A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

Size: px
Start display at page:

Download "A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks"

Transcription

1 A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences, No. 415, Chien Kung Road, Kaohsiung 807, Taiwan, R.O.C Abstract Wireless Mesh Network (WMN) makes people to pay much attention in recent years. In WMN, the data from subscriber can be relayed by multi-hop communication in the wireless mesh backhaul to the Mesh Portal Point (MPP) for accessing the wired Internet. This paper proposes a wireless scheduling protocol named Quota Transfer Protocol for data upstream transmission in wireless mesh backhaul. This protocol can guarantee the throughput from each mesh points to MPP in order to deal with the fairness problem and back-off inefficiencies caused by CSMA/CA mechanism. Keywords Medium access control, Wireless Mesh Network, quality-of-service(qos). I. Introduction By the development of wireless network recently, a commodity multihop Ad hoc Networks for Internet access technology which is named Mesh Networks make people to pay more attention on it [1]. As shown in Figure 1 WMN, the data from subscriber can pass by multi-hop communication through a row of immobile mesh points (MP) instituted backhaul to the Mesh Portal Point (MPP) for access the wired Internet, as shown in Figure 1. It benefits in extending the coverage areas, reduce cost and easy to deployment and maintenance. For the moment, several groups are working to define standards for wireless mesh networking techniques. The corresponding standards by range are IEEE a (WiMAX) for wireless metropolitan area networks (WMAN), IEEE s (Wi-Fi) for wireless local area networks (WLAN) and (ZigBee) for personal area networks (WPANS)[2]. Because WMN is a special case in mobile ad hoc networks (MANETs), there are many researches in routing and security in MANETs [3] which can be applied to WMN, we do not need to discuss these cases here. In this paper we only concerned about the bandwidth problem in the backhaul of WMN. Because of advancement of multimedia applications, the network Quality of Service (QoS) requirement which is included throughput, delay, and packet loss for multimedia transmission is more important. In WMN, take Wi-Fi for example, since all of the MP in backhaul use the same radio frequency, we must effectively arrange each MP transmitting data to avoid interference with other MP. If there is a mechanism for executing fairness for all MP sending data to the MPP, we can determine the nominal capacity of wireless mesh network [4]. A wireless token-passing protocol for multi-hop wireless mesh networks, named Ripple Protocol [5], proposed a downlink transmission mechanism for sending data from MPP to a leaf node. However, in uplink transmission, there will be a lot of MPs have data upstream to the MPP for accessing Internet. We must control each MP transmit data in order to deal with the fairness problem and avoid back-off inefficiencies. Figure 1 The network architecture of WMN We using ns-2 [6] to simulate the network architecture as shown in Figure 1 and explain the unfairness problem. We assume user 1 under MP N+4 generate UDP traffic (128kbps CBR flow 1) at 0.1 second of simulation time. At simulation time 3 seconds user 2 under MP N+3 generate a same UDP traffic (128kbps CBR flow 2). At 5 seconds user 3 under MP N+1 generate a higher UDP traffic rate at 512kbps (CBR flow 3). All the flows are toward to MPP. The simulation result as shown in Figure 2, flow 1 generate by user 1 with more hops, at first it can reach its throughput. But when flow 2 and flow 3 with fewer hops join and share the same backhaul, flow 1 gets dismal throughput and even starving. The unfairness is caused by 2 reasons, one is hidden and exposed terminal problems, and another is buffer management. We assume that there is an infinite amount of data to be sent from every node N+1 to N+4 in the network. In heavy loaded situation, when the data from node N+4 is sending to node N+3, it always dropped by node N+3 because the queue is full. Even we use different queues for the relayed and for the originating traffic and to serve them in a round-robin fashion [7]. The transmission probability of the data from node N+4 in node N+3 is 1/2. To analogize, the probability of data from node N+4 relayed by node N+2 is 1/4, relayed by node N+1 is only 1/8. However, the probability of data from node N+1 to MPP is 1/2, there still exists a serious fairness 338

2 problem. Besides, the mechanism under the contention base will cause the efficiency down. This paper proposes a mechanism to solve the problem on data upstream to MPP by a wireless scheduling protocol named Quota Transfer Protocol. This mechanism provides guarantee bandwidth approached to the nominal capacity of wireless mesh network for each MPs. Under this mechanism, if there are some MPs no data to be sent, the quota can send to other MPs as far as possible to reach highest utility rate. Figure 2 Simulation result - throughput of 3 flows II. Quota Transfer Protocol Overview By the routing algorithm such as AODV [3], each MP will record the routing table. This paper considers WMN architecture in a chain topology with a fixed routing path to MPP without discussing associated routing problems. As shown in Figure 3, the assumption of network architecture is similar to Ripple Protocol [5]. Each MP nodes are equally spaced and the radio of nodes does not interfere with other MPs except neighbors. In Figure 3, the node N is MPP, nodes from N+1 to N+4 are MPs. If each MPs always has data G to be sent; the collision domain corresponding to link node N+1 and node N+2 will be the max collision domain {N+3~N+2, N+2~N+1, N+1~N}. The max collision domain (MCD) = = 9. It means the nominal capacity G max <= Bandwidth / MCD = Bandwidth / 9. [4] The quota transfer protocol (QTP) proposed in this paper provides a guarantee bandwidth G QTP = Bandwidth / (MCD+1) to all MPs, which approaches to the nominal capacity G max under a heavy loaded situation. QTP scheduled MCD+1 timeslots to a Superframe (SF) as shown in figure 4. In a SF each MP node can send data to MPP. To achieve this objective, each MP must have two buffers and one [quota] counter. The first buffer is named [OB] (Output buffer) which is used to store the originating data from queue, and the other is named [RB] (Relay buffer) which is used to relay the data from downstream MPs. QTP adopts seven types frames: DATA, NULL, RTS, CTS, ACK defined in IEEE , Ready-to-Receive (RTR) frame defined in Ripple [5], and buffer Null and Ready-to-Receive (NRTR) frame defined in this paper. We use the same frame format defined in IEEE except the fixed duration DATA frame. The NRTR frame does not only include the same RTR function for DATA frame but also support the function to transfer quota. The QTP deals with RTS, RTR and NRTR as tokens for MP nodes to send data; MP node is only allowed to send its DATA frame when the quota is not empty and holds a RTS, RTR or NRTR. MP node can be operated in the one of the five following states: Initialization state: MPP send beacon and relayed to each MP. Every MP node gets quota value during this state. Transmit state (TX): After hold token, MP node is sending DATA or NULL frame to upstream MP node. Receive state (RX): MP node is receiving DATA or NULL frame from next MP node and store to [RB]. Listen state: Case MP node in Idle state overhear communication of other nodes will go to this state. MP node keeps silence to avoid the interference. Idle state: When errors occur or MP node expire its quota. We will use flowchart to describe of Quota transfer protocol shown in Figure 5. Figure 4 QTP Superframe Figure 3 The nominal capacity of a 4 nodes network in chain topology III. Illustrations of Quota Transfer Protocol This paper uses three scenarios to illustrate the quota transfer protocol. First scenario is in the heavy loaded situation; every MP node always has data to send. The second scenario is in the medium loaded situation; only part of MP nodes always has data to 339

3 send. The last scenario is a light loaded situation; there is only one MP node always has data to send. We assume the error rate during transmission is under control for example by using the FEC mechanism to correct errors. Scenarios 1: By the network architecture as shown in Figure 2, the wireless mesh backhaul has four mesh points from N+1 to N+4, and every MP node always has data to upstream send through MPP for accessing the wired Internet. Under this heavy loaded situation; the QTP shown as in Figure 6. In Figure 6, after beacon signal for synchronize all MP node, MP node N+1 and node N+4 first hold token and goes to TX state. MPP and MP N+3 received RTS goes to RX state. MP N+2 overhear RTS form MP N+1 and goes to listen state. In the first NAV time slot MPP received DATA from MP N+1. In the 4 th time slot MPP received DATA of MP N+4 relayed by backhaul. In the7 th time slot MPP received DATA of MP N+3. In the last time slot of SF, MPP received DATA of MP N+2. During this SF, each MP sent its [OB] data during one of NAV time slots, and all of the data relay hop by hop to the MPP. It shows QTP guarantees the throughput from each MP nodes to MPP. To complete a QTP process needs MCD+1 times NAV time slots, and the MCD = 9 from Figure 2; hence the upstream throughput G QTP can be got as follows: G QTP = Bandwidth/ (MCD+1) = Bandwidth/10 Figure 5 QTP flowchart Scenarios 2: Extending the network architecture of Figure 2 to six MP nodes from N+1 to N+6 and only four MP nodes {N+ 1, N+ 3, N+ 4, and N+ 6} always have data sent to MPP for accessing the wired Internet. Under the medium loaded situation, the QTP shown as in Figure 4. When the chain topology extends to six nodes, the collision domain still corresponding to link nodes N+1 and N+2 is the max collision domain {N+3~N+2, N+2~N+1, N+1~N}. The maximum of collision domain is: MCD = = 15. The SF after beacon is consisting of 16 time slots. It can get the upstream throughput G QTP as follows: G QTP = Bandwidth/ (MCD+1) = Bandwidth/16 In Figure 7, we verified a complete QTP process with sixteen NAV time slots. There is only MP nodes N+1, N+3, N+4 and N+6 have data to be sent upstream to the MPP. After a complete QTP process the MP nodes N+1 and N+4 sent one DATA frame and relay to MPP, that is, the MP nodes N+1 and N+4 have throughput G QTP. The MP nodes N+3 and N+6 sent two DATA frames and relay to the MPP; so the 340

4 MP nodes N+3 and N+6 get the throughput 2 G QTP. Every MP node with data to be sent will have throughput G QTP at least; that is to say, QTP guarantees the throughput G QTP for each MP node to MPP. In the protocol, MP node with no data also has to transfer its quota to others MPs for increasing the system efficiency and avoiding bandwidth waste. Figure 6 Timing diagram of Scenarios 1 under QTP mechanism Figure 7 Timing diagram of Scenarios 2 under QTP mechanism 341

5 Figure 8 Timing diagram of Scenarios 3 under QTP mechanism Scenarios 3: In the scenarios, the wireless mesh backhaul in Figure 2 has four mesh points from N+1 to N+4 but only MP node N+1 always has data sent to MPP for accessing the wired Internet. Under the light loaded situation; the QTP shown as in Figure 8. In Figure 8, MP nodes N+2 to N+4 have no data to send, but they are not in IDLE state. Under QTP these nodes still have to send NRTR and NULL for transferring its quota. As the result, the four quotas are all transferred to the MP node N+1, and the throughput of MP node N+1 is increased to 4 G QTP, and the system throughput is also grown. IV. Conclusions and Future Work This paper proposes a QTP under the chain topology of wireless mesh network architecture to provide a good schedule for MP nodes upstream transmitting to MPP. The protocol guarantees the throughput G QTP that approaches to the nominal capacity G max for each MP node sent to MPP in heavy loaded situation. It keeps the MP with more hops away from starving. When the load is not heavy, it transfers the unused quota to increase throughput as more as possible. That is, QTP provides the better QoS for the multimedia communication in throughput guarantee, delay, and packet loss. This paper is based on the architecture of wireless local area network (Wi-Fi); the extending this idea to the same architecture wireless mesh network in WMAN mesh (WiMAX) and PWAN mesh (ZigBee) will be studied in the future. REFERENCES [1] R. Bruno, M. Conti, and E. Gregori, Mesh networks: commodity multihop ad hoc networks, IEEE Commun. Mag., vol. 43, pp , Mar [2]Lee M. J.,Jianliang Zheng, Young-Bae Ko, Sherstha D. M., Emerging standards for wireless mesh Technology, IEEE Wireless Commun., vol. 13, pp56-63,april [3] Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko Milutinovic, Routing and Security in Mobile Ad Hoc Networks, IEEE Computer Society,pp.61-65, Feb [4]Jangeun Jun, Sichitiu M.L., The Nominal Capacity of Wireless Mesh Networks, IEEE Wireless Commun., vol 10,pp8-14, Oct [5]Ray-Guang Cheng, Cun-Yi Wang, Li-Hung Liao, Jen-Shun Yang, Ripple: A Wireless Token-Passing Protocol for Multi-Hop Wireless Mesh Networks, IEEE Communications Letters, vol 10, Feb [6] UCB/LBNL/VINT Network Simulator (NS-2), Available at [7]J.Jun and M. L. Sichitiu, Fairness and QoS in multihop wireless networks, in Proc. Of the IEEE Vehicular Technology Conference (VTC), October

Performance Evaluation of e over Multihop WiFi Mesh Networks

Performance Evaluation of e over Multihop WiFi Mesh Networks Performance Evaluation of 802.11e over Multihop WiFi Mesh Networks Kuo-Lun Hua and Ray-Guang Cheng Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan,

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

A Novel Queue Management Mechanism for Improving Performance of Multihop Flows in IEEE s based Mesh Networks

A Novel Queue Management Mechanism for Improving Performance of Multihop Flows in IEEE s based Mesh Networks A Novel Queue Management Mechanism for Improving Performance of Multihop Flows in IEEE 82.11s based Mesh Networks Nagesh S. Nandiraju, Deepti S. Nandiraju, Dave Cavalcanti, Dharma P. Agrawal Center for

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Fair scheduling in the network with a mesh topology

Fair scheduling in the network with a mesh topology International Research Journal of Applied and Basic Sciences. Vol., 3 (5), 911-918, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Fair scheduling in the network with a mesh topology

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee Performance Analysis of Beacon Enabled IEEE 802.15.4 Using GTS in Zigbee Rajashri Wavage PG Student Computer Science and Engineering Baddi University of Emerging Science and Technology Aman Kaushik. Asst.

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks : An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks Shu Du Yanjun Sun David B. Johnson Systems and Applications R&D Center, Texas Instruments, Dallas, TX, USA Department of Computer

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Achieving Fairness in IEEE Ad Hoc Networks

Achieving Fairness in IEEE Ad Hoc Networks Achieving Fairness in IEEE 2.11 Ad Hoc Networks Fanilo Harivelo and Pascal Anelli IREMIA, Université de La Réunion BP 7151, 15 Avenue R. Cassin, 97715 Saint Denis Messag 9, France {Fanilo.Harivelo Pascal.Anelli}@univ-reunion.fr

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay)  Fair Queueing Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies

More information

Journal of Emerging Trends in Computing and Information Sciences

Journal of Emerging Trends in Computing and Information Sciences Vol. 4.Special Issue ICCSII ISSN 79-87 Simple Routing for Multi-hop Wireless Network Md. Anwar Hussain, Md. Faiz Iqbal Faiz, and Ishita Chakraborty North Eastern Regional Institute of Science and Technology

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless Ad-Hoc Networks

Wireless Ad-Hoc Networks Wireless Ad-Hoc Networks Dr. Hwee-Pink Tan http://www.cs.tcd.ie/hweepink.tan Outline Part 1 Motivation Wireless Ad hoc networks Comparison with infrastructured networks Benefits Evolution Topologies Types

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

British Journal of Science 1 September 2011, Vol. 1 (1) A Study of Routing Algorithms in Wireless Mesh Networks

British Journal of Science 1 September 2011, Vol. 1 (1) A Study of Routing Algorithms in Wireless Mesh Networks British Journal of Science A Study of Routing Algorithms in Wireless Mesh Networks Adward Lee and John beacli Department of Electrical and Computer Engineering University of Florence, Italy E-mail: a38@engmail.flroe.it

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol

A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol Nurul I. Sarkar School of Computing and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand nurul.sarkar@aut.ac.nz

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Novel Techniques for Fair Rate Control in Wireless Mesh Networks Novel Techniques for Fair Rate Control in Wireless Mesh Networks Mohiuddin Ahmed Computer Science and Engineering Department Islamic University of Technology Gazipur, Bangladesh K.M.Arifur Rahman Electrical

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Cross Layer Design in d

Cross Layer Design in d Australian Journal of Basic and Applied Sciences, 3(3): 59-600, 009 ISSN 99-878 Cross Layer Design in 80.6d Ali Al-Hemyari, Y.A. Qassem, Chee Kyun Ng, Nor Kamariah Noordin, Alyani Ismail, and Sabira Khatun

More information