Queueing Analysis of IEEE MAC Protocol in Wireless LAN

Size: px
Start display at page:

Download "Queueing Analysis of IEEE MAC Protocol in Wireless LAN"

Transcription

1 Queueing Analysis of IEEE MAC Protocol in Wireless LAN Chul Geun Park and Ho Suk Jung Department of Information and Comm Eng Sunmoon University Chung Nam, , Korea Dong Hwan Han Department of Mathematics Sunmoon University Chung Nam, , Korea Abstract In this paper, we present the performance analysis of IEEE MAC(Medium Access Control) protocol by investigating the queue dynamics of a wireless station based on the general probability distribution of packet sizes We use the MMPP(Markov Modulated Poison Process) as the input traffic model well describing the bursty nature of Internet traffic Thus we have the MMPP/G/1/K queueing model with the MAC layer service time to analyze the throughput and the delay performance of IEEE MAC protocol in wireless LAN We take some numerical examples for the queue dynamics including the mean packet delay and the packet blocking probability 1 Introduction WLANs(Wireless Local Area Networks) are one of the major growth factors for the network industry in the upcoming years The IEEE has developed the widely accepted specification[1], which defines the medium access and physical layer functions of WLANs The IEEE standard for wireless networks incorporates two medium access methods: the mandatory DCF(Distributed Coordination Functions) method and the optional PCF(Point Coordination Functions) method[2] If contention free service is required, it can be provided by PCF, which best suits delay sensitive traffic The DCF is an asynchronous data transmission function, which suits delay insensitive traffic The DCF defines two techniques for packet transmissions The default is a two-way handshaking mechanism called basic access method Another optional technique is a fourway handshaking mechanism called RTS/CTS(Request To Send/Clear To Send) method[3] The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) protocol requires stations to sense the channel idle for a specific time interval before attempting any packet transmission In case that the channel is sensed busy, stations defer their transmission attempts to a later time on the basis of a backoff algorithm Collisions can still occur in case of hidden stations[3] Moreover, packets may be dropped either due to the buffer overflow or serious MAC layer contentions and the packet delay increases dramatically when the number of active stations increase[4] A large amount of works on IEEE MAC protocols has been studied for the saturation throughput and delay analysis of CSMA/CA[2-7] The 2-dimensional MC (Markov Chain) model introduced by Bianchi[5] for the analysis of saturation throughput has become a common method to study the performance of the IEEE MAC protocol[3] Most of the literature start from the model proposed in [5] In the references [2,3,6,7], the delay analysis as well as the throughput analysis of the IEEE MAC protocols have been done Most of the previous studies [2-7] dealt with the throughput and delay analysis of IEEE MAC layer in saturation traffic scenarios The MAC delay analysis of the current works except [4] has been limited to the derivation of mean value while the packet delay distribution is untouched Fortunately, in [4], they had maid a comprehensive study on the queue dynamics of IEEE MAC protocol by using M/G/1/K queueing model with the MAC layer service time, when the packet size has a uniform probability distribution The MAC layer service time is the time interval between the time instant that a packet starts to contend for transmission and the time instant that the packet either is acknowledged for correct reception by the intended receiver or is dropped On the other hand, references[8] indicate that the trimodal packet size distribution has been demonstrated in subscriber access networks We know that the IP traffic to Internet access lines has bursty and unpredictable characteristics in nature and the MMPP describes well the bursty nature of Internet traffic Thus we have the MMPP/G/1/K queueing model to analyze the performance of IEEE MAC protocol The rest of this paper is organized as follows In Section 2, we provide an overview of queueing system including /06 $ IEEE

2 DIFS Data +ACK Successful transmission SIFS Backoff DIFS W 0 = CW min T S Backoff W 0 Collided Data Collision SIFS +ACK T C DIFS Backoff 2W 0 Figure 1 Basic access method based on the DCF of CSMA/CA the basic access method Section 3 describes the probability distribution of the MAC layer service time Section 4 describes the MMPP/G/1/K queueing model In Section 5, we take some numerical examples for the queue dynamics including the mean packet delay and packet blocking probability 2 System model The essential method used in DCF is called basic access method The RTS/CTS provides an alternative way of transmitting data packets[2] In this paper, we focus on the basic access method which is illustrated in Fig 1 When a packet arrives at the head of the transmission queue, it will first monitor the channel activity If the channel is scanned busy, the MAC waits until the medium become idle, then defers the packet transmission for an extra time interval DIFS(Distributed Inter-frame Space) If the channel stays idle during the DIFS, the MAC then starts the backoff process To begin the backoff process, each station maintains a contention window size CW, which takes CW min as an initial value and doubles its value before it reaches a maximum limit CW max The backoff counter is measured in terms of time slot and uniformly chosen in the range of [0,CW), where CW is current contention window A time slot is the time needed at any station to detect the transmission of a packet from any other station[5] If the channel becomes busy during a backoff process, the backoff is frozen When the channel becomes idle again and the backoff counter reaches zero, the station attempts to retransmit the packet If the maximum transmission failure limit is reached, the retransmission shall stop, CW max shall be reset to CW min and the packet shall be discarded We assume that the collision probability does not change and is independent during the transmission regardless of backoff stages The collision probability is defined by the probability that there is at least one of other stations which will transmit at the same backoff time slot We also assume that packet sizes are generally distributed and the size of data buffer at each station is finite Since Internet traffic has bursty and unpredictable characteristics in nature, we will use the MMPP as the input traffic model well describing the burstiness Thus the resulting queueing model for each station can be described as an MMPP/G/1/K queue 3 The MAC layer service time distribution 31 The MAC layer packet service time Since we assume that the packet size is generally distributed, we can obtain that the MAC layer service time is a non-negative random variable, which will be denoted by T B When the MAC layer transmits a packet, it experiences three basic processes: the decrement process of the backoff counter, the two frozen backoff counter processes that take time slots of T S and T C, respectively Hereafter we will use one time slot as a unit service time Thus T S (T C ) is the random variable representing amount of time slots that channel is sensed busy due to a successful transmission (collision) We define s i = P {T S = i} and c i = P {T C = i}, i =1, 2, as the probability distribution of T S and T C The MAC layer service time T B has a discrete probability distribution of b i = P {T B = i}, i =1, 2, Obviously, the probability distribution b i,i=1, 2, depends on the transmission rate, the length of the packet, and the specific medium access method[4,5] To find the PGF(Probability Generating Function) of T B, let Y p be a general discrete random variable of packet sizes and let a i = P {Y p = i},, 1, 2,,L p, where L p is the maximum packet length in time slot As shown in Fig 1, the period of successful transmission T S consists of DATA, ACK, SIFS and DIFS intervals Let h 1 =[ACK + SIFS + DIFS] +1in slot, where [ ] is the Gaussian integer Then we have the PGF of T S as follows L p S(z) = a i z i+h1, (1) where a i is the probability mass function for the packet size The collision probability T C is determined by the longest one of the collided packets Assume that the probability of three or more packets simultaneously colliding is neglected and let Y 1 and Y 2 be two random variables of packet sizes engaged in collision, then the probability distribution of T C can be calculated by the following equation P {T C = h 1 + i} = P {Y 1 = i, Y 2 i} + P {Y 2 = i, Y 1 i} P {Y 1 = i, Y 2 = i} /06 $ IEEE

3 transmit Let p s be the probability that there is one successful transmission among other (n 1) stations in the considered slot given that the current station does not transmit Then, by the equation (3), we have p s =(n 1)[(1 ) n 2 n 1 + pc 1] To find the packet transmission probability, we let W 0 = CW min and m be the maximum backoff stage such that 2 m W 0 = CW max and let W i =2 i W 0, where i, 0 i m, is called backoff stage Let s(t), b(t) and k(t) be the random processes representing the backoff stage, the backoff counter and the frozen period of the station at a slot t respectively Then the 3-dimensional process {(s(t),b(t),k(t))} forms a discrete time MC depicted in Fig 2 At each transmission, the backoff counter is uniformly chosen in the range (0,W i ), where i is the current backoff stage, ie the number of transmission failed for the considered packet We denote the one-step transition probability of {(s(t),b(t),k(t))} by P {(i 1,j 1,k 1 ) (i 0,j 0,k 0 )} = P {(s(t +1)=i 1,b(t +1) = j 1,k(t +1)=k 1 ) (s(t) =i 0,b(t) =j 0,k(t) =k 0 )} Figure 2 State transition diagram of the discrete time Markov chain Thus we can obtain the PGF of the random variable T C as L p C(z) = [2a i F Y (i) a 2 i ]z i+h1, (2) where F Y (i) is the cumulative distribution function of a i,, 1, 2,,L p 32 Packet transmission probability and Markov chain The backoff process decreases its counter by one for every idle slot detected We let be the collision probability seen by a packet being transmitted on the medium Assume that there are n active stations in wireless LAN and packet arrival processes at all stations are independently and identically distributed Then we have =1 [1 (1 p 0 )τ] n 1, (3) where p 0 is the idle probability that there are no packets to transmit at the MAC layer of the considered station and τ is the packet transmission probability that the station transmits in a random time slot given that the station has packets to Then the one-step transition probabilities for the backoff stages and backoff counters at the original state of the frozen period are summarized as follows, for i =0, 1,,m, P {(i, j, 0) (i, j +1, 0)} =1, 0 j W i 2, P {(i, j, 0) (i 1, 0, 0)} = /W i,i 0, 0 j W i 1, and for 0 j W i 1, P {(0,j,0) (i, 0, 0)} = { (1 )/W 0, i m, 1/W 0, i = m The one-step transition probabilities of the frozen period at the backoff stages i and the backoff counter j are given by, for i =0, 1,,m, 0 j W i 1, P {(i, j, k 1) (i, j, k)} =1, 0 <k L, P {(i, j, k) (i, j, 0)} = q k, 0 <h 1 <k L, where L = h 1 + L p Thus we have s k = a k h1, c k = 2a k h1 F Y (k h 1 ) a 2 k h 1, k = h 1,,L, by the definitions of T S and T C Hence q k, is a distribution of the discrete random variable representing sum of packet size and some inter-frame spaces as follows q k = p s s k + p s c k Let b i,j,k = lim P {s(t) =i, b(t) =j, k(t) =k}, 0 i t m, 0 j W i 1, 0 k L be the stationary distribution of the MC Then, in steady state, we can derive following relations through the state transition diagram First, /06 $ IEEE

4 we have, for i =0, 1,,m, j =1,,W i 1, b i,j,0, 1 k h 1, b i,j,k = b i,j,0 q l, h 1 +1 k L l=k By the recursive relation, we have b i,0,0 =( ) i b i,0,0, 1 i m, b i,0,0 =(1 )b i,1,0 + b i 1,0,0, 1 i m, W i b i,j,0 =(1 )b i,j+1,0 + b i 1,0,0 + b i,j,1 W i = W i j b i,0,0, 1 i m, 1 j W i 1 (1 )W i By the normalization condition, we have 1= m W i 1 j=1 b i,j,0 + m For simplicity, let η =1+ b 0,0,0 = [ ηw0 (1 (2 ) m+1 ) 2(1 )(1 2 ) W i 1 j=1 m b i,j,k + b i,0,0 k=1 k=h 1+1 η(1 pm+1 c ) kq k, then we have 2(1 ) ] 1 pm+1 c 1 When the backoff counter reaches zero, a station will attempt to transmit packet regardless of backoff stage So we can find the probability τ that the station which has a packet in its buffer transmits in a randomly chosen time slot Thus we have[ ηw0 (1 (2 ) m+1 ] 1 ) τ = 2(1 2 )(1 p m+1 c ) η 2(1 ) The PGF of MAC layer service time In the backoff process, if the medium is idle, the backoff counter has the probability 1 to decrement by 1 during a time slot and the probability to stay at the original state (i, j, 0) during the frozen period Moreover the frozen period has the probability p s to stay at the original state during T S and has the probability p s to stay at the original state during T C LetH b (z) be the PGF of time interval needed to decrement the backoff counter by 1 Then we have (1 )z H b (z) = 1 z q k z k k=h 1+1 By using the above equation, we can obtain the PGF of the MAC layer service time T B, m 1 B(z) =(1 )S(z) ( C(z)) i H i (z) +( C(z)) m S(z)H m (z), (4) where S(z) and C(z) are given in the equations (1) and (2) and H i (z) is defined by i 2 j W H i (z) = 2 j (H b (z)) k W 0 j=0 4 Queueing analysis In this section we present the considered MMPP/G/1/K queue with the MAC layer service time A data buffer with finite capacity K including a single server is fed by an d- state MMPP process The MMPP is an elementary and useful doubly stochastic Poisson process in which the arrival rate is given by λ[j(t)], where J(t), t 0 is an d-state irreducible MC The d-state MMPP is characterized by the infinitesimal generator Q of the underlying MC and by an arrival rate matrix Λ=diag(λ 1,λ 2,,λ d )Weuseadstate MMPP to model the input traffic Let A(t) be the number of arrival packets during the time interval [0,t) and let J(t) be the state of the underlying MC at time slot t We denote the transition probabilities of the process {A(t),J(t),t 0} by P ij (n, t) =P {A(t) =n, J(t) =j A(0) = 0,J(0) = i} The d d matrix P (n, t) of the transition probabilities has the PGF as follows P (z,t) =e [Q+(z 1)Λ]t, z 1 Let X(t) be the number of packets in the data buffer at time slot t Let t n be the n-th packet departure instant and let X n = X(t n +) and J n = J(t n +) be the state of the queueing system and the state of the underlying MC just after t n respectively Then {(X n,j n ),n 0} forms a finite MC with state space {0, 1,,K 1} {1, 2,,d} The onestep transition probability matrix P is given by A 0 A 1 A 2 A K 2 Ā K 1 A 0 A 1 A 2 A K 2 Ā K 1 P = 0 A 0 A 1 A K 3 Ā K 2, A 0 Ā 1 where A k = P (k, t)p (T B = t), Ā k = A i, and T B t=1 i=k is the MAC layer service time in Section 3 To find A k,let U be the matrix which accounts for the evolution of J(t) during server s idle periods and whose (i, j) entry denotes the conditional probability of reaching phase j at the end of an idle period, starting from phase i, then we have U = 0 e (Q Λ)t Λdt =(Λ Q) 1 Λ By using the matrices U and A k, we can obtain A k and Ā K 1 as follows A k = UA k =(Λ Q) 1 ΛA k, Ā K 1 = A i i=k /06 $ IEEE

5 Let π k,j be the limiting probability of (X n,j n ), ie, π k,j = lim n P {X n = k, J n = j}, and let π = (π 0,π 1,,π K 1 ) with π k = (π k,1,π k,2,,π k,d ), 0 k K 1 Then we have the steady-state probability vector π by the equation π P = π with πe =1, where e is a column vector with all ones Next we will find the limiting distribution of (X(t), J(t)) at an arbitrary time Let x k,j be the limiting probability as x k,j = lim t P {X(t) =k, J(t) =j X(0) = 0,J(0) = i}, and let x =(x 0,x 1,,x K ) with x k =(x k,1,,x k,d ) By supplementary variable method, we can find the steady-state probability vector x Let the random variable Γ be the steady-state of server, namely Γ=1if the server is busy and Γ=0if it is idle Then the probability that the system is busy is given by γ 1 P {Γ =1} = E[T B ] E[T B ]+π 0 (Λ Q) 1 e, where E[T B ] is the MAC layer mean service time Thus the relation between the state probabilities at an embedded time point and an arbitrary time point is given by x 0 = γ 1 π 0 (Λ Q) 1 E[T B ] 1, x n = γ 1 [π n + n 1 π k U n 1 k (U I)](Λ Q) 1 E[T B ] 1, x K = θ K 1 n=0 x n, where θ is the steady-state probability vector of the underlying MC, ie, θq =0[9] Note that x 0 gives the idle probability p 0 = x 0 e appeared in the equation (3) The packet blocking probability P B for an arbitrary packet is given by K P B = x K Λe/( x k Λe) We can use Little s law with the effective arrival rate λ = θλe of in order to find the mean packet delay W, K λ (1 P B )W = kx k e By using P B and the packet discard probability due to transmission failures, we have the throughput S at each station by S = λ (1 P B )(1 p m+1 c ) 5 Numerical results In this section, we present some numerical results to show the property of the discrete probability distribution of B(z) for the MAC layer service time, the packet delay and the packet loss performance and the queue dynamics of the MMPP/G/1/K queue with B(z) as a service time model We use the system parameters for FHSS(Frequency Hopping Spread Spectrum) PHY-specification and DCF access Probability distribution n=10, m=5, =03, basic Real data Exponentail Log normal Erlang(E2) MAC Service Time [x5ms] Figure 3 PDFs of MAC layer service time Packet blocking probability =01 =013 =02 MMPP/G/1/K queue, = 01, 013, Effective arrival rate Figure 4 Packet blocking probability wrtλ method[4] In addition, the other parameters such as the channel bit rate 2Mbps, the length of a time slot 50μs, the number of active stations n =10, the maximum backoff stage m =5and the initial value of a contention window W 0 =32are fixed We assume that the propagation delay is neglected and the channel is error-free[2] We assume that three modes correspond to the most frequent packet sizes, 64 bytes(47%), 594 bytes(23%) and 1518 bytes(30%)[8] From Fig 3, we can see that the 2-stage Erlangian distribution is a good approximation to the real distribution of the MAC layer service time for the basic access method Now we present some numerical result of MMPP/G/1/K queueing model with the MAC layer service time In this part, we deal with also the basic access method We use a simple 2-state MMPP (Q, Λ) as an arrival process, which has the following representation with the effective arrival rate λ =(r 2 λ 1 + r 1 λ 2 )/(r 1 + r 2 ), ( r1, r Q = 1 r 2, r 2 ), Λ= ( λ1, 0 0, λ 2 ) /06 $ IEEE

6 Packet delay MMPP/G/1/K queue, = 01, 013, 02 =01 =013 =02 tensity varies From this figure, we can see that the system throughput depends on the collision probability when the traffic intensity varies We need further studies to give the detail comparison of the queue dynamics between the basic access and the RTS/CTS access and to investigate the effect of the traffic burstiness on the queue dynamics Acknowledgement This research was supported by the MIC, Korea, under the ITRC support program supervised by the IITA Thouughput Effective arrival rate Figure 5 Mean packet delay wrt λ =01 =013 =02 MMPP/G/1/K queue, = 01, 013, Traffic intensity Figure 6 System throughput wrt ρ Figs 4 and 5 show the packet blocking probabilities and the mean packet delays of the basic access method when the effective arrival rate varies in three cases of collision probabilities =01, 013, 02, respectively Moreover, from the equation (4), we can obtain the corresponding mean MAC service times E[T B ]=11037, and 21387, respectively We take the parameters r 1 =01, r 2 =02 and λ 2 =004 fixed But the effective arrival rate varies, since the arrival rate λ 1 varies From Fig 4, we can see that the packet blocking probabilities have sharhanges around effective arrival rates λ =0036, 006 and 074 in cases of =01, 013 and 02, respectively This is because the collisions increase significantly around this traffic load and increase rapidly as large as the collision probabilities are From Fig 5, we the similar results on the mean packet delays when the effective arrival rate varies in three cases of collision probabilities =01, 013, 02, respectively Fig 6 shows the system throughput when the traffic in- References [1] IEEE Standard ParT II: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications (1999) [2] 2 P Chatzimisios, V Vitas and AC Boucouvalas, Throughput and delay analysis of IEEE protocol, IEEE INFOCOM 02 1 (2002) [3] YT Lee, DH Han and CG Park, Saturation Throughput and Dealy Analysis of DCF in the IEEE Wireless LAN, WSEAS Trans on Comm 4 (2005) [4] H Zhai, YG Kwon and Y Fang, Performance analysis of IEEE MAC protocols in wireless LANs, Wireless Comm and Mobile Computing 4 (2004) [5] G Bianchi, Performance Analysis of the IEEE Distributed Coordination Function, IEEE J on Selected Areas in Comm 18 (2000) [6] P Chatzimisios, AC Boucouvalas and V Vitas, Packet Dealy Analysis of IEEE MAC Protocol, Electronics Letters 39 (2003) [7] H Chen and Y Li, Analytical Analysis of Hybrid Access Mechanism of IEEE DCF, IEICE Trans on Comm E87-B(2004) [8] CG Park, DH Han and B Kim, Packet Dealy Analysis of Dynamic Bandwidth Allocation Scheme in an Ethernet PON, Networking-ICN05, LNCS 3420 (2005) [9] A Baiocchi and N Blefari-Malzzi, Steady-State Analysis of the MMPP/G/1/K queue, IEEE Trans on Comm 41 (1993) /06 $ IEEE

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL

THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL J. Appl. Math. & Computing Vol. 22(2006, No. 1-2, pp. 501-515 THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL DONG HWAN HAN AND CHUL GEUN PARK Abstract. The IEEE 802.11

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2

More information

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Modeling and Analysis of TCP Dynamics over IEEE WLAN Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r

More information

Performance analysis of the IEEE MAC protocol for wireless LANs

Performance analysis of the IEEE MAC protocol for wireless LANs INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 25; 18:545 569 Published online 2 June 25 in Wiley InterScience (www.interscience.wiley.com). DOI: 1.12/dac.717 Performance analysis

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs A Scheme for Enhancing TCP Fairness and Throughput in IEEE 802.11 WLANs Eun-Jong Lee 1, Hyung-Taig Lim 1, Seung-Joon Seok 2, and Chul-Hee Kang 1 1 Department of Electronics Engineering, Korea University

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Real-Time Medical Data over WLANs

Real-Time Medical Data over WLANs 2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model Saturated Throughput Analysis of IEEE 80.e Using Two-Dimensional Markov Chain Model Lixiang Xiong and Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 006 Australia

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Performance Analysis of IEEE DCF in Imperfect Channels

Performance Analysis of IEEE DCF in Imperfect Channels Performance Analysis of IEEE 82. DCF in Imperfect Channels Yu Zheng, Kejie Lu, Dapeng Wu, and Yuguang Fang Abstract IEEE 82. is the most important standard for wireless local area networks (WLANs). In

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems

A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems 2009 Fifth International Conference on Networking and Services A Component Modular Modeling Approach based on Object Oriented Petri Nets for the Performance Analysis of Distributed Discrete Event Systems

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs

Analysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs Analysis of the Distribution of the Backoff Delay in 802.11 DCF: A Step Towards End-to-end Delay Guarantees in WLANs Albert Banchs Universidad Carlos III de Madrid banchs@it.uc3m.es Outline I. The Daidalos

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Performance Study of IEEE DCF and IEEE e EDCA

Performance Study of IEEE DCF and IEEE e EDCA 4 erformance Study of IEEE 802. DCF and IEEE 802.e EDCA Giuseppe Bianchi a, Sunghyun Choi b and Ilenia Tinnirello c 4. Introduction One of the key factors for the wide acceptance and deployment of IEEE

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

WIRELESS local area networks (WLANs) have been

WIRELESS local area networks (WLANs) have been 1648 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 5, SEPTEMBER 2006 Performance Analysis of IEEE 802.11 DCF in Imperfect Channels Yu Zheng, Kejie Lu, Member, IEEE, Dapeng Wu, Senior Member,

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab

More information

Throughput analysis for coexisting IEEE and networks under unsaturated traffic

Throughput analysis for coexisting IEEE and networks under unsaturated traffic Luong et al. EURASIP Journal on Wireless Communications and Networking (2016 2016:127 DOI 10.1186/s13638-016-0586-4 RESEARCH Open Access Throughput analysis for coexisting IEEE 802.15.4 and 802.11 networks

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Analysis of the IEEE e EDCA Under Statistical Traffic

Analysis of the IEEE e EDCA Under Statistical Traffic Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University

More information

Dimensioning the Contention Channel of DOCSIS Cable Modem Networks

Dimensioning the Contention Channel of DOCSIS Cable Modem Networks Dimensioning the Contention Channel of DOCSIS Cable Modem Networks J. Lambert, B. Van Houdt, and C. Blondia University of Antwerp, Department of Mathematics and Computer Science, Performance Analysis of

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications

Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018

More information

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Raffaele Bruno, Marco Conti, and Enrico Gregori Italian National Research Council (CNR) IIT Institute Via G. Moruzzi, 1-56100 Pisa, Italy {firstname.lastname}@iit.cnr.it

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

THE delay characteristics of the IEEE [1] DCF in

THE delay characteristics of the IEEE [1] DCF in azavi et al. Multimedia Performance for IEEE.8. DCF Multimedia Performance for IEEE.8. DCF TS/CTS with Varying Traffic Conditions azavi, M. Fleury, and S. Monaghan Abstract Delay and jitter are important

More information

ACK-based QoS Support and Throughput Improvement over WLANs

ACK-based QoS Support and Throughput Improvement over WLANs ACK-based QoS Support and Throughput Improvement over 802.11 WLANs Mehmet Fatih Tüysüz Department of Computer Engineering Harran University ftuysuz@harran.edu.tr ABSTRACT In IEEE 802.11 wireless network

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Modeling and Simulating Packet Dispersion in Wireless Networks

Modeling and Simulating Packet Dispersion in Wireless Networks Worcester Polytechnic Institute Digital WPI Computer Science Faculty Publications Department of Computer Science 6 Modeling and Simulating Packet Dispersion in Wireless 8. Networks Mingzhe Li Worcester

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2008 Characterising the interactions between unicast and broadcast in

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE 802.11 WLAN 1 Khan Tazeem Ahmad, 2 Beg M. T., & 3 Khan M. A. 1,2 Department of ECE, Faculty of Engineering & Technology, Jamia Millia Islamia,New

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy

CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy CSMA/CA Bottleneck Remediation in Saturation Mode with New Backoff Strategy Baher Mawlawi, Jean-Baptiste Doré To cite this version: Baher Mawlawi, Jean-Baptiste Doré. CSMA/CA Bottleneck Remediation in

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Analytical Models for Capacity Estimation of IEEE WLANs using DCF for Internet Applications

Analytical Models for Capacity Estimation of IEEE WLANs using DCF for Internet Applications 1 Analytical Models for Capacity Estimation of IEEE 82.11 WLANs using DCF for Internet Applications George Kuriakose, Sri Harsha, Anurag Kumar and Vinod Sharma Abstract We provide analytical models for

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Analysis of New Distributed Media Access Control Protocols Proposed for IEEE Wireless Local Area Networks

Analysis of New Distributed Media Access Control Protocols Proposed for IEEE Wireless Local Area Networks 1 Analysis of New Distributed Media Access Control Protocols Proposed for IEEE 802.11 Wireless Local Area Networks Meerja Khalim Amjad, Student Member, IEEE, and Abdallah Shami, Member, IEEE Department

More information

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Throughput and Energy Consumption Analysis of IEEE 802.15.4 Slotted CSMA/CA T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Kwon We propose a new analytic model of the IEEE 802.15.4 slotted CSMA/CA from

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information