WIRELESS sensor networking (WSN) is one of the

Size: px
Start display at page:

Download "WIRELESS sensor networking (WSN) is one of the"

Transcription

1 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY A Cross-Layer Scheme for Solving Hidden Device Problem in IEEE Wireless Sensor Networks Hsueh-Wen Tseng, Shan-Chi Yang, Ping-Cheng Yeh, Member, IEEE, Ai-Chun Pang, Senior Member, IEEE Abstract The IEEE stard is designed to achieve low-power transmissions in low-rate short-distance wireless personal area networks (WPANs). For the sake of reducing the control overheads, the modified CSMA/CA protocol used by does not have the hidden device protection mechanism, such as RTS/CTS mechanism. Previous studies indicated that the probability of any two devices in an infrastructure network unheard of each other is around 41%. Therefore, the hidden device problem (HDP) results in inefficient data transmission serious power consumption issues in WPAN. In this paper, we propose a cross-layer detection allocation (CL-DNA) scheme to solve the HDP in IEEE without the cost of extra control overhead in data transmissions. The proposed scheme detects relationships of hidden devices based on the overlapped signals then allocates the hidden devices into distinct subperiods for transmissions. Simulation results validated by mathematical analysis show that the proposed scheme significantly improves the goodput with the reduction in power consumption. Index Terms Hidden device problem, IEEE , medium access control (MAC) protocol, sensor, wireless personal area network (WPAN). I. INTRODUCTION WIRELESS sensor networking (WSN) is one of the most exciting technology today. WSN is expected to be a low-cost low-power solution for monitoring unsupervised devices in houses, factories offices. The sensor devices are allocated romly or artificially to retrieve specific environmental information then return the results to a gateway via wireless communication. Among the well-known specifications, IEEE , originally designed for low-rate Manuscript received January 17, 2010; revised July 30, 2010; accepted July 31, Date of publication September 23, 2010; date of current version November 24, This work was supported in part by the Excellent Research Projects of National Taiwan University under Contract 99R80304, 99R80305 by the National Science Council under Contract NSC E MY3, NSC E The associate editor coordinating the review of this paper approving it for publication was Prof. Evgeny Katz. H.-W. Tseng is with the Cloud Computing Center for Mobile Application of Industrial Technology Research Institute, Hsinchu, Taiwan, R.O.C. ( d92005@csie.ntu.edu.tw). S.-C. Yang is with the MediaTek Incorporation, Hsinchu, Taiwan, R.O.C. ( r @ntu.edu.tw). P.-C. Yeh is with the Graduate Institute of Communication Engineering, Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan, R.O.C. ( pcyeh@cc.ee.ntu.edu.tw). A.-C. Pang is with the Graduate Institute of Networking Multimedia, Department of Computer Science Information Engineering, National Taiwan University, Taipei, Taiwan, R.O.C. ( acpang@csie.ntu.edu.tw). Color versions of one or more of the figures in this paper are available online at Digital Object Identifier /JSEN wireless personal area networks (WPANs), has become one of the promising cidates for interconnections between wireless sensor devices. In wireless networks, a device is not guaranteed to hear the signals from other devices. If signals transmitted from device A to device C cannot be sensed by device B, device B thinks that the channel is clear. As a result, device B might transmit data to device C at the same time. The overlapped signals cause the failure of device C to recognize either of the signals sent by device A B. This is called the hidden device (or hidden terminal) problem (HDP) [9]. In an infrastructure wireless network, assume that the devices have the same transmission radius are romly located in the network, the probability of any two devices having a hidden device relationship can be as large 41% [10]. The HDP increases the chance of transmission failures which initiates the retransmission procedures. As a result, the power consumption is high the battery life of the sensors is shortened. This is a big problem for wireless sensor networks. In IEEE stard, the HDP is prevented by the well-known RTS/CTS hshake mechanism. Unfortunately, the IEEE medium access control (MAC) does not have a protection mechanism against the HDP. A widely studied solution to the HDP is the out-of-b busy tone approach [3], [9]. Receiving devices send out the busy tone signals in a control channel while receiving data packets in a data channel. Any other devices hearing the busy tone will not transmit their own signals. This approach effectively solves the HDP, but it requires an extra channel an additional transceiver for each device. It also induces extra power consumption which makes it not suitable for IEEE Several other papers proposed to solve the HDP without the need of additional channels transceivers [11], [12]. Define the carrier sensing range of a device as the range that the signal transmission from the device can be sensed by any other devices within the range. Note that the signal can be sensed but not necessarily recognizable to the devices in the range. Further define the interference range as the range that the device would fail to detect the received signal if any other devices within the range transmit signals at the same time. Devices can tune the receive power to extend the carrier sensing range. The carrier sensing range is set to be larger than the interference range to resolve the HDP. However, this approach decreases the spatial reuse ratio since a lot of devices outside the interference range of the transmitting device are forced to be silent unnecessarily. Moreover, the HDP cannot be prevented if there are obstructors between the devices X/$ IEEE

2 494 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 Other than the aforementioned approaches, several papers focused on power control to overcome the HDP [5], [13]. Devices use smaller transmission power which reduces the size of the carrier sensing range the interference range. As a result, there is less chance for the HDP to happen. However, since the transmission power of IEEE is already very low, further decreasing the transmission power makes it difficult to maintain reliable communication quality. Therefore, this approach is not applicable to solve the HDP for IEEE Although ZigZag decoding can combat against the HDP for IEEE [2], it does not prevent the occurrence of collision; it is merely a remedy of collision. Its decoding process requires data retransmissions to collide again to recover the collided data. This work is fine in since the hidden device issue is not that serious due to the use of RTS/CTS. However, in IEEE , the HDP is much more severe. The prevention of collision is actually more desirable than collision remedy in since the frequent retransmissions would hurt the battery life of sensors. In addition, ZigZag decoding requires significant amount of buffer on the coordinator device to save the collided signals, it also needs a lot more processing power on the coordinator device to perform the ZigZag decoding process. The increased hardware complexity the power consumption are not desired for low power applications such as outdoor sensor networks. Some approaches that target on solving the HDP for IEEE were proposed in the literatures [6] [8]. In [6] [7], all devices are separated into mutually exclusive groups based on their hidden-device relationships. Devices in each group cannot sense each other. Different groups are scheduled to transmit in different time intervals to prevent the HDP. However, in a WSN, the number of devices can be very large the computation complexity of the approach might be high. The devices may also have moving behaviors. When the network topology changes, the grouping/scheduling procedures need to be conducted again. In [8], the receiver tries to detect two specific fields, frame length source address, from the corrupted frame to allocate dedicated time/bwidth to the corresponding devices to freeze the channel contention from these devices. However, these two fields cannot be easily detected from the corrupted frame in the MAC layer due to the severe frame damage resulted from the signal collision in the physical (PHY) layer. In this paper, we propose a cross-layer detection allocation (CL-DNA) scheme to solve the HDP for IEEE Upon the occurrence of frame collision, we propose a specially designed algorithm in the PHY layer to estimate the device addresses more accurately from the corrupted frames. The dubious addresses of the device are then verified through a MAC procedure in our design. The verified hidden devices are then scheduled to preserved time slots for transmissions. Our study is one of the very first works that adopt a cross-layer technique to solve the HDP for IEEE Numerical results obtained by mathematical analysis simulation experiments show that CL-DNA significantly decreases the chance of the HDP substantially improves the system performance of IEEE The rest of this paper is organized as follows. An overview of IEEE is given in Section II. Our CL-DNA scheme is presented in Section III. An analytical model for our CL-DNA is presented in Section IV. The results of extensive numerical experiments are demonstrated in Section V. Finally, the conclusions are given in Section VI. II. IEEE OVERVIEW This section briefly elaborates on the IEEE physicallayer MAC-layer technologies presents the format of an IEEE frame. A. Physical Layer The physical (PHY) layer of the IEEE stard is designed using direct sequence spread spectrum scheme, supports three different data rates with transmission distance ranging from 10 to 100 meters. The system diagram of IEEE PHY is defined in [4]. At the transmitter side, data bits are first divided into groups of four bits. Each four-bit sequence is then mapped to one of the sixteen possible symbols spread to the associated 32-chip sequence. Note that the spread sequences are pseudo-rom nearly orthogonal. The chip stream is offset quadrature phase shift keying (OQPSK) modulated with half-sine pulse-shaping. The modulated signal is transmitted through wireless channel, the inverse procedures are conducted at the receiver side. The received signal is first demodulated into chips. The 4-bit data symbol is then recovered from the demodulated chip sequence by correlating it to the chip sequence associated to each of the 16 possible symbols choosing the one with the highest correlation. Finally, the complete bit stream is sent to the MAC layer. Another important feature of IEEE PHY is the energy detection (ED). ED is generally used to obtain the received signal strength at the receiver. If ED detects a large variation of the received signal strength at the receiver, it is very likely to have been caused by the overlapped signals from the occurrence of the HDP. B. MAC Layer Two network topologies are supported by IEEE MAC, the star topology the peer-to-peer topology. In the star topology, each device communicates with others through a coordinator. In the peer-to-peer topology, mobile devices directly communicate with each other. IEEE MAC specifies two ways of medium access: the beacon-enabled mode the non-beacon-enabled modes. In the beacon-enabled mode, a beacon frame is transmitted by the coordinator at the beginning of every superframe. The beacon frame contains information about timing synchronization, system configuration, a list of devices to receive data frames from the coordinator. On the contrary, in the non-beacon-enable mode, devices are allowed to send data packets whenever necessary. In this paper, we consider a beacon-enabled network with star topology, which has high potential for effective design in avoiding the HDP while conforming to the stard. A superframe consists of an active period an inactive period. Two parameters, beacon order (BO) superframe order

3 TSENG et al.: A CROSS-LAYER SCHEME FOR SOLVING HIDDEN DEVICE PROBLEM IN IEEE WIRELESS SENSOR NETWORKS 495 Fig. 1. A CL-DNA illustrative example. (SO), are set by the coordinator to control the lengths of a active an inactive periods. The active period is for data transmission/reception, all the devices sleep in the inactive period for power saving. At the beginning of an active period, a beacon frame is sent from the coordinator to the devices. The active period is divided into two periods, the contention-access period (CAP) the contention-free period (CFP). To achieve best possible performance, the coordinator adjusts the duration of CAP CFP based on the traffic load encountered. The channel access in CAP is based on a modified carrier sense multiple access/collision avoidance (CSMA/CA) protocol. The MAC constant a unit backoff period (UBP) is used as a basic unit of the backoff period, which is of length 20 symbols. The symbol period is defined as the transmission time of the aforementioned 4-bit symbol in the PHY layer. Different from the stard CSMA/CA, the devices starts sensing channel only when the backoff countdown process is complete. On the other h, the CFP slots are reserved by the coordinator for specific devices with real-time applications. The CFP is composed of several guaranteed time slots (GTSs). The coordinator can allocate the GTSs to the devices for data transmissions per the requests. Finally, we note that although it is designed for all devices to sleep during the inactive period in IEEE for power saving, the stard does not completely rule out the possibility of using the inactive period for data transmissions between selected devices. C. Frame Format IEEE frame format is defined in [4]. The preamble sequence of the PHY frame consists of four bytes at the beginning of the frame. The content of the preamble is zero padded to 32 bits is used for synchronization. There are two types of source/destination address, the short address (2 bytes) the long address (8 bytes). Using the long address allows a large number of devices joining the WPAN, while the short address only supports devices under each coordinator. In this work, we consider only the short address case. Nevertheless, the proposed scheme can be easily extended to the case of the long address. Note that the source address field of the device takes place starting from the 12th byte, i.e., the 23rd 4-bit data symbol, after the preamble in the PHY frame. III. CROSS-LAYER DETECTION AND ALLOCATION SCHEME Here, we propose a cross-layer detection allocation (CL-DNA) scheme to solve the HDP in IEEE CL-DNA consists of operations in both PHY MAC layers. Upon the occurrence of signal collision, device addresses are detected from the collided signals in the PHY layer to identify the hidden devices. In the MAC layer, the dubious hidden device addresses are double-checked via our HDP address verification procedure. The confirmed addresses of the hidden devices are then added to a hidden device address list (HDAL). A hidden device is scheduled to access the channel by exclusively allocating time slots in different subperiods according to the number of hidden device pairs it belongs to the size of HDAL, to eliminate its chance of causing the HDP. Detailed description of CL-DNA is given as follows. A. HDP Address Detection in the PHY Layer As an illustrative example, in Fig. 1, we assume devices A B are mutually hidden devices. Device B transmits a frame first, device A later corrupts the frame of device B [Fig. 1(a)]. To detect the occurrence of the HDP, CL-DNA uses the aforementioned ED supported by IEEE PHY, which monitors the received signal strength at the coordinator. If the HDP occurs, multiple transmission signals overlap. The received signal strength the ED at the coordinator thus have large variations. Once the HDP is detected, the coordinator then sends a special acknowledgement frame (NACK) [Fig. 1(b)] to notify the possible transmitting devices to stop initiating the retransmission procedure. One flag bit in the ACK frame is used in CL-DNA to distinguish the NACK from the stard ACK. To find out which devices cause the HDP, the coordinator first tries to detect the preamble locations of the collided PHY frames in the overlapped signal then detects the source address field in the frames using the detected preamble locations. Recall from Section II-C, the preamble sequence of the PHY frame consists of eight continuous data symbols (decimal). It is located at the beginning of the PHY frame. The source address field starts from the twenty-third symbol after the end of the preamble sequence. Therefore, the coordinator constantly correlates the chip sequences of the preamble to the received signals. Once the peak correlation value is observed, the coordinator asserts that a preamble sequence is found. When the preamble is detected, the coordinator then compares the received signal portion starting from the twenty-third received data symbol right after the detected preamble, to the chip sequence of each associated source address in its WPAN. The associated source address with chip sequence of the highest correlation to the re-

4 496 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 ceived signal portion is considered to be the most probable address of the collided device. B. Time Allocation Algorithm in the MAC Layer Once the HDP addresses are detected, the HDP address verification procedure is initiated by the MAC layer. The procedure is necessary since the newly detected HDP addresses may be in error due to the existing interference the noise. To verify the detected addresses, the coordinator schedules each dubious hidden device (associated with the detected address) to transmit in the GTS of the following superframe [Fig. 1(c)]. There are two possible cases. One is that the dubious device confirms that the NACK frame received in the previous superframe is associated with its collided frame. Under such circumstance, the dubious device just goes ahead to transmit the frame in GTS. Once the coordinator receives the frame in GTS, it knows that the detected address is correct. On the other h, if the dubious device does not recognize the NACK frame, it indicates that the device was not involved in the HDP of the previous frame. As a result, the device is forced not to transmit its frame even through it has been scheduled to transmit in GTS. If no frame is received in the allocated GTS, the coordinator concludes that the hidden device address detected by the PHY layer is not correct. The correct hidden device addresses are then added to the HDAL. In order to detect as many existing HDP pairs as possible, the HDAL is stored getting appended for several superframes before it gets reset. Note that the HDAL reset is necessary since the HDP pair relation between two devices might diminish over time due to the device mobility. The duration between each HDAL pair is defined as a collection period (CP). The length of CP should be determined by the rate of the topology variation of the WPAN. In the beacon following the end of each CP [Fig. 1(d)], the coordinator allocates the hidden devices in the HDAL to different subperiods for transmission to prevent the HDP [Fig. 1(e)]. The HDAL is then reset to start another around of the HDP recording. Recall that there are three types of subperiod: CAP, GTS the inactive period. The non-hidden devices are allocated in CAP to contend for transmission. The more serious hidden devices, i.e., devices that cause the HDP to larger numbers of devices, are allocated to transmit using GTS to avoid the severe HDP. The remaining hidden devices are allocated in the inactive period, using a special backoff period, which is tripe of UBP (i.e., MAC slot), to access the channel. Using a longer backoff period can decrease the probability of the interference from other hidden devices thus obtain better channel utilization in the inactive period. One should note that the lengths of the CAP, GTS, the inactive period should be real-time adjusted according to the number of hidden devices, otherwise there will be a serious fairness problem between the non-hidden devices the hidden devices. The time allocation algorithm of CL-DNA is performed by exploiting. denotes the number of devices listed in the HDAL, whereas is the number of devices that device can cause the HDP to. Both can be extracted from the HDAL. In addition, two threshold values,, are defined. By comparing to to, there are four possible cases. 1) If, the coordinator infers that the HDP is not severe. The coordinator allocates the hidden devices to transmit in the inactive period. No need to use GTS in this case. 2) If for some devices, the coordinator concludes that these hidden devices cause more serious HDP. Such devices are allocated to transmit using GTS while the rest of the hidden devices in the HDAL are allocated to the inactive period for transmissions. 3) If, it indicates that most of the hidden devices are only causing the HDP to a few devices. The coordinator chooses the device with the largest value allocate it to transmit using GTS. All of the devices in the HDAL with the HDP relation to device are then allocated to the inactive period. Similar procedure is applied to the rest of the hidden devices until the coordinator uses up all the GTSs. The remaining hidden devices are then allocated to the inactive period. 4) If for some devices, this indicates the HDP problem is severe device is causing the HDP to many devices. We should allocate at most seven of such devices with largest values to transmit using GTS, while the remaining hidden devices are allocated to transmit in the inactive period. In summary, the CL-DNA scheme resolves the HDP without sacrificing transmission opportunities of non-hidden devices. By judiciously allocating the devices to transmit in different subperiods, the proposed algorithm is able to reduce the chance of the HDP enhance the goodput, as well as reducing the MAC delay the power consumption. IV. PERFORMANCE ANALYSIS In this section, we propose an analytical model of CL-DNA. The model is assumed to be time slotted, all time durations are normalized by UBP. We first describe our system model, then the MAC delay is analyzed. A. System Model A scenario of devices is considered. As shown in Fig. 2, the initial locations of the devices are romly distributed within a circle with a radius, the coordinator is located at center of the circle. We assume that the arrival process of frames at a device forms the Poisson distribution with arrival rate. Without loss of generality, the transmission reception ranges of all devices are assumed to be meters. We observe a device that is at a distance of meters to the coordinator. The value of computed in the pervious CP is used to decide which subperiod (i.e., CAP, GTS, or inactive periods) will be allocated for data transmission in the coming CP. If is zero, will be allocated in CAP; if is larger than

5 TSENG et al.: A CROSS-LAYER SCHEME FOR SOLVING HIDDEN DEVICE PROBLEM IN IEEE WIRELESS SENSOR NETWORKS 497 Fig. 2. The scenario for the analytical model. is allocated to transmit using GTS. Otherwise, is allocated to transmit in the inactive period. A device is considered as the hidden device of if the following two conditions are satisfied: The device is located out of the transmission range of transmits data in the duration of a transmission frame for. We define as the number of devices that cannot sense the transmission signal of, where the device stays in CAP at the th CP. is defined as the probability that a device transmits at least one frame. At the first CP, can be expressed as represents the area of transmission range for shown in Fig. 2, (1) (2).As. Area denotes the average area of carrier sense for the transmitting device is equal to. The probability that a device creates at least a data frame to transmit in CP is written as, where is the duration of a superframe. The probability that a device can successfully perform carrier sense is. Initially, all devices are allocated in CAP to transmit their data. We use the Poisson distribution with a mean of to approximate the distribution of of. With this approximation,, can be obtained. Let be the transition probability from Origin state to Target state in the th CP. is the probability that transmits a data frame in CAP during the first CP it stays on in CAP during the second CP because is equal to zero. The definitions of are similar to. Fig. 3 shows Fig. 3. The state diagram for CL-DNA. the transition diagram. When is allocated in CAP, the As is scheduled in CAP, there are other devices also scheduled in this period, we define the number of these devices as. can be computed as follows. The first part includes the devices within that do not transmit data frame in the previous CP, the number of such the devices. The other part includes the devices within that transmits data frame of these devices is equal to zero in the previous CP. Thus, Therefore, the number of devices that cannot sense the transmission signal of when is allocated in CAP,, can be written as (3) (4)

6 498 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 When, the is written as (5) When is scheduled in the inactive period, some devices are also scheduled in the inactive period. These devices are out of have for. is defined as the probability that a device transmits at least one frame in inactive period, it is expressed as We describe as follows. The (6) (12) is defined as the number of devices that cannot sense the transmission signal of when is allocated in inactive period. Thus, it is expressed as (13) (7) When the is allocated in inactive period, we still use of in the pervious CP to allocate to different subperiods in the current CP. The, can be expressed as (14) Let denote. The Note that a maximum of seven devices can be allocated in GTS so that a device is allocated in GTS when the number of devices in GTS are smaller than seven. Thus, When transmits frame in CAP, the frame can be collided by other devices within or interfered by its hidden devices. Therefore, we define as the probability that the frame of is transmitted without collision in CAP as the probability that transmits a frame in CAP but the frame is interfered by other hidden devices, they are expressed as (8) (9) (10) (15) (16) Let denote, where is equal to when is larger than or equal to 2. When transmits a frame in the inactive period, the frame can be collided by other devices within or interfered by its hidden devices. Therefore, we define as the probability that the frame of is transmitted without collision in the inactive period as the probability that transmits a frame in the inactive period but the frame is interfered by other hidden devices. They are expressed as (17) (11) (18)

7 TSENG et al.: A CROSS-LAYER SCHEME FOR SOLVING HIDDEN DEVICE PROBLEM IN IEEE WIRELESS SENSOR NETWORKS 499 Fig. 4. The state transition diagram for CL-DNA. B. MAC Delay Analysis Fig. 4 illustrates the state transition diagram of a device during a specific subperiod. The diagram consists of five states: IDLE, ARRIVE,, GTS. From Section IV-A, we obtain a probability that a device stay in a subperiod to transmit data then use the state transition diagram to analyze the average MAC delay of the device for CL-DNA. The MAC delay is defined as the interval between the time that the device serves a frame the time that the frame is successfully transmitted. The delay analysis is composed of the following three parts. 1) Average MAC Delay in CAP: We observe the device. Initially, stays in IDLE state. When a data frame arrives, the state transits from IDLE state to the ARRIVE state. In ARRIVE state, the arrival frame is queued in the buffer of. will be allocated in different subperiods according to the value of.if of is zero, is scheduled in CAP. When the frame is served by, the channel sensing procedure is executed. The state transits from ARRIVE state to state. The average waiting time in state for in the th CP is, the is given by transmission time when a transmitting frame is interfered by other hidden devices. are equal to, where, respectively, denote the transmission times for a data frame a ACK frame. is a gap between the data frame the ACK frame. Let denote the size of contention window (CW) for a frame transmission in the th backoff retry, the basic CW unit is UBP. By following the IEEE specification, at most three times of retry are allowed for a frame. Thus, the CW size of the th retry will be for 1, 2, 3, where. Let represent the average time durations of a successful a failed channel accesses in the th/ th retry, respectively. In IEEE , a successful channel access implies two times of successful CCA operations. If one of the CCAs is not successfully executed, it is considered that the channel access for this frame transmission fails. Thus, we have. The average time that transmits a data frame successfully The average time that transmits data unsuccessfully due to collisions. The average time that transmits data unsuccessfully due to HDP will be (19) Let denote, respectively, the average transmission time when a frame is successfully transmitted the average

8 500 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 The delay time for the HDP address verification procedure of a device is, where is the duration of a active period. In IEEE , when a device executes backoff countdown the remaining UBPs of CAP is shorter than data length, this data frame will suspend its transmission then wait for next CAP to transmit data. Let be the probability that the above situation occurs.. In addition, if a device is allocated in CAP to transmit data frame, the data frame is created by the device in GTS or inactive period, this data frame will wait for next CAP for transmission. is the probability that the above situation occurs, which is expressed as, where are the durations of a GTS a inactive periods, respectively. is defined as the average backoff interval from the time that attempts to access the channel for a frame to the time that actually transmits the frame over the channel, it where. Thus, the MAC delay of CAP,, can be obtained (20) 2) Average MAC Delay in Inactive Period: If of is less than will be allocated in the inactive period. If attempts to transmit data, the state transits from ARRIVE state to state. The average waiting time in the state for is. It is similar to (19) given by (21) is similar to, can be written as. If a device is allocated in the inactive period to transmit data frame, the data frame is created by the device in CAP or GTS, this data frame will wait for next inactive period for transmission., the probability that the above situation occurs,. The average backoff interval for the inactive period is denoted as,, where. represent the average time durations of a successful a failed channel accesses in the th/ th retry, respectively. Note that are different from because the unit of backoff used in the inactive period is a special backoff period instead of UBP. Therefore, the MAC delay of the inactive period,, (22) 3) Average MAC Delay in GTS: If of is larger than, the state transits from the ARRIVE state to the GTS state. The average waiting time in the GTS state is equal to given by. The expected waiting time when this frame is created in CAP or inactive period is. The MAC delay of GTS is expressed as. is defined as the probability that a device transmits at least one frame in GTS, is expressed as. Thus, the average MAC delay of, can be obtained. By integrating, we obtain the average MAC delay for all devices for CL-DNA, it is derived as. Our analytical model has been validated against the simulation experiments. Fig. 5 shows the average MAC delay obtained from analysis simulation for CL-DNA, where CP, SO, BO, are assumed to be ten superframes, 2, 3, 2. From this figure, we observe that the curve of analytical results is quite close to that of simulation. However, the analytical simulation results do not match very well since of devices in the analytical model is approximated by a Poisson distribution instead of a real trace. V. NUMERICAL EXPERIMENTS A. Simulation Model This section is to evaluate the performance of the proposed CL-DNA scheme. The current discrete-event network simulators such as OPNET, NS-2, J-Sim, GloMoSim may be unsuitable to implement a cross-layer solution, since their inner structure is based on a layering design, each implemented

9 TSENG et al.: A CROSS-LAYER SCHEME FOR SOLVING HIDDEN DEVICE PROBLEM IN IEEE WIRELESS SENSOR NETWORKS 501 Fig. 6. Probability of address detection. Fig. 5. Comparison of the analysis simulation results. functionality run by the simulator engine is tightly coupled with this structure. Hence, implementing a cross-layer solution in one of these simulators may turn into a non-trivial task. For this reason, we develop a simulator ourselves, the simulator can be used to easily incorporate cross-layer algorithms protocols. In the physical layer of our simulation environment, Rayleigh fading environment is adopted to cope with realistic channel condition. For the MAC layer, the simulator follows the specification of IEEE [4]. To clearly indicate the power saving features of the proposed scheme, a transceiver Chipcon CC2420 model [1] is adopted. The length of data frames is assumed to be exponentially distributed with a mean of UBP. Only uplink traffic is considered in our simulation since all data frames in sensor networks are transmitted to the sink device. Also, a beacon-enabled network with a star topology is considered. The coordinator is static located at the center of simulated area. The proposed scheme can easily be extended to accommodate other network configurations. In our simulation model, the transmission range of all devices is assumed to be 25 m with a transmission rate of 250 Kb/s. We simulate a scenario of 50 devices their initial locations are romly distributed within a circle area of m. The moving direction of each device is romly selected. When the boundary is reached, the device re-selects a direction, moves toward the direction as described above. The moving speed of the device is romly selected from 0 to 1 m/s. Each device maintains a FIFO waiting buffer of infinite frames, the mean frame length, i.e.,, is assumed to be 60 bytes (e.g., six UBPs at the 250-Kb/s transmission rate, excluding PHY MAC headers). The traffic load is defined as. The is Poisson packet arrival rate of a device is the number of devices. In addition, we assume the links of different devices to the coordinator is independently Rayleigh distributed the noise at the coordinator is additive white Gaussian noise. Each device estimates the channel gain of its link to the coordinator from the received signal portion of the preamble sequence. The channel TABLE I Size AND Severeness SETTINGS FOR 30 DEVICES estimation is then applied in the PHY to detect the remaining data contained in the PHY frame. B. Address Detection Here, we show the simulation result of address detection introduced in Section III-A. The simulation result under Rayleigh fading is given in Fig. 6. Note that denotes the probability that device addresses are correctly detected given that frames collide to each other,.in Fig. 6(a), we can observe that the probability of both addresses correctly detected is around 0.65 in the case of 2-frame collision. In Fig. 6(b), the probability of two or more addresses correctly detected (sum of the top two curves) is over 0.82 in the case of 3-frame collision. It is worth noted that, while the probability of correctly detecting 2 or more addresses in a HDP is not extremely close to 1, numerical results in the next subsection shows that such address detection accuracy is sufficient enough to have impact on the system throughput using our HDP resolving MAC design. C. CL-DNA Performance In order to investigate the performance of CL-DNA, we use five representative settings for from device as shown in Tables I II. The mean value, maximum value, minimum value of are used in our simulation in different the number of devices. We observe the mean value of from devices. The mean values are 20/20 3/2 for 30

10 502 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 Fig. 7. Effects of traffic load on system goodput, power consumption MAC delay. TABLE II Size AND Severeness SETTINGS FOR 50 DEVICES 50 devices. In general, the mean value of should be increased but the mean value of for 50 devices is less than that of 30 devices due to many signals overlapped so the exact number of devices does not be recognized by coordinator. First, we compare the different performance metrics for CL-DNA IEEE stard with 50 devices, Fig. 7(a) shows the effect of the traffic load on goodput. The numeral footnote of CL-DNA indicates the setting of listed in Table I. We observe that the goodput of CL-DNA outperforms IEEE stard. The probability of HDP is decreased by CL-DNA because the hidden devices are properly separated into suitable subperiods. Hence, CL-DNA substantially decreases collision overhead increases goodput. Furthermore, the performance difference between CL-DNA IEEE stard gradually increases when the traffic load increases. The reason is that when traffic load is high, HDP becomes more serious in IEEE Fig. 7(b) shows the effect of traffic load on power consumption for CL-DNA IEEE stard. In wireless sensor networks, power consumption is a major issue. Power consumption for both CL-DNA IEEE stard increases as the traffic load increases. However, with the effective reduction of HDP, the increasing rate of CL-DNA power consumption is less than IEEE stard. Fig. 7(c) shows the MAC delay of CL-DNA IEEE stard. This figure intuitively shows that the MAC delay under CL-DNA IEEE stard increases as traffic load increases. We find the MAC delay of IEEE is lower than that of CL-DNA. In IEEE , more retransmission process for a specific frame may be repeatedly activated due to severe HDP. Each retransmission incurs additional contention overheads degrades system performance. In CL-DNA, a fame can be successfully delivered with a low HDP opportunity, which implicitly decreases the contention/collision overhead for a frame transmission. Although CL-DNA can significantly reduce the occurrence of HDP, the MAC delay would be increased since some of the devices are arranged to GTS inactive period. In addition, more hidden devices in the inactive period result in larger contention overheads thus larger MAC delay. Fig. 8 demonstrates the experimental results for the effect of number of devices on CL-DNA performance, where of Table I are used. From Fig. 8(a), we observe that the goodput of setting 2 setting 4 are better than that of other settings for devices. On the other h, the goodput of setting 5 setting 1 exhibit serious degradation for devices. For a 70-device scenario, the GTSs are totally used easy because of using smaller setting so CAP is shorter. The non-hidden devices produce serious collision overheads due to the small CAP. This implies that shall be increased to obtain better performance as the number of devices increases. The power consumption affected by the number of

11 TSENG et al.: A CROSS-LAYER SCHEME FOR SOLVING HIDDEN DEVICE PROBLEM IN IEEE WIRELESS SENSOR NETWORKS 503 Fig. 8. Effects of number of devices on system goodput, power consumption MAC delay. devices for CL-DNA is shown in Fig. 8(b). An intuitive result is observed that the power consumption of CL-DNA increases as the number of devices increases. The power consumption of setting 5 1 are slightly higher than that other setting for devices. In order to separate hidden devices into GTS inactive period appropriately, the settings of should be increased when the number of devices is large. Fig. 8(c) shows the MAC delay of CL-DNA. Contrary to power consumption, the MAC delay of setting 1 is greater than that of other settings for devices, their difference increases significantly as the number of devices increases. That is, small values could not effectively solve excessive HDP. However, the should be increased following the number of devices to separate the hidden devices into suitable subperiods, effectively. VI. CONCLUSION A simple efficient cross-layer scheme, CL-DNA, has been proposed in this paper to solve the HDP in IEEE WPANs. The proposed scheme detects the hidden devices addresses based on the overlapped signals in the PHY layer, the dubious addresses are checked by the HDP address verification procedure performed in the MAC layer. The verified hidden devices are then allocated to different subperiods for transmissions. The proposed cross-layer scheme significantly reduces the chance of hidden device problem. Simulation results show that the proposed CL-DNA is very effective in enhancing the goodput, as well as reducing the MAC delay the power consumption. Therefore, CL-DNA is a simple efficient approach for enhancing IEEE protocol in wireless sensor networks. REFERENCES [1] Data Sheet for CC GHz IEEE /Zigbee RF Transceiver [Online]. Available: print/cc2430dk.html [2] S. Gollakota D. Katabi, Zigzag decoding: Combating hidden terminals in wireless networks, in Proc. ACM SIGCOMM, 2008, pp [3] Z. J. Haas J. Deng, Dual busy tone multiple access (DBTMA) A multiple access control scheme for ad hoc networks, IEEE Trans. Commun., vol. 50, no. 6, pp , Jun [4] IEEE Working Group, Stard for Part 15.4: Wireless Medium Access Control Layer (MAC) Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std , Oct [5] E. S. Jung N. H. Vaidya, A power control MAC protocol for ad hoc networks, in Proc. ACM Int. Conf. Mobile Computing Networking (MOBICOM), 2002, pp [6] A. Koubaa, R. Severino, M. Alves, E. Tovar, Improving quality-of-service in wireless sensor networks by mitigating hidden-node collisions, IEEE Trans. Ind. Informat. (Special Issue on Real-Time Embedded Networked Systems), vol. 5, no. 3, pp , Aug [7] L.-J. Hwang, S.-T. Sheu, Y.-Y. Shih, Y.-C. Cheng, Grouping strategy for solving hidden-node problem in IEEE LRW- PANs, in Proc. IEEE WICON, Jul. 2005, pp [8] S.-T. Sheu, Y.-Y. Shih, W.-T. Lee, CSMA/CF protocol for IEEE WPANs, IEEE Trans. Veh. Technol., vol. 58, no. 3, pp , Mar [9] F. A. Tobagi L. Kleinrock, Packet switching in radio channels: Part II The hidden terminal problem in carrier sense multiple-access the busy-tone solution, IEEE Trans. Commun., vol. 23, no. 12, pp , Dec [10] Y.-C. Tseng, S.-Y. Ni, E.-Y. Shih, Adaptive approaches to relieving broadcast storms in a wireless multihop mobile Ad Hoc network, IEEE Trans. Comput., vol. 52, no. 5, pp , May 2003.

12 504 IEEE SENSORS JOURNAL, VOL. 11, NO. 2, FEBRUARY 2011 [11] X. Yang N. H. Vaidya, On the physical carrier sense in wireless ad hoc networks, Proc. IEEE Infocom, pp , Mar [12] H. Zhai Y. Fang, Physical carrier sensing spatial reuse in multirate multihop wireless ad hoc networks, Proc. IEEE Infocom, pp. 1 12, Apr [13] J. Zhu, X. Guo, L. L. Yang, W. Steven, A single-channel solution for transmission power control in wireless ad hoc networks, in Proc. ACM Int. Symp. Mobile Ad Hoc Networking Computing (MOBIHOC), 2004, pp Hsueh-Wen Tseng received the B.S. degree in electrical engineering from Tamkang University, Taipei, Taiwan, in 2001, the M.S. degree in electrical engineering from the National Taiwan University of Science Technology, Taipei, Taiwan, in 2003, Ph.D. degrees from the Department of Computer Science Information Engineering, National Taiwan University, Taipei, Taiwan, in He is currently an Engineer in the Cloud Computing Center for Mobile Application of the Industrial Technology Research Institute, Hsinchu, Taiwan. His research interests include networked embedded system, cloud computing, design, analysis implementation of network protocols wireless communications. Shan-Chi Yang received the B.S. degree in electrical engineering from the National Taiwan University, Taipei, Taiwan, in 2007 the M.S. degree from the Graduate Institute of Communication Engineering at the National Taiwan University, Taipei, Taiwan, in He is currently an Engineer in the MediaTek Incorporation, Hsinchu, Taiwan. His research interests include analysis implementation of network protocols in wireless communications. Ping-Cheng Yeh (M 05) received the B.S. degree in mathematics the M.S. degree in electrical engineering from the National Taiwan University, Taiwan, in , respectively, the Ph.D. degree from the University of Michigan, Ann Arbor, in He is currently an Assistant Professor in the Graduate Institute of Communication Engineering, the Department of Electrical Engineering at the National Taiwan University. His research interests include channel coding, coded modulation, directional antennas, cooperative communications, cross-layer design in wireless networks. Ai-Chun Pang (S 00 M 02 SM 09) received the B.S., M.S., Ph.D. degrees in computer science information engineering from the National Chiao Tung University, Taiwan, in 1996, 1998, 2002, respectively. She joined the Department of Computer Science Information Engineering (CSIE), National Taiwan University (NTU), Taipei, Taiwan, in Currently, she is an Associate Professor in CSIE the Graduate Institute of Networking Multimedia of NTU, Taipei, Taiwan. Her research interests include design analysis of personal communications services network, mobile computing, voice over IP, performance modeling.

Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE LR-WPAN

Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE LR-WPAN Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE802.15.4 LR-WPAN Dyg Khayrunsalihaty Bariyyah bt Abang Othman 1, Hushairi bin Zen 2, Al Khalid Hj. Othman 2, Khairuddin Ab Hamid 2

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks Computer Systems Department, Technical Institute / Qurna, Basra, Iraq email: hayderaam@gmail.com Received: 4/1 /212 Accepted: 22/7 /213 Abstract IEEE 82.15.4 is a standard designed for low data rate, low

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Improving the IEEE 802.15.4 Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Anis KOUBAA 1, Mário ALVES 1, Bilel NEFZI 2, Ye-Qiong SONG 2 1 IPP-HURRAY! Research Group, Polytechnic

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Design and Implementation of a Multi-hop Zigbee Network

Design and Implementation of a Multi-hop Zigbee Network Design and Implementation of a Multi-hop Zigbee Network Chi-Wen Deng, Li-chun Ko, Yung-chih Liu, Hua-wei Fang Networks and Multimedia Institute Institute for Information Industry, ROC {cwdeng, lcko, ulysses,

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

THE IEEE standard was created in 2003, and its

THE IEEE standard was created in 2003, and its ADVANCES IN ELECTRONICS AND TELECOMMUNICATIONS, VOL. 1, NO. 2, NOVEMBER 2010 7 Simulation Study of the IEEE 802.15.4 Standard Low Rate Wireless Personal Area Networks Dariusz Kościelnik and Jacek Stępień

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 376 ~ 382 DOI: 10.11591/ijeecs.v5.i2.pp376-382 376 Performance Evaluation of Different Backoff Algorithms

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio Middle-East Journal of Scientific Research 13 (9): 1137-1143, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.13.9.739 Performance Analysis of Guaranteed Time Slots Allocation

More information

Improving IEEE for Low-latency Energy-efficient Industrial Applications

Improving IEEE for Low-latency Energy-efficient Industrial Applications Improving IEEE 802.15.4 for Low-latency Energy-efficient Industrial Applications Feng Chen Computer Networks and Communication Systems University of Erlangen-Nuremberg, 91058 Erlangen feng.chen@informatik.uni-erlangen.de

More information

Enhancing Network Output Load in IEEE with Different Modulations for Wireless Sensor Networks

Enhancing Network Output Load in IEEE with Different Modulations for Wireless Sensor Networks Enhancing Network Output Load in IEEE 82.15.4 with Different Modulations for Wireless Sensor Networks Sukhvinder S Bamber Department of Computer Science & Engg. National Institute of Technology Jalandhar,

More information

Multichannel MAC for Energy Efficient Home Area Networks

Multichannel MAC for Energy Efficient Home Area Networks 1st International Workshop on GReen Optimized Wireless Networks (GROWN'13) Multichannel MAC for Energy Efficient Home Area Networks Kok Keong Chai, Shihab Jimaa, Yun Li, Yue Chen, and Siying Wang Abstract

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee Performance Analysis of Beacon Enabled IEEE 802.15.4 Using GTS in Zigbee Rajashri Wavage PG Student Computer Science and Engineering Baddi University of Emerging Science and Technology Aman Kaushik. Asst.

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok

More information

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks www.hurray.isep.ipp.pt Technical Report On the Performance Limits of Slotted CSMA/CA in IEEE 802.15.4 for Broadcast Transmissions in Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar Ye-Qiong

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Performance Evaluation of IEEE for Mobile Sensor Network

Performance Evaluation of IEEE for Mobile Sensor Network Research Online ECU Publications Pre. 2011 2008 Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network Kartinah Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542536

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Vol.8, No.1 (2015), pp.81-92 http://dx.doi.org/10.14257/ijgdc.2015.8.1.08 Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Manpreet, Jyoteesh Malhotra CSE Department Guru Nanak Dev University

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard Chapter 2 Enhanced Back-Off Technique for IEEE 802.15.4 WSN Standard Aditi Vutukuri, Saayan Bhattacharya, Tushar Raj, Sridhar, and Geetha V Abstract IEEE 802.15.4 is the standard for Low-rate Wireless

More information

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology Circulation in Computer Science Vol.2, No.7, pp: (9-13), August 2017 https://doi.org/10.22632/ccs-2017-252-41 Performance Analysis of IEEE 802.15.4 based Sensor Networks for Large Scale Tree Topology Ziyad

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES

MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES N.Meenakshi 1 1 (M.E Communication Systems, Anna University, Chennai, India, meenu.ece19@gmail.com) Abstract- The wireless local area network

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Quality of Service Trade-off at the Application Layer with Guaranteed Time Slots in IEEE for Wireless Sensor Networks

Quality of Service Trade-off at the Application Layer with Guaranteed Time Slots in IEEE for Wireless Sensor Networks International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Quality of Service Trade-off at the Application Layer with Guaranteed Time Slots in IEEE 802.15.4

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Reliability and Energy Efficiency in Multi-hop IEEE /ZigBee Wireless Sensor Networks

Reliability and Energy Efficiency in Multi-hop IEEE /ZigBee Wireless Sensor Networks Reliability and Energy Efficiency in Multi-hop IEEE 82.15.4/ZigBee Wireless Sensor Networks Giuseppe Anastasi, Marco Conti, Mario Di Francesco and Vincenzo Neri Dept. of Information Engineering Institute

More information

An Energy-Efficient MAC Design for IEEE Based Wireless Sensor Networks

An Energy-Efficient MAC Design for IEEE Based Wireless Sensor Networks An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks Yu-Kai Huang 1,Sze-WeiHuang 1,andAi-ChunPang 1,2 1 Graduate Institute of Networking and Multimedia 2 Department of Computer

More information

Impact of Frequencies on IEEE WPANs for Wireless Sensor Networks

Impact of Frequencies on IEEE WPANs for Wireless Sensor Networks Impact of Frequencies on IEEE 802.15.4 WPANs for Wireless Sensor Networks Sukhvinder S Bamber #1, Gurprem Singh *2 # Computer Science & Engineering, Panjab University, UIET, Panjab University SSG Regional

More information

Energy Efficient Clear Channel Assessment for LR-WPAN

Energy Efficient Clear Channel Assessment for LR-WPAN www.ijcsi.org 387 Energy Efficient Clear Channel Assessment for LR-WPAN Praveen Kaushik 1, Nilesh kumar R. Patel 2, Jyoti Singhai 3 1 Department of CSE, MANIT Bhopal, M.P., India 2 Department of CSE, MANIT

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Matteo Petracca Scuola Superiore Sant Anna, Pisa Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

DEEP: A Deployable Energy Efficient MAC Protocol for Sensor Networks

DEEP: A Deployable Energy Efficient MAC Protocol for Sensor Networks DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks Marco Valero, Anu Bourgeois, and Raheem Beyah Department of Computer Science Georgia State University Atlanta, Georgia 30303

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks Sensors 2009, 9, 2088-2116; doi:10.3390/s90302088 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information