Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network

Size: px
Start display at page:

Download "Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network"

Transcription

1 Wireless Pers Commun DOI /s Cross-Layer Performance Analysis of CSMA/iCA Based Wireless Local Area Network Subodh Pudasaini Seokjoo Shin Springer Science+Business Media, LLC Abstract Carrier sense multiple access with improvised collision avoidance (CSMA/iCA) has recently been proposed as an enhancement to CSMA/CA. It has been reported to be superior than the legacy counterpart in terms of throughput efficiency, packet transmission delay and quantitative fairness index. Nevertheless, the superiority has been shown assuming ideal network conditions: error-free physical layer (L1) and saturated (always non empty) queue at medium access control layer (L2). These strict assumptions, however, do not accurately hold in the real-world Wireless Local Area Networks since the wireless medium is generally errorprone and the arrival of the packets at L2 queue is generally bursty resulting in non-saturated queue occupancy. Thus, the reported performance, especially throughput, in such typical L1/L2 settings is not complete to understand the performance benefit that CSMA/iCA offers under the realistic network settings. In this paper, we relax the aforesaid ideal assumptions and present a cross-layer (L1/L2) performance analysis. Our cross-layer analytical model considers the effect of Rayleigh fading induced bit errors in L1 and non-saturated queue occupancy due to Poisson packet arrival at L2 queue. By virtue of the validated numerical results, we show that the CSMA/iCA consistently retains its throughput gain over CSMA/CA for the non-ideal wireless settings as well. Keywords CSMA/iCA Cross-layer analysis Rayleigh fading Unsaturated queue Markov process DCF WLAN 1 Introduction Although Wireless Local Area Network (WLAN) was originally conceived for the mere replacement of wired-lan, it is now one of the most preferred access technologies at homes, S. Pudasaini S. Shin (B) Department of Computer Engineering, Chosun University, Gwangju , Korea sjshin@chosun.ac.kr S. Pudasaini subodh@chosun.kr

2 S. Pudasaini, S. Shin enterprises, and public hot-spots. This paradigm shift happens due to the decreasing cost of WLAN networking equipments like Access Points (APs) and Network Interface Cards (NIC); the gradual increment in WLAN data rates; and the growing use of laptops and Personal Digital Assistants (PDAs). According to IEEE [1], the de facto standard that covers the lower two layers of WLAN protocol stack, networking between multiple wireless stations (STAs) can be made in two different modes: infrastructure mode and ad hoc mode. In the former, STAs communicate with each other and with the wired network via an intermediate central device called AP while in the later STAs communicate directly with each other without involving any intermediate AP. For both operating modes, Medium Access Control (MAC) protocol has been specified. Distributed Coordination Function (DCF) is the base MAC protocol for both operating modes while Point Coordination Function (PCF) can optionally be used in the infrastructure mode. PCF, however, is barely implemented in commercial AP and NIC cards. Distributed Coordination Function (DCF) is a contention-based MAC protocol. It defines both signalling and timing functionalities of CSMA/CA-based access mechanism. It works fairly well for light traffic load. As the number of contending STAs increases, however, severe contention and collisions degrade WLAN performance. Not only the network throughput is decreased, but also individual packets are delayed and the throughput-fairness of contending STAs is reduced. To concurrently address these problems, Carrier sense multiple access with improvised collision avoidance (CSMA/iCA), a simple enhancement to CSMA/CA, has recently been presented in [2]. CSMA/iCA has been reported to be superior than the legacy counterpart in terms of throughput efficiency, packet transmission delay and quantitative fairness index. In [2], a tridimensional (3D) Discrete Time Markov Chain (DTMC) was developed to characterize the backoff process of CSMA/iCA. Based on the steady-state solution of the DTMC, adopting a renewal reward process based network model, throughput efficiency was analytically estimated. To simplify the analysis, following assumptions were made: Physical layer (L1) is error-free and MAC queue (L2) is saturated (always non empty). These assumptions, however, do not accurately hold in the real-world WLANs since the wireless medium is generally error-prone and the arrival of the packets at L2 queue is generally bursty resulting in non-saturated queue occupancy. Thus, the estimated throughput in [2], in such typical L1/L2 settings, is not complete to understand the actual performance benefit that CSMA/iCA can offer under the realistic network settings. In this paper, we relax those ideal L1 and L2 assumptions and present a cross-layer (L1/L2) performance analysis of CSMA/iCA based WLAN. The new cross-layer analytical model considers the effect of Rayleigh fading induced bit errors in L1 and non-saturated queue occupancy due to Poisson packet arrival at L2. The new cross-layer analysis results a general analytical model which reproduces the model in [2] as its special case when the packet error probability due to channel noise is zero and the probability of packet availability at L2 queue is 1. Note that this paper is an extension of our previous paper [3]. The extension includes the validation of the presented analytical model using ns-2. The rest of the paper is organized as follows: In Sect. 2,CSMA/iCA is revisited. The new analytical throughput estimation model for CSMA/iCA based WLAN is presented in Sect. 3. The performance evaluation results obtained from the new analytical model along with the ns-2 simulation based model validation results are presented in Sect. 4. Finally, in Sect. 5, we conclude the paper.

3 Cross-Layer Performance Analysis 2 Quick Overview of CSMA/iCA Carrier sense multiple access with improvised collision avoidance (CSMA/iCA) is an enhanced CSMA/CA with an improvised collision mitigation feature [2]. Due to space limitation, we briefly review CSMA/iCA with only necessary information that is required to understand the upcoming cross-layer analysis. Carrier sense multiple access with improvised collision avoidance (CSMA/iCA) can be understood as an enhancement to the legacy counterpart pertaining to CA mechanism. In the legacy CA mechanism, the Transmission Probability (TP) of each contending STA is temporally adjusted by changing only the size of Contention Window (CW) upon witnessing success or collision of the transmitted packet. On the other hand, in CSMA/iCA TP is adjusted both by regulating CW and Contention Slot Selection Distribution (CSSD) over CW. In other words, in CSMA/iCA a dynamic non-uniform CSSD is specified over CW, unlike the statically flat (uniform) distribution in the legacy CA mechanism. The shape of the CSSD is regulated using some mapping relations based on locally-available History Backoff Value (HBV). We denote the distribution as g(k j), wherek is any of the slot in CW and j is HBV. Updating the CSSD based on HBV contributes in mitigating the collisions. The collision mitigation achieved with CSMA/iCA can be observed either from local perspective of the individual contending STAs or from global perspective of the broadcast channel. From the local perspective, the collision mitigation mechanism looks simple. In consists of two straightforward processes: classification and prioritization of the contention slots over CW. Instead of blindly selecting any slot in CW for making access attempt, the proposed method first uses HBV to classify the contention slots in two sets: Relatively High Collision Prone (RHCP) and Relatively Less Collision Prone (RLCP), and prioritizes the RLCP slots by adaptively tuning the shape of the CSSD according to HBV. From the global perspective, a pool of backlogged access attempts from multiple STAs is logically divided into numerous smaller groups with probabilistically separated smaller CWs so that both the intra-group and inter-group access collision chances would reduce. For more details about the global and local perception, and operational mechanism of CSMA/iCA we refer readers to [2]. 3 Cross Layer Analysis of CSMA/iCA Figure 1 depicts the high-level framework of the cross-layer analytical model. It consists of two sub-models: a user model and a network model. As to be described in the subsequent sections, the user model which is based on DTMC takes into account the channel arbitration process of CSMA/iCA based WLAN considering the influence of bit errors on L1 and Packet Arrival Rate (PAR) at L2 queue. The output of the user model along with network population size and the timing details of the signalling mechanisms of IEEE DCF are used as inputs to the Renewal Reward Process (RRP) based network model to estimate the performance of interest. 3.1 System Model We consider a WLAN with N contending STAs where their channel access opportunities are arbitrated according to a new DCF. DCF in which CSMA/CA is replaced with CSMA/iCA. We consider a M/M/1/K queue at L2 of each STA. Packets arrive at the queue in a Poisson manner with exponentially distributed inter-packet arrival time with mean rate λ a

4 S. Pudasaini, S. Shin Fig. 1 High-level framework for the considered analytical model and are serviced at the rate λ s 1. Hence, the probability q that the queue remains non empty can be expressed as 1 λ a /λ s q = 1. (1) 1 (λ a /λ s ) K +1 Regarding L1, we consider it to be noisy; the transmitted packets might possibly experience bit errors. Note that probability of bit errors primarily depends on the utilized modulation technique and the channel characteristics. In this current work, we have considered Differential Binary Shift Keying (DBPSK) and a typical Rayleigh faded channel. For DBPSK, probability of bit error, p b, over Additive White Gaussian Noise (AWGN) channel is [4] p b (γ ) = 1 exp( γ), (2) 2 where γ is the received instantaneous Signal to Noise Ratio (SNR). In Rayleigh faded channel, γ is a random variable with the following probability distribution function f (γ ) = 1 ( ) γ exp, (3) γ 0 where γ 0 is the average SNR. Thus, bit error probability for DBPSK-modulated Rayleigh faded channel can be estimated as p b = = 0 0 p b (γ ) f (γ )dγ γ exp( γ) 1 γ 0 exp ( γ γ 0 ). (4) Note that (4) reflects the bit error probability of a IEEE b STA operating in its lowest available channel rate (1 Mbps). For the other available channel rate options, 5.5 and 11 Mbps, p b can be calculated as elaborated in [5]. Based on p b in (4), packet error probability in L2 can be calculated. To calculate the packet error probability in L2, we assume that the bit errors are identically and independently distributed (i.i.d) over the whole packet. Due to such assumption of i.i.d bit errors, packet error probability for a packet x can be expressed as p x e = 1 (1 p b) L x, (5) where x is a type of the packet (either DATA or ACK) and L x is the length of x in number of bits. It is noteworthy to mention that packet error probability should take into account 1 For a given WLAN configuration, λ s can be calculated as discussed in the last paragraph of Sect. 3.

5 Cross-Layer Performance Analysis both packet error probabilities of DATA and the subsequent ACK (recall the two way DATA- ACK exchange in the basic access mechanism of DCF). Assuming independence between bit errors of DATA and ACK packets, effective packet error probability observed at L2 can be written as p e = p data e + p ack e pe data pe ack. (6) Note that packet transmission fails not only due to channel errors, but also due to collisions. Collision happens with the following probability when more that one STAs transmit at the same time p c = 1 (1 τ) N 1, (7) where τ is the transmission probability of each contending STA. Finally, assuming independence between the chances of packet collision and packet error, the overall transmission failure probability for the considered L1/L2 settings can be expressed as p eq = p c + p e p c p e 3.2 Markov Chain for CSMA/iCA = 1 (1 τ) N 1 (1 p e ). (8) In this section we present a 3D DTMC that we develop to emulate the backoff procedure of the CSMA/iCA. The developed DTMC is based on the seminal 2D DTMC in [6]. However, there are following differences: (1) An additional dimension is added to track every possible HBVs, (2) Channel errors are accounted as in [7], (3) L2 queue does not necessarily always has packet to transmit. Figure 2 depicts the 3D DTMC. At any time t, a contending STA can be in any of the states (rounded rectangles in the figure) (i, j, k) or Idlewhere i [0, m] (m is maximum allowed retransmission limit) is the contention stage, j is the current value of the backoff counter, and k is the backoff value with which the contention was initiated in the stage i.notethat,in CSMA/iCA, contention window W i for stage i is regulated as per binary exponential backoff policy but there is subtle difference in CSSD over W i as previously described in Sect. 2. In the 3D DTMC, two types of transitions can happen: intra-contention stage transition and inter-contention stage transition. Intra-contention stage transition happens within any stage i when an idle slot is detected and j = 0. If j is zero and an idle slot is detected, a STA transmits its packet. Based on the result of transmission attempt, success or failure, inter-contention stage transition takes place. In the figure, both intra and inter-contention stage transitions are marked with a line with a filled arrow head. By adopting the conventional notation {i 1, j 1, k 1 i 0, j 0, k 0 } to denote the transition from (i 0, j 0, k 0 ) to (i 1, j 1, k 1 ) with probability P{i 1, j 1, k 1 i 0, j 0, k 0 }, all the possible one-step transitions in the 3D DTMC and their corresponding probabilities can be written as follows: 1. P{i, j, k i, j + 1, k} =1; i [0, m], j [0, W i 2], k [0, W i 1], 2. P{0, j, k i, 0, k} = q(1 p eq) ; i [0, m 1], k [0, W i 1], k [0, W i 1], j = k, 3. P{0, j, k m, 0, k} = qp eq + q(1 p eq) ; k [0, 1], j = k, k [0, W m 1],

6 S. Pudasaini, S. Shin Fig. 2 Emulation of the backoff procedure of CSMA/iCA with a 3D DTMC considering L1 channel errors and unsaturated L2 queue 4. P{i, j, k i 1, 0, k} =p eq g i (k k); i [1, m], j [0, W i 1], k = j, k [0, W i 1 1], 5. P{I i, 0, k} =(1 q)(1 p eq ); i [0, m 1], k [0, W i 1], 6. P{I m, 0, k} =1 q; k [0, W m 1],

7 Cross-Layer Performance Analysis 7. P{0, k, k I }= p a ; k [0, W i 1 1], k = k, 8. P{I I }=1 p a. The above expressions account, respectively, for: 1. Probable transitions when an idle slot is detected in stage i; contention stage i remains the same, backoff counter j is decremented by 1, and the history of the originally selected backoff value k is copied. 2. Probable transitions when L2 queue is found to be non empty upon making a successful packet transmission during contention stage i ; contention stage i isresetto0, CWis reset to, and slot k is selected randomly (uniformly) over. 3. Probable transitions when L2 queue is found to be non empty after making either a successful or a failed packet transmission in contention stage m; contention stage m is resetto0,cwisresetto, and slot k is selected randomly (uniformly) over. 4. Probable transitions after making an unsuccessful packet transmission in contention stage i 1; contention stage i 1 is increased by 1, CW is doubled, and slot k is selected randomly following g i (k k). 5. Probable transitions when L2 queue is empty after a successful packet transmission in contention stage i; STA enters into Idle state and waits for new packet to arrive. 6. Probable transitions when L2 queue is empty after either a successful or a failed packet transmission in contention stage m; STA enters into Idle state and waits for new packet to arrive. 7. Probable transitions when a new packet arrives in the empty L2 queue; backoff procedure is invoked with the initial contention window.notethatp a = 1 e λp I T I where definition of P I and T I areavailablein(19)and(20). 8. Probable transitions when no new packets arrive in the empty L2 queue. 3.3 Analysis of Markovian Process of CSMA/iCA In the 3D DTMC, let the stationary distribution of a tagged STA to be in state (i, j, k) and state Idle be b i, j,k and b I, respectively. Furthermore, let (i, j, X) be a compound state representing all the states having k j for the given i and j,andb i, j,x be the probability of being in the compound state (i, j, X). Mathematically, B i, j,x is equal to (b i, j, j bi, j, j+1 b i, j,wi 1). In Fig. 2, note that the inter-contention stage transitions can occur only from the compound state B i,0,x i [0, m]. Hence, the probability of being in compound state (i, 0, X) can be expressed as a function of the probability being in state (i 1, 0, X), i.e., B i,0,x = p eq B i 1,0,X, 0 < i m. (9) Since the 3D DTMC is regular, B i, j,x for 0 < i m can be written as W i 1 B i, j,x = p eq B i 1,0,X = p i eq B 0,0,X y= j W i 1 y= j W i 1 1 z=0 W i 1 1 z=0 g i (y z) g i (y z). (10)

8 S. Pudasaini, S. Shin Similarly, for the case i = 0, B 0, j,x can be written as [ ] B 0, j,x = W m 1 0 j qb m,0,x + q(1 p eq ) B l,0,x + p a b I. (11) Likewise b I can be written as m 1 b I = (1 q)(1 p eq ) B l,0,x + (1 q)b m,0,x + (1 p a )b I, (12) which can be further simplified to l=0 l=0 p a b I = (1 q)(1 p eq ) 1 pm eq (1 p eq ) + (1 q)pm eq B 0,0,X b I = 1 q B 0,0,X. (13) p a Using (13), (11) can be simplified to B 0, j,x = j [ m 1 q(1 p eq ) l=0 ] peq l B 0,0,X + qb m,0,x + p a(1 q) B 0,0,X p a = j B 0,0,X. (14) Equations (10) and(14) express B i, j,x for 0 i m and Eq. (12) expresses b I as a function of B 0,0,X. Hence, B 0,0,X can be determined by imposing the following normalization condition: 1 = b I + m i=0 W i 1 j=0 B i, j,x = 1 q W 0 1 W j i 1 B 0,0,X + B 0,0,X + p a W j=0 0 i=1 j=0 Upon simplifying (15), B 0,0,X = 1 q + p a W 0 1 j=0 j + m i=1 m W i 1 j=0 W i 1 1 z=0 W i 1 1 B i,0,x W i 1 y= j z=0 W i 1 y= j peq i g i (y z) g i (y z). (15) 1. (16) Since packet transmission can happen from any of the compound state B i,0,x, the probability that the tagged STA transmits in a randomly chosen slot can be expressed as ( ) m 1 peq m+1 τ = B i,0,x = B 0,0,X. (17) 1 p eq i=0 By solving a nonlinear system formed by pair of equations in (17)and(8), two unknowns τ and p eq can be obtained. With the known τ, the WLAN throughput can be estimated using the RRP based network model, to be described next.

9 Cross-Layer Performance Analysis 3.4 Network Model for Throughput Estimation We adopt the RRP based network model in [6] to estimate the long-run average throughput ξ. Let us consider that transmission attempts from N contending STAs, each of which transmits packet with probability τ derived in the previous subsection, are independent events and they repeat over time. The outcome space for such events is {I, S, C, E d, E a }, where the notations have the following interpretations, I: no access attempt (channel is idle); S: attempt is successful and the reception is error free as well; C: attempt ended in a collision; E d : attempt is successful but the reception is not error free; and E a : attempt is successful and the reception is error free but the returned acknowledgement is suffered from channel error. Considering the outcome space for such repetitive events, inter event duration T can be estimated as follows: E[T ]= P x T x, (18) x (I,S,C,E d,e a ) where P x is the probability that event x happens and T x is the duration for which the event x lasts. With the assumption that all N contending STAs can hear each others transmission (i.e connected single-hop network), P x can be obtained as follows: P I = (1 τ) N, ( )( P S = Nτ(1 τ) N 1 1 pe data P C = 1 (1 τ) N Nτ(1 τ) (N 1), P Ed = Nτ(1 τ) N 1 pe data (, ) P Ea = Nτ(1 τ) N 1 1 pe data 1 p ack e ), p ack e. (19) T x for the basic access mechanism can be obtained by considering the signaling mechanisms specified for DCF in [1] as follows: T I = Physical Slot Duration, T S = DIFS + T H + T D + SIFS + T A, T C = T H + T D + EIFS, T Ed = T C, and T Ea = T S, (20) where time required to transmit H bits of header, L D bits of data (D), and L A bits of acknowledgement (A) are T H = H MAC R D + H PHY R C, T D = L D R D, and T A = L A+H PHY R C, respectively, for the given data rate R D and control rate R C bits/s. It should be noted that EIFS = SIFS + T A + DIFS.ForthegivenN, nonlinear system formed by (8) and(17) can be solved numerically to get the values of two unknowns τ and p eq. Based on these values, P x x (I, S, C, E d, E a ) in (19) can be calculated. T x in (20) can be obtained for the given L D. Upon obtaining both P x and T x, E[T ] in (18) can be obtained. Once E[T ] is estimated, ξ can be calculated by considering the reward R per renewal event T as follow: where E[R]=P S L D. ξ = E[R] E[T ], (21)

10 S. Pudasaini, S. Shin Note that the presented 3D DTMC can be utilized to estimate ξ of the saturated WLAN as well. For this, q in (16) should be assigned 1. Let the solution of non-linear system in (8) and (17) for saturated WLAN be τ s and corresponding E[T ] in (18)beE[T s ]. For the known τ s and E[T s ], λ s in (1) can be obtained as follows: λ s = τ s(1 τ s ) N 1. (22) E[T s ] 4 Performance Results 4.1 Model Validation We validate the accuracy of the theoretical results obtained via the proposed analytical model by comparing them to the simulation results obtained from ns-2 [8]. For doing that we not only implemented the CSMA/iCA for IEEE DCF in ns-2 (version 2.29) but also modified the signal reception model because the conventional PHY layer implementation does not take into account the effect of bit error on the transmitted packets. In the modified signal reception model, bit error on the transmitted packets are accounted (when determining the success or failure of a received signal) as described in [9], along with the three conventional SNR based thresholds: carrier sense threshold (CSThresh), receive threshold (RxThresh), and capture thresh (CPThresh). A typical infrastructure Basic Service Set (BSS) is considered where the access point is located in the center of a circular network area of radius 20 m. STAs are randomly located over the circumference of the network area. All STAs transmit 1,024 Bytes UDP packet to the access point. The inter-packet arrival time at each STA is exponentially distributed with mean rate of λ a packets/s. No Ad-Hoc Routing Agent (NOAH)[10] is used to bypass the effect of routing in the network s performance. The considered MAC parameters are summarized in Table 1. Regarding the propagation model, the shadowing model is adopted. The path loss exponent is considered to be 3.6. CSThresh and RxThresh are considered to be 94 and 95 dbm, respectively, while the transmission power is considered to be w. It is worth mentioning that we have fixed the value of CPThresh to relatively very higher value than its default value of 10 db because in our simulation we do not want to capture any packets in the situations when simultaneous transmissions happen, as our analytical model does not consider the case related to capture effect. Under the aforesaid simulation settings, we observe the throughput for the the two different scenarios: (1) varying number of saturated STAs (whose queue has always packet to transmit) under a given bit error rate and (2) varying packet arrival rate for a given number of STAs. Each simulation experiment for a particular scenario was run for 100 s after a 10 s initialization. All of the presented throughput values are the average of the 10 values obtained from independently repeated simulation experiments. Simulation results along with the results from the analytical model are shown in Fig. 3. In particular, Fig. 3a depicts the throughput when there were varying number of saturated STAs (5 30) for a special case when bit error rate over the channel was Figure 3b depicts the throughput for the case of varying packet arrival rates (10 35 packets/s) when there were 10 STAs and the bit error rate was Simulation results for these two scenarios adequately match with the corresponding theoretical results, though the throughput is slightly over estimated (<1 %) when either the number of stations STAs or packet arrival rate was high.

11 Cross-Layer Performance Analysis Table 1 Considered network and channel parameters for numeric analysis and simulation Parameters Values Slot time 20 μs DIFS 50 μs SIFS 10 μs MAC header 224 bits PHY header 192 bits ACK packet 112 bits + PHY header R D and R C 1 Mbps Minimum CW 32 Maximum CW 1, 024 Retransmission limit 6 Channel model DBPSK modulated Rayleigh-faded channel Queue length (K) 50 Packet arrival rate Variable (0 50 packets/s) Packet length 512, 1, 024Bytes Number of STAs (N) Variable (up to 70) (a) (b) Fig. 3 Theoretical and simulated throughput of the CSMA/iCA based WLAN: a varying number of station, b varying packet arrival rate 4.2 Throughput Comparison of CSMA/CA and CSMA/iCA Once the accuracy of the analytical throughput estimation model for CSMA/iCA based WLAN had been validated, it was used to generalize the results for different network and channel conditions. The results are compared with the corresponding results of the conventional CSMA/CA based WLAN. For both WLANs, we firstly analyze the effect of Rayleigh fading induced L1 bit errors on the throughput considering a special scenario in which each

12 S. Pudasaini, S. Shin (a) (b) Fig. 4 Throughput of a saturated WLAN with two different MAC protocols, DCF with CSMA/CA and DCF with CSMA/iCA, under channel errors: a fixed channel error with increasing traffic load, b varying channel error for a fixed traffic load contending STA has saturated L2 queue, and then we generalize that result for the case when the contending STAs do not necessarily have saturated L2 queue. It is a well established fact that channel errors degrade the performance of any wireless networks. Figure 4 depicts the trend how channel errors degrade throughput of CSMA/CA

13 Cross-Layer Performance Analysis Fig. 5 Throughput of a WLAN with two different MAC protocols, DCF with CSMA/CA and DCF with CSMA/iCA, under different packet arrival rates and CSMA/iCA based saturated WLANs. As can be noted in Fig. 4a, for a given number of contending STAs with fixed-size homogeneous packets (1,024 Bytes), throughput of both WLANs decreases as BER increases (correspondingly, SNR decreases). Since channel error not only depends on the SNR but also on the size of the transmitted packets, Fig. 4b further elaborates Fig. 4a by including additional case studies for different packet sizes. Figure 5 compares the throughput of CSMA/iCA and CSMA/CA based WLANs over an error-prone channel (average SNR of 37 db) for the broad range of packet arrival rates. In both WLANs, for the given number of contending STAs, as the packet arrival rate at each contending STAs increases, the network throughput linearly increases up to their respective maximum achievable throughput limits and settles as a plateau thereafter. Lets denote the arrival rate that resulted the plateau be critical arrival rate. For the arrival rates less than the critical arrival rate, CSMA/iCA based WLAN offers similar throughput as CSMA/CA based WLAN does. Interestingly, CSMA/iCA based WLAN offers higher throughput for the arrival rates greater than or equal to critical arrival rate. This result implies that as the network traffic load increases, either due to the increase in the number of contending STAs or due to the high packet arrival rate at each contending STAs, CSMA/iCA based WLAN performs better. 5Conclusion In this paper, we have presented an analytical model to estimate throughput of a CSMA/iCA based WLAN considering cross-layer (L1/L2) details. The presented analytical model not only takes into account the improvised collision avoidance feature of CSMA/iCA but also the effects of channel errors and packet arrival rate at contending STAs. Through numer-

14 S. Pudasaini, S. Shin ical results, we have shown that CSMA/iCA consistently offers throughput benefit over CSMA/CA in every possible channel and traffic conditions. Simulation results adequately confirm the validity of the presented analytical model. Acknowledgments This study was supported by research fund from Chosun University, References 1. IEEE Std (2007). Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. 2. Pudasaini, S., Shin, S., & Kim, K. (2012). Carrier sense multiple access with improvised collision avoidance and short term fairness. Wireless Networks. doi: /s Pudasaini, S., & Shin, S. (2011). Cross layer analysis of CSMA/iCA based wireless local area network. In third international conference on ubiquitous and future networks (pp ). 4. Proakis, J. G. (2000). Digital communications (4th ed.). New York: McGraw Hill. 5. Mahasukhon, P., Hempe, M., Sharif, H., & Chen, H. (2007). BER analysis of b networks under mobility. In IEEE international conference on communications (pp ). 6. Bianchi, G. (2000). Performance analysis of the IEEE distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), Ni, Q., Li, T., Turletti, T., & Xiao, Y. (2005). Saturation throughput analysis of error-prone wireless networks. Wireless Communications and Mobile Computing, 5(8), Network Simulator Daneshgaran, F., Laddomada, M., Mesiti, F., Mondin, M., & Zonolo, M. (2008). Saturation throughput analysis of IEEE in the presence of non ideal transmission channel and capture effects. IEEE Transaction on Communications, 56(7), No adhoc routing agent (NOAH). Author Biographies Subodh Pudasaini received the B.E. degree in electrical and electronics engineering from Kathmandu University, Nepal, in 2005 and the M.E degree in computer engineering from Chosun University, Korea, in Currently, he is a Ph.D. candidate at department of computer engineering, Chosun University, majoring in wireless communications and networks. His current research interests include design and analysis of wireless medium access control protocols and QoS provisioning in various distributed networks including local, personal, and body area networks.

15 Cross-Layer Performance Analysis Seokjoo Shin received the B.Eng. in avionics engineering from Korea Aerospace University, Korea in 1997, and the M.Eng. and Ph.D. degrees in information and communications engineering from Gwangju Institute of Science and Technology (GIST), Korea, in 1999 and He joined the Mobile Telecommunication Research Laboratory, Electronics and Telecommunications Research Institute (ETRI), Korea, in In 2003, he joined Chosun University, where he is currently associate professor in the Department of Computer Engineering. His research interests include the resource management and access control protocols for wireless communication systems.

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1

More information

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract

Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract Performance Enhancement of Multi-Rate IEEE 802. WLANs with Geographically-Scattered Stations Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE Abstract

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Raffaele Bruno, Marco Conti, and Enrico Gregori Italian National Research Council (CNR) IIT Institute Via G. Moruzzi, 1-56100 Pisa, Italy {firstname.lastname}@iit.cnr.it

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Modeling and Analysis of TCP Dynamics over IEEE WLAN Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL J. Appl. Math. & Computing Vol. 22(2006, No. 1-2, pp. 501-515 THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL DONG HWAN HAN AND CHUL GEUN PARK Abstract. The IEEE 802.11

More information

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks

Multi-Rated Packet Transmission Scheme for IEEE WLAN Networks Multi-Rated Packet Transmission Scheme for IEEE 802.11 WLAN Networks Namgi Kim Telecommunication R&D Center, Samsung Electronics, 416, Maetan-3, Youngtong, Suwon, Kyounggi, 442-600, Korea namgi.kim@samsung.com

More information

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

An Accurate Model for Energy Efficiency in IEEE WLANs

An Accurate Model for Energy Efficiency in IEEE WLANs An Accurate Model for Energy Efficiency in IEEE 802.11 WLANs Eleni-Constantina Davri, Emmanouil Kafetzakis, Kimon Kontovasilis, Charalabos Skianis National Centre for Scientific Research Demokritos, Athens,

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2008 Characterising the interactions between unicast and broadcast in

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

THE Internet has evolved dramatically in the past several

THE Internet has evolved dramatically in the past several IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 10, DECEMBER 2004 1987 Improving Protocol Capacity for UDP/TCP Traffic With Model-Based Frame Scheduling in IEEE 802.11-Operated WLANs Hwangnam

More information

An Approach for Improving Performance of Back off Algorithm

An Approach for Improving Performance of Back off Algorithm International Journal of Computer Applications (975 8887) Volume 46 No.5, May 212 An Approach for Improving Performance of Back off Algorithm Swati Bhagoria Computer Engineering Department Shri G.S. Institute

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Design and Performance Evaluation of an Asymptotically Optimal Backoff Algorithm for IEEE Wireless LANs

Design and Performance Evaluation of an Asymptotically Optimal Backoff Algorithm for IEEE Wireless LANs Design and Performance Evaluation of an Asymptotically Optimal Backoff Algorithm for IEEE 802.11 Wireless LANs Abstract L. Bononi(*), M. Conti, E. Gregori National Research Council (CNR) Via S.Maria, 36,

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model Saturated Throughput Analysis of IEEE 80.e Using Two-Dimensional Markov Chain Model Lixiang Xiong and Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 006 Australia

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN 802.11E WIRELESS LAN Shih-Wei Pan, Jung-Shyr Wu and Ming-Wei You Department of Communication Engineering, National Central University, JhungLi City, Taiwan

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems

A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems 2009 Fifth International Conference on Networking and Services A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems

More information

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Optimized MAC Protocol with Power Efficiency in Mobile Ad-hoc Network Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur,

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Modeling and Simulating Packet Dispersion in Wireless Networks

Modeling and Simulating Packet Dispersion in Wireless Networks Worcester Polytechnic Institute Digital WPI Computer Science Faculty Publications Department of Computer Science 6 Modeling and Simulating Packet Dispersion in Wireless 8. Networks Mingzhe Li Worcester

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

On the Performance Characteristics of WLANs: Revisited

On the Performance Characteristics of WLANs: Revisited On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System

More information