N-BEB: New Binary Exponential Back-off Algorithm for IEEE

Size: px
Start display at page:

Download "N-BEB: New Binary Exponential Back-off Algorithm for IEEE"

Transcription

1 N-BEB: New Binary Exponential Back-off Algorithm for IEEE Mohammad Shurman 1, Bilal Al-Shua'b 2 (1) Jordan University of Science and Technology/Network Engineering and Security Department, Irbid, Jordan (2) Jordan University of Science and Technology/Computer Engineering Department, Irbid, Jordan alshurman@just.edu.jo, ambilal12@cit.just.edu.jo Abstract: In recent years, wireless ad-hoc networks have become increasingly popular because they are considered a de-facto alternative for infrastructure-less environments. These networks are formed by a collection of independent wireless mobile nodes that can communicate and operate directly over wireless media without the need for a preexisting communication infrastructure. Along with the hidden and exposed terminal problems, it has been observed that the fairness issue is responsible for DCF' performance-degradation. The IEEE DCF (Distributed Coordination Function) is considered the most popular technique used for the physical and MAC layers in ad-hoc networks. DCF is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism. Since the IEEE is the most implemented protocol, there has been countless research aimed at enhancing its performance in different ways, including modifying the Medium Access Control (MAC) algorithm (i.e. back-off algorithm). In this paper, a novel mechanism is suggested to resolve the IEEE standard fairness problem, which results an unfair channel sharing between the stations due to the duplication of CW each time an unsuccessful transmission occurs, while resets CW value in case of a successful transmission. To impose fairness in ad-hoc networks, our proposed idea dynamically tunes the CW value based on the previous transmission status of each node attempts to transmit. By studying the characteristics of the proposed algorithm using the NS2 simulator, we found that our proposed algorithm improves the fairness by fairly distributing channel between the competing nodes as well as a remarkable reduction in the number of dropped packets. In addition, our proposed algorithm has a considerable improvement in the packet delivery ratio as well. Keywords: IEEE back off, BEB, QoS, chancel fairness, wireless MAC. An earlier version of this research paper was presented in MIPRO2014.

2 1. INTRODUCTION M obile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate directly over wireless media without the need for a preexisting communication infrastructure. Nodes in these networks act as a transmitter, receiver, and a router for others to forward the communication packets until reaching the desired destination [1]. Two mechanisms are provided for the MAC protocol in IEEE standard: the point coordination function (PCF), and the distributed coordination function (DCF). The major difference between them is that PCF utilizes a basic access mechanism that supports contention-free services, which in turn require a coordinator (or a central point) to coordinate the channel access between the nodes. On the contrary, the distributed coordination function (DCF) utilizes the contentionbased services, in which, all nodes have the same priority to access the channel without the need of a central point [2] [3]. DCF is a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism in which a station wishing to transmit a packet first senses the channel status. If the channel is free for a time greater than or equal to predetermined DIFS (Distributed Inter Frame Space), then the station is allowed to transmit if its back-off counter (the number of idle slots a node should wait before it can transmit) equals zero. Otherwise, the node should decrements the counter (back-off counter) for each time slot that passes. The back-off counter value is randomly picked from the range [0, CW] size as in equation 1, where CW denotes the contention window size which is initialized to CW min, and is doubled after each collision until it reached to a maximum value CW max [3][4]. Back-off time Random CW SlotTime

3 In order to send a packet, a wireless node should wait until the medium becomes idle, and then wait for DIFS period followed by back-off time. After that, if the medium is still idle, the station can send its packet, but if the medium becomes busy before back-off time expiration, the wireless node waits until the medium becomes idle again. It then waits for DIFS period followed by the residual of the previous back-off time before it starts to transmit [4][5][6]. The collision occurs when two stations are transmitting at the same time with no ACK is received. This will increases the value of CW to reduce the collision probability as in equation 2 [5]. CW new min CW old 1 CW max Each time the transmission fails due to a collision or other reason, the retry counter is incremented and the CW is duplicated as in equation 2. If the retry counter reaches a specific limit of 7 as defined by the standard IEEE , the packet will be dropped. However, if the transmission succeeds, the CW is reset to CW min, and a new back-off counter is chosen randomly as in equation 1. The default back-off scheme in IEEE is the binary exponential back-off (BEB) which suffers from fairness problem. Fairness is one of the major problems where some nodes obtain most of the channel s bandwidth while others starve [6] [7], and thus, some nodes can achieve significantly larger throughput than others. Many researchers have proposed algorithms to improve back-off performance (i.e., fairness), these algorithms can be divided into two categories: Adjusting the CW size based on the number of collisions that have occurred during the transmissions [2][5]. Adjusting the CW size dynamically based on changes occur within the network environment [3].

4 In the first category, adjusting the CW is performed after a collision happened, which means that the cost of collision (such as packet retransmission and power drain caused by retransmitting packets) has already been paid. In contrast, approaches of the second category can immediately adjust the CW to the most appropriate CW size, based on network environment changes without paying the cost of the collision. This option clearly outperforms the first category. For these reasons, this paper proposes a novel algorithm, New Binary Exponential Back-off (N-BEB), to solve the fairness problem. Unlike other algorithms, our proposed algorithm adjusts the CW by taking into account the number of successful and unsuccessful transmissions. In addition, it also takes into account the state of channel occupation in order to guarantee fair access to the communication medium to all competing nodes. 2. RELATED WORK Authors of [1] proposed a History Based Adaptive Back-off (HBAB) algorithm that attempts to improve the QoS by modifying the original BEB algorithm. The history of successive packet transmit trials is taken into account. To accomplish this task, HBAB defines three variables: the contention window size (CW) which holds most recent CW value, the multiplicative factor α which is used to update CW value, and the ChannelState which represents channels states. Their proposed algorithm was tested using QualNet and Linux-based testbed simulators. The results showed that their algorithm outperforms the original IEEE with up to a 33.51% improvement in delay, and a 7.36% improvement in packet delivery ratio. A new algorithm that modifies DCF procedure to reduce the bandwidth as well as end-to-end delay caused by retransmitting the collided packets is proposed in [2]. This algorithm adopts a new mathematical model to increment the value of the CW. This proposed approach is implemented and tested using NS2 Simulator. The

5 obtained results showed significant improvements in the number of sent packets, packets lost, and the average throughput. Improving the short-term fairness (fairness over short time scales) in IEEE networks without any adjustment to CW size is presented in [8]. Basically, the main idea is forcing all nodes in the network to choose their CW value randomly within the initial CW size, which is equal to 512. When a collision happens, the CW of the collided nodes is decreased to gain higher channel access priority, therefore increasing the short-term fairness. Compared with the original standard, the results showed that their approach achieved a high level of short-term fairness, higher throughput, and lower collision probability. An improved collision back-off algorithm that considers the node access fairness is presented in [9]. In Node Access Fairness Back-off (NAFB) algorithm, the sending and non-sending stations adjust their CW based on the sensed collided stations. In case of a successful transmission of any sending node in the network, its CW value will be decreased slowly. At the same time, the CW values of the other non-sending stations are decreased faster. In case of an unsuccessful transmission, the CW value of the sending node is increased faster than the CW values of the non-sending stations. Simulation results showed that NAFB algorithm can improve the network throughput, packet drop rate, and packet delay. Both unfair bandwidth sharing, and station-to-station communication efficiency problems in the IEEE infrastructure WLAN are discussed in [10]. In addition, a new mechanism to improve the fairness of IEEE protocol is presented. Since the probability of transmitting packets from all stations is considerably larger than the probability that AP has to transmit a packet, this algorithm considers dual queues and multiple transmission opportunities to tackle the unfair bandwidth sharing problem

6 between the AP, and other stations. The results showed that their proposed approach can improve the efficiency and fairness of IEEE protocol, as well as enhance the throughput of station-to-station traffic. 3. PROPOSED APPROACH In our proposed approach a new procedure enhances the opportunity for any given node intending to access the channel. In an instance when the node cannot access the channel, the proposed algorithm allows the CW to increase its value two times consecutively. After two unsuccessful transmissions, the node starts decreasing the value of the CW. This is contrary to the original protocol which doubled the CW value each time an unsuccessful transmission occurred. When a transmission is successful, the CW is calculated by CW = CW/ 2 as shown in Fig. 1. This operation is repeated during the first nine successful transmissions. Afterwards, we set the number of successful transmissions to 1 and CW is set to CW 1.3. The CW value is incremented in order to give the other nodes more opportunity to access the channel, especially the nodes that collided more than two times. This step demonstrates an efficient fairness between the nodes. In case of an unsuccessful transmission as explained in Fig. 2, the CW is calculated by CW = CW 2. This operation will be repeated during the first two unsuccessful transmissions. Thereafter, the number of unsuccessful transmissions is set to 1, and CW is set to CW/1.5. This reduction in CW value gives the node an opportunity to retransmit its data successfully. However, the parameters of 2, 1.3, and 1.5 in both successful and unsuccessful transmissions are chosen carefuly based on intensive simulation experiments to achieve the best results.

7 Start counter =1 Backoff=random(0,CW) *slot time Successful transmission No Counter >9 Yes Counter++ Counter=1 CW=CW/ 2 CW=CW * 1.3 No CW<CW min CW>CW max Yes Yes No CW=CW min CW=CW max Figure 1: Proposed algorithm (Successful case)

8 Start counter =1 Backoff=random(0,CW) *slot time unsuccessful transmission No Counter > 2 Yes Counter++ Counter=1 CW=CW* 2 CW=CW/1.5 No CW>CW max Yes Yes CW<CW min No CW=CW max CW=CW min Figure 2: Proposed algorithm (Unsuccessful case) 4. SIMULATION RESULTS AND DISCUSSIONS The NS-2 simulator [13] is used to test our approach. We build three experimental scenarios using the above proposed parameters. Scenario1 is used to test our approach

9 against the following four metrics: PDR, end-to-end delay, number of dropped packets, and number of lost packets. The simulation was run over multiple trials to observe how our algorithm will behave in the network. Scenario 2 and Scenario 3 are used to test our approach, Fairness Index (FI) metric. Scenario 2 is used in many research papers such as [11][12], and it tests the fairness between the nodes while they are static. Finally, we use scenario 3 to test our approach in case of mobile nodes, which is more realistic for comparison. The proposed algorithm is compared with the original Binary Exponential Back-off (BEB), Improved Binary Exponential Back-off (I-BEB)[11], and Enhanced Binary Exponential Back-off (E-BEB) [12] using different metrics in this comparison. 4.A Performance Metrics Packet Delivery Ratio: the number of correctly received packets at the intended destination to the number of sent packets at the source node, which is defined as: PDR =Packets Received / Packets Sent (3) Where larger packet delivery ratio means better performance of the protocol. The number of dropped packets during the network lifetime: the total number of packets that were dropped by all nodes in the network during the network lifetime. It is defined by TraceGraph [14] as the number of dropped events (D) that appear in the trace file. End-to-End Delay: the average time taken by a data packet to be transmitted across a network until it reaches the destination. This also includes the delay caused by route discovery process, and the queue in data packet transmission. Only the data packets that are successfully received by destinations are considered.

10 End-to-End Delay = ( arrive time send time )/ Number of connections (4) This contains the transmission delay, propagation delay, processing delay, and queuing delay. Fairness index: which is defined as: Fairness index (FI) = ( n i=1 x i) 2 n (x i ) 2 n i=1 (5) Where n is the number of the same priority flows and X i is the throughput of flow i. Therefore, FI < 1 and it reaches 1 when all X i are equal, which corresponds to the highest fairness that can be achieved between the nodes. Number of lost packets during the network lifetime: represents the total number of the packets that were sent by the sender nodes, but were not received by receiver nodes during the network lifetime. 4.B Performance Evaluation In this section a deeper understanding of the impact of our scheme on the system performance, as well as the fairness among nodes through the simulation study is presented. The above 3 scenarios are used for this purpose. To achieve a fair comparison we implemented BEB, I-BEB, and E-BEB algorithms as a baseline for comparison with our proposed algorithm, New Binary Exponential Back-off (N- BEB). Table1: Simulation parameters Transport Protocol UDP Max-speed 10m/s Area (100*100) m 2 Simulation time 600s Number of nodes 30,40,50, Traffic type CBR Pause Time 0 Slot time 20 µs Packet size 512 bytes DIFS 40 µs SIFS 10 µs

11 CW min 31 CW max 1023 All experiments were performed in a 100m 100m area consisting of different number of nodes ranging from 30 to 100, distributed randomly within the chosen area. Also, the source/destination pairs were chosen at random from the set of available nodes in the network. Each point in every presented graph is an average of the result of 5 trials using different seed values. For all experiments we chose the pause time to be 0. This means each node moves continuously throughout the simulation without stopping. The same generated scenarios are tested against the original BEB, N-BEB, E-BIB and I-BEB. Scenario (1): There are 30, 40, 50,, 100 nodes distributed randomly on m 2 planar domain. The maximum connections are chosen to be 30, 40, 50,, 100 respectively, and the transport layer adopts the UDP protocol. In the application layer, CBR (Constant Bit Rate) is adopted, the top speed of each node is 10 m/s, the simulation time is 600 sec. In addition to scenario 1, scenarios 2 and 3 are used to estimate fairness. Scenario 2 is when all nodes are static and distributed carefully, and is used in almost all research papers, and scenario 3 is when all nodes are mobile and distributed randomly. Scenario 3 is more realistic when used for comparison than scenario 2. Scenario (2): 10 nodes share the same channel in an area equal m 2, and the nodes are static. All nodes are the single-hop type to make sure that each node only communicates with its neighboring node. At 1.0 second simulation time, nodes (0, 2, 4, 6 and 8) simultaneously start sending data to their neighboring nodes (1, 3, 5, 7 and 9) as shown in figure 3.

12 Scenario (3): In this scenario 10 nodes share the same channel randomly distributed in 100x100 m 2 planar domains. We assume that all nodes are mobile continuously with a top speed of 10 m/s. By the time of 1.0 second, nodes start sending data to their neighboring nodes. Figure 3: scenario 2. N-BEB algorithm is a bit more complex than I-BEB and BEB since the original BEB has two cases, a successful case, and an unsuccessful case. In the successful case, the CW is reset to CW min, so the node can access the channel as soon as possible, and in the unsuccessful case BEB algorithm simply duplicates the CW. I- BEB algorithm focuses primarily on success by accessing the number of successful transmissions to determine whether to increase or decrease the CW. However, in cases where the transmission is not attained in a successfully consecutive manner, the CW is reset to minimum, making both of these algorithms simpler than N-BEB algorithm. In N-BEB algorithm, we considered both cases of successful and unsuccessful transmissions. We take into consideration the number of unsuccessful and successful transmissions, and adjust the value of CW accordingly. Thus, N-BEB is considered slightly more complex than BEB and I-BEB. In E-BEB algorithm, we note that it has the highest complexity since it continually calculates a threshold value to adjust the CW value as well as it maintains

13 a counter to calculate the number of successful transmissions to achieve more fairness. By doing so, this algorithm adds a new computational complexity. This computational complexity increases power consumption which is a critical issue in ad-hoc network. A. Dropped Packets Parameter One of the factors in which our approach outperforms BEB, E-BEB, and I-BEB algorithms is in the total number of dropped packets. With respect to scenario 1, figure 4 demonstrates that N-BEB algorithm has the lowest number of dropped packets among the comparative algorithms for all network sizes, which results in significant reduction in the channel overhead. Thereby, this results in having a higher network utilization as lower number of packets will be retransmitted. Reducing the number of dropped packets can be attributed to the reduction in the collision probability as a result of the randomization process that is followed by N-BEB algorithm. Also, our approach takes into account the unlucky nodes that could not send their data successfully in a consecutive manner. By increasing their chance to gain successful transmission before the max retry count is reached the chance of dropping the packets is decreased. Thus, our approach saves the packets from being dropped.

14 Figure.4 Number of Dropped packets From figure.4, we noticed that our approach (N-BEB) reduced the number of dropped packets by 50% relative to the BEB approach when the network size is 30 nodes. This reduction is increased, as the network size increased, until it reaches 65% when the number of nodes are 100. Also N-BEB overcomes I-BEB approach by a 72% reduction in the number of dropped packets when the network size is 30 nodes. This reduction is increased as the network size increased until it reaches 85% when the network size is 100 nodes. By comparing the N-BEB approach with the E-BEB approach we found that N-BEB overcomes E-BEB approach by a 50% reduction in the number of dropped packets when the network size is 30 nodes. This reduction is increased as the network size increased to 85% when the network size is 100 nodes. B. Lost Packets Parameter Another factor that N-BEB outperforms BEB, E-BEB and I-BEB approaches, is the total number of lost packets. Figure 5 compares the lost packets in different network sizes. It is clear that our proposed algorithm has a significant reduction in the number of lost packets, thereby having higher network utilization and lower energy drain caused by retransmissions. This reduction can be attributed to the reduction in the average time the transmitted packet spends in the buffer before it is successfully received by the destination. Lost packet could happen due to node movement, which changes the network topology before the packet received successfully, so our approach saves the packets from being lost. From figure.5, we can see that our approach (N-BEB) reduced the number of lost packets by 83% relative to BEB approach when the network size is 30 nodes. This reduction is decreased until it reaches 68% at 100 nodes network size. Compared to I- BEB approach, N-BEB reduced the number of lost packets by 86% when the network

15 size is 30 nodes. This reduction is decreased until it reaches 74% at 100 nodes network size. N-BEB also overcomes E-BEB approach with a 69% reduction in the number of lost packets when the network size is 40 nodes. This reduction is decreased until it reaches 2% at 100 nodes network size. Figure.5 Number of lost packets C. Packet Delivery Ratio Parameter Figure 6 shows the delivery ratio for the proposed algorithm, N-BEB, compared to BEB, E-BEB and I-BEB algorithms with different network sizes. Each value in the presented graph is an average of 5 trials using different seed values. It is clear that N- BEB algorithm has the highest delivery ratio among the other algorithms since the channel availability for the sender is higher than the other algorithms, due to retransmissions reduction. When the number of nodes increased, we notice that the PDR for all approaches decreased. Increasing number of nodes in the network will decrease the distance between nodes and thus increase the impact of interference between the nodes, which leads to increase the number of dropped packets and reduce the PDR.

16 Figure.6 Packet Delivery Ratio (PDR) Figure.6 demonstrates that our N-BEB increased the PDR by 7% relative to BEB approach when the network size is 50. This improvement in the PDR is continuously increased, as the network size increased, until it reaches 11% when the network size is 100 nodes. When we compared N-BEB with I-BEB we found that N-BEB increased the PDR by 5% when the network size is 30 nodes. This improvement in the PDR is continuously increased, as the network size increased, until it reaches 10% when the network size is 100 nodes. Relative to E-BEB approach we found that N-BEB outperforms E-BEB by 2% improvement in PDR value when the network size is 40. This improvement in the PDR value is continuously increased, as the network size increased, until it reaches 15% when the network size is 100 nodes. D. End To End Delay Parameter End-to-End delay for N-BEB, BEB, E-BEB, and I-BEB algorithms are shown in Figure 7. For all network loads, E-BEB algorithm has the highest End-to-End delay value among the other algorithms since E-BEB increases its threshold value when the number of nodes is small, which increases the End-to-End delay. It decreases its

17 threshold value in case of high network load, which leads to a collision probability increase, thereby increasing the End-to-End delay. When the network load is low, BEB algorithm has the lowest End-to-End delay value compared to the other algorithms. End-to-End delay value for N-BEB algorithm is higher than BEB algorithm when the number of nodes is less than 70 nodes. The reason behind this is the original algorithm resets the value of the CW when a node attains successful transmission, which increases the probability of another packet to be also successfully transmitted within short time interval. The N-BEB approach tries to delay the node that already has a successful data packet transmission from transmitting again to give the starving nodes more opportunity to transmit. Figure.7 End-to-End delay We can see that our approach (N-BEB) increased the end-to-end delay value by 34% to 37% when the network size varied from 30 to 70 nodes relative to BEB approach. It outperformed BEB by 5% up to 15% when the network size varied from 80 to 100 nodes. Compared to I-BEB approach, N-BEB had significant reduction by 2% up to 29% as the network size varied from 60 to 100 nodes. While at network size, 30 nodes to 50 nodes, I-BEB approach had a better end-to-end delay value by

18 30% at 30 nodes, down to 10 % at 50 nodes. Relative to E-BEB approach we noticed that N-BEB approach decreased the end-to-end delay value by 33% when the network size is 30 nodes. This reduction is decreased until it reaches 28% when the network size equals 100 nodes. E. Fairness Index Parameter By adjusting the CW value carefully and reducing the starvation in the network, as well as minimizing the capturing problem, fairness can be significantly improved as in figure 8. By comparing our proposed algorithm (N-BEB) with the other mentioned algorithms, namely BEB, I-BEB, and E-BEB according to scenario 2, it is clear that N-BEB algorithm has better FI metric value than both BEB, and I-BEB algorithms, while it has almost the same FI value as E-BEB. To be more realistic and fair in our comparison, we applied scenario 3, and the obtained results are shown in figure 9. Figure.8 Fairness Index of static node From Figure.8 we can see that our approach (N-BEB) increased the fairness index value by 1.4%, relative to BEB approach, and 3% compared to I-BEB approach. The value of fairness index of N-BEB is being compared to the original standard,

19 and another two algorithms according to scenario 3, and equation 5, is shown in figure 9. It is clear that the value of fairness index of N-BEB remains better than BEB and I-BEB algorithms, while it has the same FI value as E-BEB algorithm, which indicates how stable our proposed approach is. There is a significant reduction in FI metric value for BEB algorithm, which can be attributed to the capturing problem in which one node captures the channel continually while the others starve. Our improvement in fairness is due to the dynamic way in adjusting the CW value since each node can be assigned a CW based on its transmission status which prevents channel capturing by a greedy node. Figure.9 Fairness Index of mobile nodes N-BEB approach increased the FI value by 27% relative to BEB approach and 4% compared to I-BEB approach. FI clearly shows how fairly the channel is shared between all active nodes. Therefore, FI indicates that our proposed algorithm, N- BEB, achieved the fairness requirements more efficiently than the I-BEB and BEB, and has the same FI value as E-BEB for scenario 1, and scenario 2.

20 5. CONCLUSION AND FUTURE WORK In this paper, we focused on solving the fairness issue to enhance the Qos of the existing IEEE protocol by dynamically adjusting the value of the CW based on the transmission status of each node. We presented a novel mechanism for improving fairness in the IEEE protocol called N-BEB algorithm. N-BEB algorithm aims to solve the problem of fairness by counting the number of successful and unsuccessful data packet transmissions, and adjusting the CW accordingly. In addition to attaining better fairness than the original standard (BEB) algorithm and I-BEB algorithm, N-BEB also achieves a higher packet delivery ratio, a lower number of lost packets, and a lower number of dropped packets than BEB, I- BEB, and E-BEB algorithms. It deserves pointing out that our proposed algorithm manages a massive improvement in the end-to-end delay when the network size is large. When making a comprehensive evaluation and as far as the complexity is concerned, we found that N-BEB algorithm is less complex than E-BEB, but more complex than I-BEB and BEB. REFERENCES [1] Maali Albalt, Qassim Nasir, Adaptive Backoff Algorithm for IEEE MAC Protocol, International Journal of Communications, Network and System Sciences, vol. 4, [2] Sedrati Maamar, Maamri Ramdane, Contention Window Optimization: an enhancement to IEEE DCF to improve Quality ofservice, International Journal of Digital Information and Wireless Communications, vol. 2, [3] Yi-Hung Huang, Chao-Yu Kuo Dynamic tuning of the IEEE distributed coordination function to derive a theoretical throughput limit, EURASIP Journal on Wireless Communications and Networking, vol. 1, [4] Mustafa Ergen, IEEE Tutorial, Report of Electrical Engineering and Computer Science Department, University of California-Berkeley, [5] Amine Berqia, Blaise Angoma Fairness and QoS in Ad-Hoc Networks, IEEE Vehicular Technology Conference, Singapore, [6] Ying Jian, Ming Zhang, Achieving MAC-Layer Fairness in CSMA/CA Networks, IEEE/ACM Transactions on Networking, Vol. 19, [7] Ying Jian, Shigang Chen, Can CSMA/CA networks be made fair?, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom 08, New York, [8] Almotairi, Khaled Hatem Inverse Binary Exponential Backoff: Enhancing Short-term Fairness for IEEE Networks, Proceedings of the Tenth International Symposium on Wireless Communication Systems (ISWCS 2013), Germany, 3013.

21 [9] Xiaoying Zhang, Lei Guo, An Improved Backoff Algorithm with Node Access Fairness in WLAN, 4th IET International Conference on Wireless, Mobile & Multimedia Networks (ICWMMN 2011), Beijing, [10] Chih-Cheng Weil, Kawuu w. Linl, Yeong-Sheng Chen and Chih-Heng Ke, Improving Efficiency and Fairness in IEEE Infrastructure WLANs with Station-to-Station Traffic, 16th International Symposium on Wireless Personal Multimedia Communications (WPMC 2013), NJ, [11] Kun Wang and Changming Sun, An Improved Backoff Algorithm of Ad Hoc Networks, In proceedings of International Conference on Computational Intelligence and Software Engineering (CiSE 2009), Wuhan, [12] Mohammed Al-Hubaishi, Tariq Abdullah, RaedAlsaqour, and Amine Berqia, E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks, Journal of Applied Sciences, Engineering and Technology, vol. 4, [13] The Network Simulator ns-2: Documentation, [14] Trace graph, NS2 trace file analyzer,

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Accountability of WMNs using BEB Algorithm

Accountability of WMNs using BEB Algorithm Accountability of WMNs using BEB Algorithm Shafi Jasuja Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Parminder Singh Department of Information Technology

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Transmission Rate Control through MAC Layer Acknowledgements Feedback

Transmission Rate Control through MAC Layer Acknowledgements Feedback Transmission Rate Control through MAC Layer Acknowledgements Feedback Mohamed Arabi Center for Security, Communications and Network Research University of Plymouth Plymouth, UK mohamed.arabi@plymouth.ac.uk

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Zhifei Li School of Computer Engineering Nanyang Technological University Singapore, 639798 Sukumar Nandi Dept. of

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

International Journal of Technical Research and Applications e-issn: , Special, Issue 43 (March 2017), PP.

International Journal of Technical Research and Applications e-issn: ,  Special, Issue 43 (March 2017), PP. COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS IN IEEE 802.11 DCF MAC PROTOCOL 1 Aditi Harugade, 2 Priyanka Karunglikar, 3 Damini Jadhav, 4 Prem Kumar, 5 T.N. Sawant 1,2,3,4,5 Electronics and Telecommunication

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Adaptive Backoff Algorithm for IEEE MAC Protocol

Adaptive Backoff Algorithm for IEEE MAC Protocol Int. J. Communications, Network and System Sciences, 9,, 9- doi:./ijcns.9. Published Online July 9 (http://www.scirp.org/journal/ijcns/). Adaptive Backoff Algorithm for IEEE MAC Protocol Maali ALBALT 1,

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

Improving the performance of Wireless LANs with MAC Adaptation

Improving the performance of Wireless LANs with MAC Adaptation Improving the performance of 82.11 Wireless LANs with MAC Adaptation Dorothy A. Rambim 1, Mjumo Mzyece 2 and Karim Djouani 2 Department of Electrical Engineering French South Africa Technical Institute

More information

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE 802.11 WLAN 1 Khan Tazeem Ahmad, 2 Beg M. T., & 3 Khan M. A. 1,2 Department of ECE, Faculty of Engineering & Technology, Jamia Millia Islamia,New

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Key-Words: Ad hoc network, multimedia, QoS, routing protocol.

Key-Words: Ad hoc network, multimedia, QoS, routing protocol. Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia

More information

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Performance Improvement In MANET By Using A Modified BEB Algorithm

Performance Improvement In MANET By Using A Modified BEB Algorithm Performance Improvement In MANET By Using A Modified BEB Algorithm Aparna S. Mankar 1, Mangla S. Madankar 2 1 ME Student, Wireless Communication & Computing, GHRCE Nagpur 2 Assistant Professor, Department

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information