any of the below situations: The direct transmission from s to d fails, and s does not have any potential relays to help retransmit D. The direct transmission from s to d fails, and none of the potential relays in N s successfully retransmit D. Denoting the link error probability of a cooperative retransmission as Pe c, the probability P u i that an arbitrary relay i N s does not successfully retransmit packet D is the probability that: (i) i does not overhear D successfully; (ii) i overhears D successfully, but does not help to cooperatively retransmit D; or (iii) i overhears D successfully, cooperatively retransmits D, but the retransmitted packet does not reach the destination successfully. Hence, Pu i is Table I. Summary of symbols and notations used. Symbol Description L Normalized traffic load (0 L 1) m Number of time slots per MAC frame N s One-hop neighborhood of source node s N H Set of high priority nodes, equivalent to set of potential relays of a low priority source node N L Set of low priority nodes, equivalent to set of potential relays of a high priority source node Pe d Link error probability of direct transmission link Pe c Link error probability of cooperative retransmission link pr i Relaying probability of a potential relay i p r (common) Relaying probability such that pr i = pk r,i k H cwin Contention window size of high priority traffic L cwin Contention window size of low priority traffic 416 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

8 given by P i u = P c e + (1 P c e ) (1 pi r ) + (1 P c e ) pi r P c e (2) In the following derivations, it is assumed that the probability of packet collisions is negligible (as cooperative relays are typically used only when the traffic load is low) and s does not retransmit at all if its direct transmission to the destination fails. Denoting the link error probability of a direct transmission as Pe d, the probability P f that packet D fails to reach the destination is then given by P f = P d e P i u (3) i N s The (expected) improvement on high priority traffic throughput per MAC frame I H is achieved when at least one potential relay successfully retransmits high priority packets whose direct transmissions to the destination have failed, and is given by I H = min( H cwin LP d e (1 P i u ), i N L L cwin ) (4) where 0 L 1 is the normalized traffic load; and N L is the set of low priority nodes (taken to be equivalent to set of potential relays of a high priority source node s). As low priority traffic may also be relayed by high priority nodes when high priority nodes do not have packets to transmit, the (expected) improvement of low priority traffic per MAC frame I L is I L = min( L cwin LP d e (1 L)(1 P i u ), i N H H cwin ) (5) where N H is the set of high priority nodes (taken to be equivalent to set of potential relays of a low priority source node s). The corresponding loss on low priority traffic throughput L L is due to low priority nodes relaying high priority traffic at the expense of low priority traffic. The loss happens when there is at least one low priority node that overhears the packet successfully and is willing to relay it; this includes relayed packets that are not successfully transmitted to the destination, and is approximately L L = min( H cwin L 2 P d e [1 (1 P c e )pi r ], i N L L cwin ) (6) Finally, the overall improvement achieved per MAC frame I total is I total = I H + I L L L (7) In our analysis above, it is assumed that the link error probability of each ACK is zero. This assumption is common in many network models due to the small size of ACKs, which reduces its packet error probability. Although the occasional loss in ACK may cause unnecessary cooperative retransmissions to be triggered by potential relays, resulting in the reception of duplicate packets, these occurrences are very infrequent and will not cause originally successful packet transmissions to be lost Strongest overall signal strength (SOSS). We first note that the successful reception of any packet between two arbitrary nodes i and j in a wireless channel is inherently dependent on the signal strength P ij of the packet at the receiver node j. This signal strength P ij can be derived from the large-scale fading model in Equation 1, which is in turn dependent on the distance between i and j. Typically, a higher signal strength denotes a higher probability of successful packet reception. Due to the wide bandwidth provided by UWB and its high resolution capability in the time domain [39], it can achieve extremely precise ranging results using Angle-of-Arrival (AoA), Time-of-Arrival (ToA), and Time-Difference-of- Arrival (TDoA) techniques. Most of these localization schemes can be implemented with low complexity [40] and low cost [41,42]. Consequently, each source node s is assumed to have complete location information of the set of potential relays N s in its one-hop neighborhood, which can be readily provided by the underlying UWB PHY. Note that for each potential relay i N s, the destination node d is assumed to be within the transmission range of i. Any other neighboring node of s that does not have the destination d in its neighborhood will not be able to serve as a potential relay between i and d. Using known location information of its potential relays N s and the destination d, s can compute the estimated the signal strengths P si and P id i N s before transmitting each data packet D to d. The node j N s with the largest value of P sj + P jd will have its node identifier j included in the packet header. All other nodes which overhear D will discard it; only j will store D in its overhearing buffer and retransmit it later if necessary. However, if the selected relay j fails to overhear D during the initial direct transmission from s to d, then cooperative retransmission will not take place. Essentially, the SOSS scheme is a specific case of relay selection whereby p j r = 1 and pi r = 0 i N s \ j. Figure 8 illustrates how the overall throughput improvement Itotal SOSS varies with different traffic loads L, when Pe d = 0.5, m = 8 and R = 0.5 such that N H = N L and H cwin = L cwin = m. The optimum throughput improvement of SOSS is dependent on Pe c and generally achieved 2 when the traffic load L<0.5. For high traffic loads (L > ), the throughput improvement can be negative as the throughput loss of low priority traffic exceeds the total throughput improvement of high and low priority traffic, i.e., Loss L > (I H + I L ). When link error probability Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 417

9 SOSS throughput improvement I total c P c e = 0.1 P e c = 0.25 P e = traffic load L Figure 8. Throughput improvement of SOSS with P d e = 0.5, m = 8, R = 0.5 and N H s = N L s =4. of cooperative retransmissions is less than that for direct transmissions, i.e., Pe c <Pd e = 0.5, cooperative retransmissions is generally not used as it cannot improve transmission quality. As nodes which are nearer to the source s typically experience lower link error rates, these nodes should be used as relays in preference to nodes that are located further away. The pre-selection of a relay j using SOSS before direct transmission of packet D from source s to destination d ensures that only one node will cooperatively retransmit each packet, thus reducing packet collisions and overheads, eliminating packet duplicates, as well as maximizing the gain of cooperative retransmissions. However, as SOSS is mainly designed for relatively static networks where nodes have little or no mobility and links have little variation, the pre-selection of a particular relay may not fully exploit the gains of cooperative retransmissions all the time. In particular, when nodes are mobile or when there are frequent link variations in the cooperative channel, the pre-selected relay may not be able to retransmit the packet to the destination successfully. Under such circumstances, time synchronization as well as localization and network status updates must then be performed more frequently to ensure that the best relay is selected whenever possible. In Section 3.5.2, we describe the RR selection scheme, which is more robust in varying network conditions Random relay. In the random relay selection scheme, we let each node i N s have equal probability to be a relay for s such that p i r = pk r i, k N s,i k. The common relaying probability p r = p i r i N s is then chosen such that P f <T (8) where 0 <T<1 is a threshold that determines the probability that packet losses are acceptable in. A smaller value of T reduces the packet loss ratio but increases the relaying probability p r of each node, which can lead to increased cooperative retransmission attempts. However, relaying probability p r T=0.01 T=0.05 T= number of potential relays N s Figure 9. Relaying probability p r with Pe d = 0.5, P e c = 0.2 and varying values of T. as copies of each successfully delivered packet are flushed from the data queue and overhearing buffers of the source and its potential relays upon reception of an ACK, the likelihood of packet duplicates and collisions remains small. Figure 9 illustrates how the relaying probability p r varies as the number of potential relays N s increases. It can be seen that as N s increases, p r decreases to minimize the number of cooperative retransmission attempts among the potential relays. Figure 10 shows the total throughput improvement Itotal RR as traffic load L increases, when Pe d = 0.5, m = 8 and R = 0.5 such that N H = N L and H cwin = L cwin = m. The number 2 of potential relays for each traffic class is taken to be Ns H = Ns L =4and the corresponding values of p r for each value of Pe c are chosen to satisfy T = As like the SOSS scheme, there exists an optimal traffic load whereby the throughput improvement of the relay selection scheme is at its peak; however, it can also be observed that the RR scheme generally achieves higher throughput improvements than SOSS for varying traffic loads. In our study, each node uniform-randomly selects one slot for data transmission, from the H cwin and L cwin contention windows within the m slots that are available in a MAC frame. When the number of potential relays N s is much larger than m, excessive collisions can occur when multiple RR throughput improvement I total c P e = 0.1 c P e c = 0.25 P e = traffic load L Figure 10. Throughput improvement of RR with P d e = 0.5, m = 8, R = 0.5 and N H s = N L s = Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

10 potential relays attempt to select the same transmission slot to cooperatively retransmit the same packet. However, the optimal throughput gain is achieved when only one relay successfully retransmits the same packet. Hence, an alternative method to the uniform-random selection of slots, is to adopt a truncated geometric distribution as like the one used in the Sift MAC protocol [43], which can help to reduce the number of potential relays that cooperatively retransmit a packet. In the next section, we evaluate the performance of using simulations and considering more complex scenarios whereby: (i) packet collisions can occur; (ii) the proportion of high priority and low priority nodes may not be equal; (iii) the source node is allowed to retransmit once when the direct transmission fails; and (iv) the relay can be from the same traffic class. 4. PERFORMANCE EVALUATION We evaluate the performance of in Qualnet 4.0 [44] and compare it with, which is used by IEEE e for QoS support, using the same underlying UWB physical channel and slotted-aloha MAC frame structure. We adapt to work with TH-UWB and slotted-aloha in the following way: Within each MAC frame, 1 R of the first m time slots are allocated to high priority nodes and the remaining R proportion of the time slots are allocated to low priority nodes. Upon a successful data transmission, a node re-initializes its MAC frame at the next time slot; therefore, the MAC frames of different nodes may not be synchronized (i.e., may not start at the same time) in. In the event of packet loss, each source node in and is allowed to have another retransmission attempt. The network size is fixed at N = 32 sensor nodes (sources) and 1 destination. The destination node is within the transmission ranges of all the 32 sensor nodes; hence, each of them is a potential relay for all the other nodes (of a different traffic class) in the network. Two classes of traffic, viz. high priority and low priority, are generated at the sensor nodes. The number of nodes that generate low priority data N L is increased from 2 to 30; the corresponding number of nodes that generate high priority data N H = N N L is decreased from 30 to 2. The traffic load L used in all our simulations is 20%. Parameter Table II. Simulation parameters. Value Transmission power dbm Channel frequency 4 GHz Center frequency MHz Channel bandwidth MHz Network size N 32 Time slot length T slot 0.5 ms No. of time slots m 8 Frame length T frame 8 T slot = 0.5ms Time epoch (s) 200 T frame = 0.8s Packet size (bytes) 46 Traffic load L 20% Pe d 0.5 Pe c {0.1, 0.2, 0.3, 0.4, 0.5} R {0.1, 0.2, 0.3, 0.4, 0.5} Threshold T 0.01 The number of time slots m is fixed at 8 per MAC frame. The time epoch has a duration of 200 T frame, where T frame = 4ms; hence, the destination updates its resource allocation and broadcasts the new allocation periodically after every 0.8 s. The link error probability of direct transmission Pe d is fixed at 0.5, while the link error probability of cooperative transmission Pe c is varied between 0.1 and 0.5 under different scenarios. The link error probabilities of packet transmissions between different node pairs are assumed to be independent and random. The value of the threshold T used in Equation 8 is set to The various parameters used in our simulations are summarized in Table II Varying numbers of HP and LP nodes Figures illustrate the performance of and in a network with varying number of LP nodes N L. The relay selection mechanism used in is SOSS, normalized HP throughput (a) (b) (c) no. of LP nodes N L normalized LP throughput no. of LP nodes N L normalized total throughput no. of LP nodes N L HP Throughput (b) LP Throughput (c) Normalized total throughput Figure 11. Throughput performance with varying N L. (a) HP Throughput; (b) LP Throughput; (c) Normalized total throughput. Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 419

11 (a) (b) HP PDR LP PDR no. of LP nodes N L no. of LP nodes N L HP PDR LP PDR Figure 12. PDR performance with varying N L. (a) HP PDR; (b) LP PDR. whereby a fixed relay is used for each data packet. The value of R is set to 0.3; hence, the minimum proportion of resources (time slots) that are allocated to each class of traffic is 0.3. The link error probability of cooperative retransmissions Pe c is fixed at 0.1. As N L increases, the generated number of LP data packets increases while the generated number of HP data packets decreases correspondingly. This results in decreasing HP throughput for both and as shown in Figure 11(a), and increasing LP throughput as shown in Figure 11(b). Figure 11(c) shows that the normalized total throughput achieved by is approximately 15 45% higher than that achieved by for varying values of N L. The throughput improvement is brought about by the joint use of disjoint contention windows and cooperative retransmissions, which efficiently increases the effective utilization of the shared communication channel and reduces the number of packet collisions between the two traffic classes. Figure 12 shows that the performance improvement in packet delivery ratio (PDR) for HP and LP traffic using is approximately 10 and 30%, respectively. As N L increases, HP PDR generally increases as there is less collisions among the HP traffic and LP PDR decreases due to increased collisions among the LP traffic. Note that the slight drop in HP PDR in Figure 12(a) and corresponding increment in LP PDR in Figure 12(b) when N L 24 is due to the starvation prevention measure of, which allocates R of the time slots to HP nodes and the remaining (1 R) time slots to LP nodes, when N H R N a. The delays achieved by and under varying N L are illustrated in Figure 13. As does not utilize cooperative retransmissions and may have overlapping contention windows for its traffic classes, its HP delay and LP delay remain the same as N L increases. The HP delay of decreases as N L increases due to decreased collisions among the HP traffic. The slight increase in HP delay at N L 24 is due to the allocation of only R time slots to HP traffic in contrast to the greater proportion of (1 R) slots when N L < 24. The LP delay of also increases correspondingly as N L increases due to the increased collisions among LP traffic. Overall, incurs up to 35% shorter delays as compared to. We have also compared and as Pe c varies from 0.1 to 0.5 when N L increases. Although similar trends in performance are observed, the improvement of over decreases with increasing Pe c due to the reduced effectiveness of cooperative retransmissions Varying values of R We study the effect of varying R from 0.1 to 0.5, on the performances of and in Figure 14. The value of Pe c is fixed at 0.1 and the proportions of HP and LP nodes in the network are equal, i.e., N H = N L = 16. The neighboring node with SOSS is selected as the relay in the event of failed direct transmissions. Figure 14(a) shows that the HP PDR achieved by remains relatively constant as R increases from 0.1 to (a) (b) (c) avg HP delay (ms) no. of LP nodes N L Average HP delay avg LP delay (ms) no. of LP nodes N L Average LP delay avg delay (ms) no. of LP nodes N L Average delay Figure 13. Delay performance with varying N L. (a) Average HP delay; (b) Average LP delay; (c) Average delay. 420 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

12 (a) 0.9 HP PDR R HP PDR (b) LP PDR R LP PDR (c) normalized total throughput R Normalized total throughput Figure 14. Throughput performance with varying R. (a) HP PDR; (b) LP PDR; (c) Normalized total throughput. Due to the overlapping contention windows between HP and LP traffic from different nodes, the increased proportion of time slots that is allocated to LP traffic (with increasing R) does not significantly affect the performance of HP PDR in. In contrast, the HP PDR achieved by dips slightly when R 0.4 as the increased proportion of time slots that is allocated to LP traffic (with increasing R) causes the number of collisions among HP traffic to increase. Despite this, the HP PDR achieved by is 20 30% higher than that achieved by due to the cooperative retransmission used in, which improves transmission quality. The LP PDR shown in Figure 14(b) generally increases with increasing R for both and. As R increases, more time slots are allocated to LP traffic, which decreases LP packet collisions and improves LP throughput. From Figure 14(c), it can be seen that the normalized total throughput of is about 25% more than that obtained by for various values of R. We note from Figure 15 that the delays incurred by for HP and LP traffic generally remains constant for varying R as the contention windows H cwin and L cwin used by different nodes overlap; therefore, allocating a greater proportion of time slots to LP traffic does not have significant impact on its delay performance. The HP delay incurred by increases slightly with increasing R as more cooperative retransmissions take place when the proportion of time slots that are allocated to HP traffic decreases. The LP delay of decreases with increasing R due to the reduction in LP packet collisions when more time slots are allocated to LP traffic (with increasing R). Overall, incurs much smaller delays than due to the use of cooperative retransmissions and disjoint contention windows. As like in Section 4.1, the performance improvement of over decreases with increasing Pe c. This is consistent with our analytical results in Section Varying link error probability In a wireless network, there may be frequent variations in mean link error probabilities of the physical medium. We study the performance of using the two proposed relay selection schemes SOSS and RR as the mean link error probabilities of cooperative retransmissions Pe c increases from 0.1 to 0.5. For instance, if the mean value of Pe c is 0.4, then the probability that a cooperative retransmission fails is 0.4. The link error probability of the direct transmission Pe d is set to a constant of 0.5 while the value of R is set to 0.3. The proportion of HP and LP nodes is set to 50% each such that N H = N L = 16. In the following figures, we do not include the performance of as both relay selection schemes in perform better than. Figure 16 shows the throughput performances of SOSS and RR with varying values of the mean link error probability Pe c. As the mean value of P e c increases, the throughputs of both SOSS and RR decrease correspondingly as there are less successful cooperative retransmissions. When the mean value of Pe c is low at 0.1, using SOSS to select a (a) (b) (c) avg HP delay (ms) avg LP delay (ms) avg delay (ms) R Average HP delay 15 R Average LP delay 15 R Average delay Figure 15. Delay performance with varying R. (a) Average HP delay; (b) Average LP delay; (c) Average delay. Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 421

13 (a) 0.8 (b) 0.8 (c) SOSS SOSS RR RR HP PDR c Link error P e HP PDR LP PDR c Link error P e LP PDR normalized total throughput SOSS RR 0.12 c Link error P e Normalized total throughput Figure 16. Throughput performance with varying link error probability Pe c. (a) HP PDR; (b) LP PDR; (c) Normalized total throughput. fixed relay provides better performance as the throughput gain of cooperative retransmissions is maximized with fewer packet duplicates. However, as the mean value of Pe c increases, the likelihood that a fixed relay overhears a directly transmitted packet and cooperatively retransmits it successfully, decreases. Therefore, using multiple random relays maximizes the likelihood of successful cooperative retransmissions and improves overall transmission quality. We also study the throughput performance of SOSS and RR as the mean value of lognormal shadowing in the physical channel increases from 2 db to 10 db, in Figure 17. The increase in the shadowing mean also correspond to an increase in the link error probability, as the received signal strength becomes smaller. The throughput performances of both relay selection schemes under varying shadowing mean values are similar to that under varying mean link errors Pe c (in Figure 16). When the shadowing mean is low ( 4 db), SOSS performs better than RR as the average channel quality is better and using a fixed relay reduces packet duplicates while improving the overall transmission quality. As the shadowing mean increases, the channel quality decreases; hence, the use of multiple relays in RR improves the number of successful cooperative retransmissions and overall transmission quality Summary We have studied the performance of under varying proportions of traffic classes (N H and N L ), varying proportions of minimum time slots that are allocated to each traffic class (R) and varying mean link error probability Pe c. From our simulation results and analysis, it can be seen that provides good performance improvements as compared to existing QoS-aware MAC protocols such as. This is due to the cooperative retransmission technique used in, as well as its resource allocation mechanism, which allocates disjoint contention windows to different traffic classes in order to segregate the contention between them. We have investigated two different schemes to select relays in : (i) SOSS and (ii) RR. Using SOSS, a fixed relay based on the strongest signal strength is preselected for every transmitted data packet. SOSS performs well when the wireless link quality is relatively good and the selected relay has a high probability of cooperatively retransmitting a packet successfully. However, SOSS performs poorly when the channel quality is low (link error probability is high). To handle this, multiple random relays are used in the RR scheme to cooperatively retransmit packets that have failed the initial direct transmissions. While the number of cooperative retransmission attempts may increase, the number of duplicates is minimized as each potential relay proactively listens for ACKs from the destination and does not retransmit if they overhear the ACKs. Thus, the choice of the relay selection scheme greatly depends on the characteristics of the wireless channel in use. Although our simulation results only illustrate the performance of in one-hop networks, the proposed schemes can be applied to larger-scale multi-hop networks. In clustered mutli-hop networks, can be (a) SOSS (b) SOSS (c) RR RR HP PDR LP PDR normalized total throughput SOSS RR shadowing mean (db) HP PDR shadowing mean (db) LP PDR shadowing mean (db) Normalized total throughput Figure 17. Throughput performance with varying shadowing mean. (a) HP PDR; (b) LP PDR; (c) Normalized total throughput. 422 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

14 used for intra-cluster communications. Inter-cluster communication can take place using different frequency bands available in UWB. can also be applied to flathierarchical multi-hop networks as long as the network is time-synchronized. This is achievable with low overheads using existing synchronization protocols in the literature [45--47]. 5. CONCLUSION The impulse based nature of UWB renders many existing MAC protocols unsuitable for use in UWB wireless sensor networks. In this paper, we propose, which provides QoS support without the use of carrier sensing. allocates disjoint resources to the different traffic classes in the network to segregate the contention between them and provide better QoS to traffic with higher priority. It also utilizes a cooperative retransmission technique to improve transmission quality and overall network performance. Two different relay selection strategies that can be incorporated in are also explored and compared. REFERENCES 1. Sendonaris A, Erkip E, Aazhang B. User cooperation diversity. Part I/II. IEEE Transactions on Communications 2003; 51(11): Laneman JN, Tse DNC, Wornell GW. Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004; 50(12): Nosratinia A, Hunter TE, Hedayat A. Cooperative communication in wireless networks. IEEE Communications Magazine 2004; 42(10): Bletsas A, Khisti A, Reed DP, Lippman A. A simple cooperative diversity method based on network path selection. IEEE Journal on Selected Areas in Communications 2006; 24(3): Liu P, Tao Z, Lin Z, Erkip E, Panwar S. Cooperative wireless communications: a cross-layer approach. IEEE Wireless Communications 2006; 13(4): Shan H, Zhuang W, Wang Z. Distributed cooperative MAC for multihop wireless networks. IEEE Communications Magazines 2009; 47(2): Commission FC. First Report and Order. Revision of Part 15 of the Commission s Rules Regarding Ultra- Wideband Transmission Systems, Porcino D, Hirt W. Ultra-wideband radio technology: potential and challenges ahead. IEEE Communications Magazines 2003; 41(7): Nekoogar F. Ultra-Wideband Communications: Fundamentals and Applications. Prentice Hall Communications Engineering and Emerging Technologies Series. Prentice Hall: Upper Saddle River, NJ, USA, Abou-Rjeily C, Daniele N, Belfiore JC. On the Decodeand-forward cooperative diversity with coherent and non-coherent UWB systems. In IEEE International Conference on Ultra-Wideband (ICUWB), Naddafzadeh G, Kong PY, Tham CK. A Cooperative retransmission scheme for IR-UWB networks. In IEEE International Conference on Ultra-Wideband (ICUWB), Cheung MH, Lok TM. Cooperative routing in UWB wireless networks. In IEEE Wireless Communications and Networking Conference, Zhu S, Leung KK. Distributed cooperative routing for UWB ad hoc networks. In IEEE International Conference on Communications (ICC), Naddafzadeh G. Joint cooperative MAC and routing in IR-UWB networks. In IEEE International Conference on Ultra-Wideband (ICUWB), Hu C, Kim H, Hou JC, Chi D, Nandagopalan SS. Provisioning quality controlled medium access in ultra wideband-operated WPANs. In IEEE International Conference on Computer Communications (INFOCOM), Rousselot J, Decotignie JD. Wireless communication systems for continuous multiparameter health monitoring. In IEEE International Conference on Ultra- Wideband (ICUWB), Basaran C, Kang KD. Quality of Service in Wireless Sensor Networks. Springer: London, 2009; Gupta A, Mohapatra P. A survey on ultra wide band medium access control schemes. Computer Networks 2007; 51(11): Tan HX, Patro R, Chan MC, Kong PY, Tham CK. Performance of slotted-aloha over TH-UWB. In IEEE International Conference on Ultra-Wideband (ICUWB), Shen X, Zhuang W, Jiang H, Cai J. Medium access control in ultra-wideband wireless networks. IEEE Transactions on Vehicular Technology 2005; 54(5): De Nardis L, Di Benedetto MG. Medium access control design for UWB communication systems: review and trends. Journal of Communications and Networks 2003; 5(3): Tan J, Chan MC, Tan HX, Kong PY, Tham CK. A medium access control protocol for UWB sensor networks with QoS support. In IEEE International Conference on Local Computer Networks (LCN), IEEE Standard a. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs) Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 423

15 24. Legrand F, Bucaille I, Hethuin S, et al. Ucan s ultra wide band system: MAC and routing protocols. In International Workshop on Ultra Wideband Systems (IWUWBS), Di Benedetto MG, De Nardis L, Junk M, Giancola G. (UWB) 2 : uncoordinated, wireless, baseborn medium access for UWB communication networks. Mobile Networks and Applications 2005; 10(5): Di Benedetto MG, De Nardis L, Giancola G, Domenicali D. The aloha access (UWB) 2 protocol revisited for IEEE a. ST Journal of Research 2007; 4(1): IEEE Standard Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High-Rate Wireless Personal Area Networks (wpans) Le Boudec JY, Merz R, Radunovic B, Widmer J. DCC- MAC: a decentralized MAC protocol for a-like UWB mobile ad hoc networks based on dynamic channel coding. In First International Conference on Broadband Networks (BROADNETS), August NJ, Lee HJ, Ha DS. Pulse sense: a method to detect a busy medium in pulse-based ultra wideband (UWB) networks. In International Workshop on Ultra Wideband Systems, Liu P, Tao Z, Narayanan S, Korakis T, Panwar SS. Coop- MAC: a cooperative MAC for wireless LANs. IEEE Journal on Selected Areas in Communications 2007; 25(2): Leong D, Kong PY, Wong WC. Performance analysis of a cooperative retransmission scheme using Markov models. In International Conference on Information, Communications and Signal Processing, Xiong L, Libman L, Mao G. Optimal strategies for cooperative MAC-layer retransmission in wireless networks. In IEEE Wireless Communications and Networking Conference (WCNC), Chen X, Zhai H, Fang Y. Enhancing the IEEE e in QoS support: analysis and mechanisms. In International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, Chu Y, Ganz A. Joint scheduling and resource control for QoS support in UWB-based wireless networks. In IEEE Military Communications Conference (MILCOM), Chu Y, Ganz A. A centralized MAC protocol for QoS support in UWB-based wireless networks. Wireless Personal Communications 2005; 34(1 2): Chu Y, Ganz A. Adaptive MAC protocol for QoS support in UWB-based wireless networks. In IEEE International Conference on Communications (ICC), Molisch AF, Balakrishnan K, Cassioli D, et al. IEEE a channel model final report. IEEE a, Wu L, Lottici V, Tian Z. Maximum likelihood multiple access timing synchronization for UWB communications. IEEE Transactions on Wireless Communications 2009; 7(11): Yong X, Hua L, Fei H, Qiu W. TDOA algorithm for UWB localization in mobile environments. In International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Zhan H, Le Boudec JY, Ayadi J, Farserotu J. One step impulse radio ultra-wideband positioning algorithm. In IEEE International Conference on Ultra-Wideband (ICUWB), Zhang C, Kuhn M, Merkl B, Fathy AE, Mahfouz M. Accurate UWB indoor localization system utilizing time difference of arrival approach. In IEEE Radio and Wireless Symposium (RWS), Kocks C, Scheiber E, Xu D, Viessmann A, et al. A low-cost protocol and application for UWB localization. In IEEE International Conference on Ultra-Wideband (ICUWB), Jamieson K, Balakrishnan H, Tay YC. Sift: a MAC protocol for event-driven wireless sensor networks. In Third European Workshop on Wireless Sensor Networks (EWSN), Qualnet Network Simulator, Scalable Network Technologies, Inc. [Online]. Available at: Shang Z, Yu H. A low overhead multi-hop time-sync protocol for wireless sensor networks. In IEEE Networking, Sensing and Control, Solis R, Borkar VS, Kumar PR. A new distributed time synchronization protocol for multihop wireless networks. In IEEE Conference on Decision and Control, Cheng KY, Lui KS, Wu YC, Tam V. A distributed multihop time synchronization protocol for wireless sensor networks using pairwise broadcast synchronization. IEEE Transactions on Wireless Communications 2009; 8(4): AUTHORS BIOGRAPHIES Hwee-Xian Tan obtained her B. Computing degree from the Department of Computing, School of Computing, National University of Singapore (NUS) in She is currently a postgraduate student, working towards her Ph.D. degree in NUS. Her research interests include wireless communications and sensor networking. 424 Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd.

16 Mun Choon Chan received the B.S. degree from Purdue University, West Lafayette, IN, in 1990 and the M.S. and Ph.D. degrees from Columbia University, NY, in 1993 and 1997, respectively, all in Electrical Engineering. From 1991 to 1997, he was a member of the COMET Research Group, working on ATM control and management. From 1997 to 2003, he was a member of the Technical Staff at the Networking Research Lab, Bell Laboratories, Lucent Technologies, Holmdel, NJ. He joined the National University of Singapore in 2004 and is currently an Associate Professor in the Department of Computer Science. His current research interest includes heterogeneous wireless network and sensor networking. He is a member of ACM and IEEE. Peng-Yong Kong (S 99-M 03) received the B.Eng. degree in Electrical & Electronic Engineering (first-class honors) from the Universiti Sains Malaysia, and the Ph.D. degree in Electrical & Computer Engineering from the National University of Singapore. He was an Engineer with Intel Malaysia. After that, he was a research scholar with the Center for Wireless Communications, Singapore, working towards the Ph.D. degree. Since 2001, he has joined the Institute for Infocomm Research, Agency for Science, Technology & Research (A*STAR), Singapore, where he is currently a research scientist, principal investigator, and Wireless Mesh Networks group leader. He is also an adjunct Assistant Professor with the Electrical & Computer Engineering Department, National University of Singapore. His research interests are in medium access control protocols, transmission scheduling, network traffic control, and quality of service provisioning for wireless networks. Chen-Khong Tham is the programme manager of the services (POISe) program at the Institute for Infocomm Research (I 2 R) and is working on designing next generation services architectures, service delivery mechanisms, and value-added services. He was, till recently, heading the Networking Protocols Department at I 2 R, dealing with cutting edge wireless networking and ambient intelligence technologies. He is an Associate Professor at the Department of Electrical and Computer Engineering (ECE) of the National University of Singapore (NUS). His research interests are in coordinated quality of service (QoS) management in wired and wireless computer networks and distributed systems. He obtained his Ph.D. and M.A. degrees in Electrical and Information Sciences Engineering from the University of Cambridge, UK. Wirel. Commun. Mob. Comput. 2011; 11: John Wiley & Sons, Ltd. 425

A Medium Access Control Protocol for UWB Sensor Networks with QoS Support

A Medium Access Control Protocol for UWB Sensor Networks with QoS Support Medium ccess Control Protocol for UWB Sensor Networks with QoS Support Jicong Tan, Mun-Choon Chan, Hwee-Xian Tan, Peng-Yong Kong, Chen-Khong Tham School of Computing, National University of Singapore (NUS)

More information

Performance of Slotted-Aloha over TH-UWB

Performance of Slotted-Aloha over TH-UWB Performance of Slotted-Aloha over TH-UWB Hwee-Xian Tan, Ranjeet K. Patro, Mun-Choon Chan, Peng-Yong Kong, Chen-Khong Tham School of Computing, National University of Singapore (NUS) Dept of Electrical

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks Luca De Nardis and Maria-Gabriella Di Benedetto Infocom Department School of Engineering University of Rome

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved. WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks Sensors 2009, 9, 2088-2116; doi:10.3390/s90302088 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications

2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications 2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications Guan-Tsang Chen, Wen-Tsuen Chen, and Shan-Hsiang Shen Department of Computer Science,

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

FSA: A Fast Coordination Scheme for Opportunistic Routing

FSA: A Fast Coordination Scheme for Opportunistic Routing F: A Fast Coordination Scheme for Opportunistic Routing Zhenyu Yang, Kai Zeng and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Worcester, MA 0609 {zyyang, kzeng, wjlou}@wpi.edu Abstract

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Design and Performance of Contention Based MAC Protocols in WBAN for Medical ICT Using IR-UWB

Design and Performance of Contention Based MAC Protocols in WBAN for Medical ICT Using IR-UWB IEEE PIMRC 2010 International Workshop on Body Area Networks- Enabling Technologies for Wearable and Implantable Body Sensors, Istanbul Design and Performance of Contention Based MAC Protocols in WBAN

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Cooperative-Diversity Slotted ALOHA

Cooperative-Diversity Slotted ALOHA Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Christina THORPE 1, Sean MURPHY, Liam MURPHY School of Computer Science and Informatics, University College

More information