Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks
|
|
- Daniela Benson
- 6 years ago
- Views:
Transcription
1 Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks Raul Palacios a, Dzmitry Kliazovich b, Fabrizio Granelli a a University of Trento, Trento, Italy b University of Luxermbourg, Luxemrboug, December,
2 Outline Problem Network Coding COPE IEEE 802. DCF MAC Cross-layer Efficiency issues Solution BidCode Reverse Direction TXs Transmit after receive Result Energy Efficiency Analysis & Simulation Vs. Load Vs. Packet Vs. Rate 2
3 Network Coding (NC) Intermediate wireless nodes Reduce number of transmissions Transmit combined information Network Coding Add overhead for decoding
4 NC A&B Scenario Store and forward 4 A R B 2 NC enabled A R B 2 4
5 NC Cross Scenario Store and forward C NC enabled C A R B 2 A R B D D 5
6 NC Types Inter-session NC Combine information from different sources e.g. COPE Intra-session NC Combine information from the same source e.g. MORE 6
7 COPE IP NC MAC PHY COPE First on Wi-Fi Opportunistic listening Opportunistic coding Neighbor-state learning Pseudobroadcast Asynchronous ACK 7
8 IEEE 802. MAC/PHY Spec. DCF MAC DCF CSMA/CA BEB Basic OFDM PHY RTS/CTS 8
9 COPE A&B DIFS+BO DIFS: DCF Inter Frame Space : Short Inter Frame Space BO: Back-off period RTS: Request-To- Send CTS: Clear-To-Send A a b RTS CTS a ACK CTS ACK RTS a b a DIFS+BO R a b CTS ACK RTS CTS b ACK RTS CTS a b ACK B b a DIFS+BO 9
10 NC and 802. MAC Fairness A&B: / share for R Cross: /5 share for R / / / 2 A R B 0
11 NC-Aware MAC Priority State of the Art []-[4] State of channel contention Network Coding info Level of congestion Adjust CW size Probabilistic priority only [] Xie et al, Popularity Aware Scheduling for Network Coding based Content Distribution in Ad Hoc Networks, in IEEE PIMRC, 2007, pp. 5. [2] Umehara et al, Enhancement of IEEE 802. and Network Coding for Single-Relay Multi-User Wireless Networks, in IEEE ICSPCS, 200, pp. 9. [] De Coppi et al, Network Coding Aware Queue Management in Multi-Rate Wireless Networks, in IEEE ICCCN, 202, pp. 7. [4] Paramanathan et al, On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks, in IEEE ICC, 20, pp. 6.
12 BidCode [5] Transmit after receive BidCode Coded data packets only Backwards compatible Low overhead Absolute priority [5] R. Palacios, F. Granelli, A. Paramanathan, J. Heide, and F. H. P. Fitzek, Coding-aware MAC: Providing Channel Access Priority for Network Coding with Reverse Direction DCF in IEEE 802.-based Wireless Networks, in IEEE ICC 204, 0-4 June 204, pp
13 BidCode A&B DIFS+BO DIFS: DCF Inter Frame Space : Short Inter Frame Space BO: Back-off period RTS: Request-To- Send CTS: Clear-To-Send A R B a b RTS CTS a ACK CTS a b a CTS ACK RTS CTS b a b ACK b a DIFS+BO
14 Contributions of The Paper Anlys Comprehensive performance assessment of BidCode Simul 4
15 Evaluation Framework BidCode A R B Alice and Bob C! COPE A R B 802.g DCF MAC D Cross!! GREENET Tutorial 5
16 General Assumptions Theoretical Analysis Error-free/Collisionfree channel Constant packet length Always data to transmit No packet losses for queue overflow Negligible coding time & energy Python simulator Ideal channel Poisson traffic generation Constant packet length Unbounded transmit queue Negligible coding time & energy GREENET Tutorial 6
17 DCF and BidMAC. There is one data transmission from BidCode Energy Efficiency Analysis: An Example Bob to the relay node through a DCF transmission slot. O data transmissions from Alice and Bob, there is a bidirecti sion similar to BidMAC but there is a coded data transmi relay node instead of a single data transmission. Hence, th TDIFS TBO TRTS T TCTS T TDATA T TACK TDIFS TBO TRTS T TCTS T TDATA T TXORDATA T TACK time ratio that results in the saturation network throughput DIFS DIFS Pt expressed as P CHAPTER 5. NETWORK CODING-AWARE ENERGY-EFFICIENT MAC r Pi PROTOCOLS net sat TBidCode = 2 (TDIF S +TBO +TRT S +TCT S +TDAT A +T 2 NAV The A energy consumed in the energy consumption in CTS Pt Pr (TXORDAT A +7 TSIF S ) Pi a data transmission through DCF and a bidirectional transmission+with 2 a M ODES AND T RANSMISSION T IMES DATA coded packet similar to BidMAC. There are 2 transmission slots in ERP-OFDM which PHY ERP-OFDM PHY M ODES AND T RANSMISSION T IMES CTS ACK CTS RTS DATA a >R combines BidCode RTS ACK Energy Efficiency >B the 2 source nodes transmit twice, the relay nodeb.transmits once and re- a b R Mode Modulation Code rate Data rate NDBP S TR Mode Modulation Code rate Data rate NDBP S TR P t BPSK /2 6 Mbps 24 5 P r Pi ceives twice, a source node receives once, the hidden node is idle twice, BPSK /2 6 Mbps 24 The energy2 efficiency x ( x ) is BPSK of a given /4 protocol 9 Mbps 6 defined5 2 BPSK /4 9 Mbps 6 ratio QPSK 2 Mbps 48 and the nodes are idle twice. Hence, the energyofconsumption that ban MSDU/2 DATA QPSK /2 2by Mbps 48 bits contained in divided the energy cons4 4 QPSK /4 8 Mbps 72 4 QPSK /4 8 Mbps 72 NAV CTSenergy efficiency is expressed >R6-QAM corresponds to the saturation network as /2 packet 24 Mbps 96 (Ex ) required55to transmit that includes the B 6-QAM the data /2 24 Mbps QAM 6-QAM 64-QAM 64-QAM 64-QAM 64-QAM /4 6 Mbps /4 6 Mbps 2/ 48 Mbps 2/ 48 M Mbps 8 L SDU /4 54 Mbps x [Mb/J]= /4 54 Mbps net sat EBidCode = (Et +Er +Ei ) 2 Ex Et = (2 (TRT S +TCT S +TDAT A +TACK ) +TXORDAT A ) Pt S =TSIF S +2T where LM SDU denotes the Tbyte-length anslot MSDU and E TDIF DIF S =TSIFof S +2T slot CW Er = (2 (TRT S +2 TCT S +TDAT A +TXORDAT Athe ) + T min spent in transm ACK ) P product ofr power consumed and CWtime min Tslot TTBO = = Tslot BO 22 Ei = ( (2 (TDIF S +TBO ) +7 TSIF S ) +2 (TRTtotal ) Pi amount transmitted data packets and is split into S +TDAT A ) +Tof ACK 2) Based 2) BD-DCF: BD-DCF: Based on on Fig. Fig. 2b, 2b, aa transmission transmission cy cy (5.) BD-DCF contains the same as that of DCF but it includ BD-DCF contains the same 27 as that of DCF but it inclu additional data transmission and additional data transmission and aa interval. interval. To To co co the maximum throughput of BD-DCF, we assume th the maximum throughput of BD-DCF, we assume th 5.. Cross Scenario IEEE CAMAD 204a STA, has receiver receiver of of aa data data packet, packet, either either the the AP AP or or a STA, has Greece packet ready to send to theathens, transmitter. Therefore, 7aa pp packet ready to send to the transmitter. Therefore, packets can be exchanged within a BD-DCF transmi The throughputs and energy efficiencies of the protocolsdata under evalua-
18 System Parameters* Parameter Value Parameter Value Slot time 9 us XOR header 40 bytes interval 0 us Payload length 500 bytes DIFS interval 28 us FCS length 4 bytes EIFS interval 88 us PHY data rate 54 Mbps Min CW size 5 PHY control rate 24 Mbps Max CW size 02 RTS TX time 0 us Preamble time 6 us CTS/ACK TX time 4 us Signal time 4 us DATA TX time 254 us OFDM symbol time 4 us XORDATA TX time 262 us Signal extension 6 us Transmit power cons..65 Watts Service bits 6 bits Receive power cons..4 Watts Tail bits 6 bits Idle power cons..5 Watts RTS length 20 bytes Holding time 0 ms CTS/ACK length 4 bytes Simulation time 20 s MAC header 0 bytes Number of iterations 0 *IEEE 802.g MAC/PHY spec. 8
19 A&B Energy Efficiency Vs. Traffic Load Network energy efficiency (Mb/J) DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation Total offered traffic load (Mbps) 9
20 A&B Energy Efficiency Vs. PHY Data Payload Length Network energy efficiency (Mb/J) DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation MAC Service Data Unit (MSDU) length (Bytes) 20
21 A&B Energy Efficiency Vs. Data Rate Network energy efficiency (Mb/J) DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation PHY data rate (Mbps) 2
22 A&B Max. Gains Vs. Data Payload Length Data Payload Length (Bytes) Energy Efficiency BidCode vs. DCF BidCode vs. COPE 50 70% 6% % % % 26% % 2% 000 9% 20% 250 4% 8% 500 % 6% % 5% % 4% % % Vs. PHY Data Rate PHY Data Rate (Mbps) Energy Efficiency BidCode vs. DCF BidCode vs. COPE 6 06% 4% 9 09% 5% 2 0% 6% 8 5% 8% 24 8% 0% 6 25% % 48 0% 5% 54 % 6% 22
23 Cross Energy Efficiency Vs. Traffic Load Network energy efficiency (Mb/J),5 2,5 2,5 0,5 DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation Total offered traffic load (Mbps) 2
24 Cross Energy Efficiency Vs. PHY Data Payload Length Network energy efficiency (Mb/J) 4,5 2,5 2,5 0,5 DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation MAC Service Data Unit (MSDU) length (Bytes) 24
25 Cross Energy Efficiency Vs. Data Rate Network energy efficiency (Mb/J),5 2,5 2,5 0,5 DCF-Analytical DCF-Simulation COPE-Analytical COPE-Simualtion BidCode-Analytical BidCode-Simulation PHY data rate (Mbps) 25
26 Cross Max. Gains Vs. Data Payload Length Data Payload Length (Bytes) Energy Efficiency BidCode vs. DCF BidCode vs. COPE 50 52% 27% 250 5% 9% 500 2% % 750 % 06% 000 0% 02% % 98% % 95% % 9% % 9% % 89% Vs. PHY Data Rate PHY Data Rate (Mbps) Energy Efficiency BidCode vs. DCF BidCode vs. COPE 6 244% 7% 9 249% 75% 2 252% 77% 8 260% 8% % 84% 6 277% 89% % 9% % 95% 26
27 Summary Problem Solution Contribution Result Ongoing Wi-Fi: Lack of MAC priority for NC SoA: Only probabilistic priority BidCode: Transmit a coded data packet immediately after receiving a data packet Energy efficiency analysis and computerbased simulation for BidCode evaluation A&B: 70% vs. DCF, 40% vs. COPE Cross: 50% vs. DCF, 0% vs. COPE Analysis and modeling, GLOBECOM 4 Experimentation on WARP v nodes 27
28 WARP v Experiment Framework WARP v node WARP v network Energino meter Energino software 28
29 Some Preliminary Results Energy Efficiency Vs. Traffic Load Energy Efficiency Vs. Data Rate 0,4 0,45 Network energy efficiency (Mb/J) 0,5 0, 0,25 0,2 0,5 0, 0,05 4% % DCF-Experiment COPE-Experiment BidCode-Experiment Saturation network energy efficiency (Mb/J) 0,4 0,5 0, 0,25 0,2 0,5 0, 0,05 DCF-Experiment COPE-Experiment BidCode-Experiment 4% 5% Total offered traffic load (Mbps) PHY data rate (Mbps) 29
30 Thanks for your kind attention! Raul Palacios 0
Performance Analysis of Energy-Efficient MAC Protocols using Bidirectional Transmissions and Sleep Periods in IEEE 802.
Performance Analysis of Energy-Efficient MAC otocols using Bidirectional Transmissions and Sleep Periods in IEEE 82.-based WLANs* Raul Palacios a, El Moatez Billah Larbaa a, Jesus Alonso-Zarate b and Fabrizio
More informationAn energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange
An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange Raúl Palacios, Fabrizio Granelli University of Trento Trento,
More informationReverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks
everse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks aul Palacios a, Dzmitry Kliazovich b and Fabrizio Granelli a a {palaciostrujillo,granelli}@disi.unitn.it, University
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationEnergy Efficiency of an Enhanced DCF Access Method using Bidirectional Communications for Infrastructure-based IEEE WLANs
3 IEEE 8th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Energy Efficiency of an Enhanced Access Method using Bidirectional Communications for
More informationPerformance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE WLANs
applied sciences Article Performance Analysis of a Burst Transmission Mechanism Using Microsleep Operation for Green IEEE 802.11 WLANs Raul Palacios-Trujillo 1, Nelson L. S. da Fonseca 1,, Jesus Alonso-Zarate
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationSTUDY OF IEEE WIRELESS NETWORKS IN HARSH ENVIRONMENT
STUDY OF IEEE 802.11 WIRELESS NETWORKS IN HARSH ENVIRONMENT Kaustubh Phanse 1 2 3 Mohammad-Reza Akhavan Ulf Olsson 1 Department of Computer Science and Electrical Engineering, Luleå University of Technology,
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationHigh Performance Distributed Coordination Function for Wireless LANs
High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationPerformance anomaly of b
Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationIEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering
by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationDCF LEARN AND PERFORMANCE ANALYSIS OF B WIRELESS NETWORK
DCF LEARN AND PERFORMANCE ANALYSIS OF 802.11B WIRELESS NETWORK Mingming Li 1, Biao Huang 2, Haiyang Liu 1 and Miao Yang 1 1 Spectrum Management Research Division, SRRC, Beijing, China 2 Spectrum Engineering
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationImplementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies
European Wireless 2009 1 Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies Anders Grauballe, Mikkel Gade Jensen, Achuthan Paramanathan,
More informationMC-CDMA Based IEEE Wireless LAN
MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationIEEE Ad Hoc Networks: Performance Measurements
IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,
More informationA Frame Aggregation Scheduler for IEEE n
A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationInvestigation of WLAN
Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationPerformance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme
World Engineering & Applied Sciences Journal 6 (2): 97-103, 2015 ISSN 2079-2204 IDOSI Publications, 2015 DOI: 10.5829/idosi.weasj.2015.6.2.22146 Performance Analysis of Distributed Mac Protocol with Physical
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationAn Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5,
Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi Networks* An Chan and Soung Chang
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationExploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA
Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,
More informationInternational Journal of Technical Research and Applications e-issn: , Special, Issue 43 (March 2017), PP.
COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS IN IEEE 802.11 DCF MAC PROTOCOL 1 Aditi Harugade, 2 Priyanka Karunglikar, 3 Damini Jadhav, 4 Prem Kumar, 5 T.N. Sawant 1,2,3,4,5 Electronics and Telecommunication
More informationERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks
ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationCS698T Wireless Networks: Principles and Practice
CS698T Wireless Networks: Principles and Practice IEEE 802.11 (WLAN/WiFi) Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ IEEE 802.11 (WiFi)
More informationOn exploiting spatial reuse in wireless ad hoc networks
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang
More informationFigure.2. Hidden & Exposed node problem
Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationCrash Course in Wireless Video
Lifemote April 24, 2018 Ludwig Wittgenstein The context in which words are used, the intent with which they are uttered, determines their meaning. Successful communication is guessing which game the speaker
More informationAd Hoc b Cooperative Protocols: Performance in a Slow Fading Channel
Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationAn Energy-efficient Point Coordination Function Using Bidirectional Transmissions of Fixed Duration for Infrastructure IEEE 802.
An Energy-efficient Point Coordination Function Using idirectional Transmissions of Fixed Duration for Infrastructure IEEE 82. WLANs Raúl Palacios, Fabrizio Granelli University of Trento Trento, Italy
More informationPublished in: Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012 IEEE 17th International Workshop on
Aalborg Universitet Energy and Data Throughput for Asymmetric Inter-Session Network Coding Paramanathan, Achuthan; Heide, Janus; Pahlevani, Peyman; Hundebøll, Martin; Rein, Stephan Alexander; Fitzek, Frank
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationdoc.: IEEE /0928r2
IEEE P802.11 Wireless LANs Theoretical Throughput Limits TGT Draft Appendix A Date: 2006-07-20 Author(s): Name Company Address Phone email Larry Green Ixia 402 E. Gutierrez Street Santa Barbara, CA 93101
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationAnnouncements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1
Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationTHE demand for wireless connectivity has been
1 Activity Probability-Based Performance Analysis and Contention Control for IEEE 802.11 WLANs Junsu Choi, Student Member, IEEE, Seongho Byeon, Student Member, IEEE, Sunghyun Choi, Fellow, IEEE, and Kwang
More informationWireless & Mobile Networking
Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationIEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA
RARA: Rate Adaptation Using Rate-adaptive adaptive Acknowledgment for IEEE 802.11 WLANs IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA 정하경 Hakyung Jung School of Computer
More informationThe Importance of Being Opportunistic
High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationLaboratory of Nomadic Communication. Quick introduction to IEEE
Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless
More information