A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

Size: px
Start display at page:

Download "A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem"

Transcription

1 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem Sho Motegi, Hiroo Sekiya, Jing Ma, Kosuke Sanada and Shiro Sakata Graduate School of Advanced Integration Science, Chiba University, Chiba, Japan z8t1580@students.chiba-u.jp Abstract This paper proposes a MAC protocol for ad hoc networks with directional antennas for mitigating the directional hidden-node problem. In the proposed protocol, it is possible to tell the communication situation to the directional hidden node by using DATA-frame fragmentations and short busy advertisement signals. As a result, the frame collisions induced by the directional hidden nodes can be reduced and the network throughput is enhanced compared with the conventional protocol. Simulation results show the validity and effectiveness of the proposed protocol. I. Introduction Wireless communication using a beam-forming of the directional antennas [2]-[5] enhances the spatial-reusability of the network. In [2], a MAC protocol for directional antenna networks was proposed. In [2], IEEE with RTS/CTS handshakes is applied to directional antenna networks, which is called DMAC. In the DMAC protocol, network throughput improves because of the high spatial reusability. However, a new type of hidden node problem, which is called directional hidden-node problem, appears in the directional antenna networks. Directional hidden nodes are generated when a node cannot hear the RTS/CTS exchange because of the own communication to another direction. The directional-hidden-node problem limits the network throughput of the DMAC system. The mitigation of the directional hidden-node problem is one of the important problems for more enhancement of the directional-antenna-network throughput. In [6], a Short Busy Advertisement MAC (SBA-MAC) protocol was proposed for the special hidden-node problem reduction in omni-directional antenna networks. Hidden nodes, which were treated in [6], appears when the node cannot receive an RTS frame correctly because of own CTS frame transmission to another node. In [6], the DATA-frame fragmentation and the Short Busy Advertisement, (SBA) signal are used for avoiding data-frame collisions. The transmitter divides the DATA frame into several data fragments and inserts a small interval between two adjacent data-fragment transmissions. The receiver sends a SBA signal to tell neighbor nodes what the receiver is in ongoing communication during the data-fragment-reception intervals. All the nodes, which detect the SBA signal, defer their transmission opportunities even though they cannot receive the RTS and/or CTS frames. Therefore, hidden-node collisions are reduced in high node-density situation and heavy offered load environments, in particular. We find that appearance mechanism of hidden nodes pointed out in [6] is different from but similar to that of the directional hidden nodes. Therefore, it may be a good idea that the SBA-MAC concepts are applied to the protocol design for solving the directional hidden-node problem. In this paper, a MAC protocol for ad hoc networks with directional antennas is proposed for mitigating the directional hidden-node problem. In the proposed protocol, SBA-MAC protocol concept applied in a DMAC protocol. Therefore, the proposed protocol is named as SBA-DMAC. By using the DATA-frame fragmentation and the SBA signals, it is possible to tell the communication situation to the directional hidden node. As a result, the frame collisions induced by the directional hidden nodes can be reduced dramatically and the network throughput is enhanced. Simulation results show the validity and effectiveness of the SBA-DMAC protocol. II. Related works A. DMAC and directional hidden-node problem Wireless communications using a beamforming of the directional antennas enhance the spatial-reusability of the network [2]-[5]. A MAC protocol for directional antenna networks which is called DMAC, was proposed in [2]. The DMAC protocol is recognized as the basic MAC protocol for directional antenna systems. The network spatial reusability of the directional antenna networks is higher than that of the omni-directional antenna networks because all frames i.e. RTS/CTS/DATA/ACK are transmitted by using directional antennas. Therefore, the network throughput of directional-antenna networks can be improved compared with the omni-directional antenna networks. In the DMAC protocol, however, collisions induced by hidden nodes degrade the network throughput. Additionally, the directional hidden node problem, which never occurs in omni-directional-antenna networks, appears in directional antenna networks [4]. Figure 1 shows an example of the directional hidden-node problem. In Fig. 1 (a), the node H transmits a frame to the node I by using the directional /12/$ IEEE 409

2 Fig. 2. An example scenario in the omni-directional antenna networks. (a) the hidden-node collision in the with RTS/CTS handshakes (b) the hidden-node-collision avoidance in the SBA-MAC protocol Fig. 1. An example scenario of the collision due to the directional hidden node problem in the directional antenna networks antenna. Meanwhile, the node S communicates with the node R with the directional antennas and the receiver node R transmits a CTS frame. In this case, the node H cannot hear the CTS frame because the node H beamforms toward the node I. When the node H would like to transmit a new frame to the node R, an RTS frame from the node H to the node R collides with the DATA frame from the node S to the node R as shown in Fig. 1 (b). This is because the node H is not aware of the ongoing communication between the nodes S and R due to the previous frame transmission to the node I. This is an occurrence mechanism of the directional hidden-node problem. This type of the hidden node problem is a dominant factor of the throughput degradation in directional antenna networks. B. MAC protocol using the DATA-frame fragmentation and short busy advertisement signal The MAC protocol with Short Busy Advertisement (SBA-MAC) was proposed in [6] for avoiding the frame collisions induced by hidden node in omni-directional antenna networks. In the SBA-MAC protocol, hidden-node collisions can be mitigated effectively because the receiver periodically sends SBA signals to tell neighbor nodes what the receiver is in ongoing communication. Figure 2 (a) shows a scenario of hidden-node collisions in the IEEE with RTS/CTS handshakes, which was pointed out in [6]. In Fig. 2 (a), the node R starts transmitting a CTS frame for replying for the RTS-frame from the node S. Meanwhile, the node H, which is a hidden node of the node S, starts transmitting the RTS frame to the node R. The node H cannot receive the CTS frame from the node R because the node H is transmitting the RTS frame to the node R. In this case, the node H is not aware of the communication between the node S and R. When the node H retransmits an RTS frame to the node R as shown in Fig. 2 (a), the RTS frame collides with the DATA-frame from the node S. The SBA-MAC protocol is designed for avoiding this type of the collisions. Figure 2 (b) shows an example time series of the SBA-MAC protocol. In the SBA-MAC protocol, the node S divides the DATA frame into several fragments. Figure 3 shows a message sequence of the SBA-MAC protocol. After finishing the RTS/CTS exchanges, the transmitter divides the payload of the DATA frame into several fragments and inserts a 410

3 Fig. 3. An example of the message sequence in the SBA-MAC protocol small interval between two adjacent data-fragment as shown in Fig. 3. The interval is called Inter-Data-Frame Spacing or Inter-Data-Fragment Spacing (IDFS). The IDFS durations are needed for receiver transmission of the SBA signal. The IDFS duration includes T RT and T TR as shown in Fig. 3, which are duration of the switching time from the reception mode to the transmission one and that from the transmission mode to the reception one, respectively. When the node R successfully receives the first data fragment, the node R sends a SBA signal to the neighbor nodes for notifying the reception state of the receiver during the IDFS period. The time length of the SBA duration is long enough for other nodes to sense the SBA signal. Any node sensing the SBA signal should keep silent for a certain period, denoted as Inter-Frame Spacing due to short Busy advertisement (BIFS) [6], by setting the Network Allocation Vector (NAV). Therefore, the data-fragment transmissions can be protected and the hidden-node problem as shown in Fig. 2 (a) can be mitigated in the SBA-MAC protocol. In the SBA-MAC protocol [6], the larger the data-fragment number is, the more number of the IDFS should be inserted between two adjacent data-fragment transmissions. When the period for sending the SBA is short, it is possible to avoid frame collisions induced by the frame-collision mechanism as shown in Fig. 2 (a) with high probability. This factor enhances the network throughput. Excessive data-frame fragmentations, however, cause the overhead enlargement, which suppresses the network throughput. The overhead due to the unnecessary DATA-frame fragmentation may dominantly degrade the network throughput for light offered load networks, in particular. Therefore, it is one of the good strategies that the fragment number is adoptively changed according to the network environments. We find that the mechanism of the frame collision in Fig. 2 (a) is different from but similar to that of the directional hidden-node problem as shown in Fig. 1. It is thought that the SBA-MAC concept may be effective for mitigating the directional hidden-node problem. III. Protocol description In this paper, a MAC protocol for ad hoc networks with directional antennas is proposed. In the proposed protocol, the SBA-MAC-protocol concept is applied in the DMAC protocol [2]. Therefore, we named the proposed protocol as SBA-DMAC. Fig. 4. A flowchart for the transmitter in SBA-DMAC protocol A. Basic operations of the SBA-DMAC protocol Figure 4 shows a flowchart of the SBA-DMAC protocol for the transmitter. In the SBA-DMAC protocol, a transmitter transmits multiple data fragments continuously posterior to the RTS/CTS exchange. The DATA-frame-fragmentation method of the SBA-DMAC is the same as that of the SBA-MAC as shown in Fig. 3. When a node has a transmission frame, the node senses the channel in omni-directional mode. If the transmitter confirms that the channel is free, the node transmits the an RTS frame to the receiver using a directional antenna and sets a CTS-wait timer for preparing the CTS frame reception with beam-forming toward to the receiver [5]. In the SBA-DMAC protocol, information of both the time duration of the DATA frame and the predefined data-fragment number, which expresses F in Fig. 4, is are included in the RTS frame. If the transmitter cannot receive a CTS frame during the CTS-wait duration, it retransmits the an RTS frame by doubling the contention window (CW) value. When the transmitter receives a CTS frame successfully, the transmitter starts the first data-fragment transmission to the receiver with directional antenna and the transmitter transmits the data fragments continuously with IDFS intervals. In the SBA-DMAC protocol, the transmitter checks the SBA signal from the receiver after every data-fragment transmissions. When the SBA signal cannot be detected successfully, the transmitter stops data-fragment-transmission process for avoiding the unnecessary transmission-time wastage. In this case, the transmitter starts to prepare the retransmissions by doubling the CW value. When the transmitter finishes a last data-fragment transmission, the transmitter sets an ACK-wait timer for waiting the an ACK frame as a response. If the transmitter cannot receive the an ACK frame in the ACK-wait 411

4 Fig. 5. A flowchart for the receiver in SBA-DMAC protocol Fig. 6. An example of mitigating the directional hidden node problem in SBA-DMAC protocol duration, it retransmits an RTS frame by doubling the CW as shown in Fig. 4. When the transmitter can receive the an ACK frame, the transmitter recognizes that the frame transmission is succeeded. Figure 5 shows a flowchart of the SBA-DMAC protocol for the receiver. When a node receives an RTS frame, the receiver transmits a CTS frame to the transmitter with the time duration of the DATA frame and the data-fragment number. The data-fragment-length information is needed for advertising the directional hidden node of the transmitter. Data-fragment length is calculated from the DATA-frame length and the data-fragment number included in the RTS frame. When the receiver cannot receive any data fragment during the data-fragment-length period, the receiver escapes from the reception state. When the receiver receives a data fragment successfully, the receiver sends the SBA signal for notifying not only the success of fragment reception to the transmitter but also the ongoing communication situation to directional-hidden nodes. When the receiver receives the last data fragment, it replies an ACK frame to the transmitter. When a node receives an RTS frame but the node is not a receiver, the node defers its frame-transmission process toward the RTS-reception direction by setting the Directional Network Allocation Vector (DNAV) during the CTS-frame-transmission duration and the double of Short Inter Frame Spacing (SIFS) period. When a node receives a CTS frame without RTS-frame reception, the node defers its frame-transmission process toward the CTS-reception direction by setting the DNAV during one data-fragment transmission duration, which can be obtained from the CTS frame, and the (IDFS + SIFS) period. Additionally, when a node only detects a SBA signal, the node also defers its transmission toward the signal-detection direction by setting the DNAV. In concrete, if the node detects the first SBA signal at t = t 1, the node defers its transmission for half time length of the longest DATA-frame transmission time because the node has no information about the data-fragment length. If the node can detect a next SBA signal, at t = t 2, the node rests DNAV value to ( t 2 t 1 ), which is the data-fragment length. B. Hidden-node-collision reduction In the SBA-DMAC protocol, collisions due to the directional hidden node problem can be reduced by using the DATA-frame fragmentations and the SBA signals. Figure 6 shows an example of the directional-hidden-node-problem mitigation in the SBA-DMAC protocol under the same scenario as shown in Fig. 1. In the DMAC protocol as shown in Fig. 1, the node H is unaware of the communication between the node S and R because of the directional hidden node problem. In the SBA-DMAC protocol, because the node R sends the SBA signals periodically, the node H can detect the SBA signal of the node R before the node H starts frame transmission. By detecting the SBA signal, the node H accordingly defers its frame-transmission by setting the DNAV as shown in Fig. 6. As a result, the collisions due to the directional hidden node problem can be mitigated in the SBA-DMAC protocol when the proper fragment length is set. IV. Performance Evaluations The SBA-DMAC protocol is evaluated by simulations. Generally, directional transmissions have larger transmission range than omni-directional transmissions. Therefore, the directional beam-forming may potentially interfere with communications taking place far away. In this paper, however, we would like to focus on the gains from spatial reuse exclusively. Therefore, it is assumed that the transmission distance of the directional antenna is the same as that of the omni-directional antenna. In the simulation, it is also assumed that each node can comprehend all neighbor nodes and their directions. For investigating effects of the DATA-frame fragmentation and the SBA signal usage to directional hidden 412

5 TABLE I SIMULATION PARAMETERS UDP/IP header 28 bytes MAC header 20 bytes PHY header 6 bytes DATA-payload size 4095 bytes RTS size 20 bytes CTS size 14 bytes ACK size 14 bytes Channel bit rate 11 Mbps PHY header bit rate 1 Mbps Angle of antann beam π/2 Transmission range 150m Carrier sensing range 150m Distance of each node 100m Slot Time 20 µsec SIFS Time 10 µsec DIFS Time 50 µsec SBA Tx Time 5 µsec Minimum CW Size 31 Maximum CW Size 1023 Simulation time 5sec Retransmission limit 7 Fig. 8. Average throughput as a function of the offered load per flow for fixed data-fragmentation number Fig. 7. A network topology for simulations node problem, the adoptive variations of the data-fragment number is not considered and the fixed data-fragment number is used. The simulation parameters are given in Table I, which basically follow those in IEEE b standard [1]. Data-channel and Control-channel rates are 11 Mbps and 1 Mbps, respectively. Figure 7 shows a simulation network topology. Nodes are placed as 4 4 grid topology as shown in Fig. 7 and the node mobilities are not considered. In the simulations, adjacent nodes are included in the transmission range. For example, there are the nodes 2, 5 and 6 in the node-1 transmission range. The flow pattern is fixed and there are eight flows as shown in Fig. 7. The source of the flows generate DATA frames randomly in time with specified offered load. Figure 8 shows average throughputs per flow as functions of the offered load per flow for fixed data-fragmentation number. In this figure, the plots for F = 1 expresses the throughput for DMAC. The maximum data-fragment number is 15 because the PHY- and MAC-header should be in the first fragment. It is seen from Fig. 8 that the highest throughput can be obtained when the data-fragment number is 6. When the data-fragment number is lower than the optimal value, the network throughput degrades because a directional hidden node cannot detect a SBA signal prior to a new frame transmission. Conversely, the network throughput is also degraded when the frame-fragmentation number is larger than the optimal value. This is because unnecessary IDFS periods increase, which compresses the network throughput. It is confirmed from the Fig. 8 that there is a trade-off relationship between the hidden-node collision reduction and the overhead increase. Figure 9 shows throughputs per flow as functions of the offered load per flow for the proposed and conventional protocols. In this paper, the IEEE with RTS/CTS handshakes (IEEE ) [1], SBA-MAC [6], and DMAC [2] are investigated as conventional protocols. In this simulation, the SBA-MAC and SBA-DMAC protocol use the optimal data-fragment numbers, which are 9 and 6, respectively. It is seen from Fig. 9 that the throughputs of the SBA-MAC and SBA-DMAC are higher than that of the IEEE and DMAC respectively. Figure 10 shows the DATA-frame collision probabilities, which are defined as the ratio of the DATA-frame collision number to the DATA-frame transmission one, as functions of the offered load per flow. In the SBA-based protocol, the DATA-frame transmission is in failure when at least one data-fragment is collided with other frames. It is seen from Fig. 10 that the DATA-frame collision probability of the SBA-DMAC is lower than that of the DMAC. This is because the frame collisions induced by directional hidden nodes are reduced effectively in the SBA-DMAC. Additionally, the DATA-frame collision probabilities of the DMAC and SBA-DMAC protocols are lower than those of the IEEE and SBA-MAC protocols, respectively. This is because the usage of the directional 413

6 Fig. 9. Average throughput as a function of the offered load per flow with conventional protocols Fig. 10. DATA-frame collision probability as a function of the offered load per flow with conventional protocols antenna reduces the DATA-frame collision probability. It is also seen from Fig. 10 that the difference of DATA-frame collision probabilities between the IEEE and DMAC protocol is smaller than that between the SBA-MAC and the SBA-DMAC protocols, respectively, when the offered load is high. In the DMAC protocol, the collisions due to the directional hidden-node problem progressively increase as the offered load increases. In the SBA-DMAC protocol, the usage of the SBA signals can effectively mitigate the directional hidden-node problem. Therefore, the reduction rate between the SBA-DMAC and SBA-MAC protocols is much higher than that between the DMAC and IEEE at heavy offered load. As a result, the SBA-DMAC protocol can keep high network throughput at the heavy offered load as shown in Fig. 9. It is also seen form Fig. 9 that the throughput difference between the SBA-DMAC and DMAC protocols is higher than that between the IEEE and SBA-MAC protocols, respectively, at heavy offered load, in particular. This is because the probability of the directional hidden node occurrence is higher than that of the hidden node occurrence pointed out in [6]. This result indicates that the application of the DATA-frame fragmentation and the SBA signal usage to the directional antenna networks are very effective for mitigating directional hidden-node problem, which is a dominant factor of the throughput degradation. V. Conclusion and future works This paper has proposed a MAC protocol for ad hoc networks with directional antenna networks for mitigating the directional hidden-node problem. In the proposed protocol, it is possible to tell the communication situation to the directional hidden node by using the DATA-frame fragmentation and the SBA signals. As a result, the frame collisions induced by the directional hidden nodes can be reduced dramatically and the network throughput is improved. Simulation results show the validity and effectiveness of the proposed SBA-DMAC protocol. Though the SBA-MAC protocol fixes the data-fragment length, it is possible for the proposed protocol to adjust the data-fragment length according to network environments by inserting the fragmentation information into the RTS and CTS frames. The data-fragment number should be determined by the node density and the traffic amount. The detection methods of network environment information and the adoptive variations of the fragment number are very important problem in the SBA-DMAC we should address in the future. Acknowledgment This research was partially supported by Scholarship Foundation and Grant-in-Aid for scientific research (No and No ) of JSPS, Japan. References [1] ANSI/IEEE Standard , Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, [2] Y.-B. Ko, V. Shankarkumar, and N. H. Vaidya, Medium access control protocols using directional antennas in ad hoc netwroks, in Proc. IEEE INFOCOM, vol 1, Tel-Aviv, Israel Mar. 2000, pp [3] Subramanian, A.P., Das, S.R., Addressing deafness and hidden terminal problem in directional antenna based wireless multi-hop networks, Wireless networks., vol.16, issue.6, pp , August [4] R. R. Choudhury, X. Yang, R. Ramanathan, and N. H. vaidya, On designing MAC protocols for wireless networks using directional antennas, in IEEE Trans. Mobile Computer, vol. 5, no.5, pp , May [5] Bazan. O and Jassemuddinn. M, On the design of opportunistic MAC protocols for multihop wireless networks with beamfoming antennas, in IEEE Trans. Mobile Computing, vol. 10, pp , March [6] H. Zhai and Y. Fang, A solution to hidden terminal problem over a single channel in wireless ad hoc networks, Proceedings - IEEE Militariy Communications Conference MILCOM, art no , Oct [7] Bazan. O and Jassemuddin, M, A survey on MAC protocol for wireless adhoc networks with beamforming antennas in Communications Surveys & Tutorials, IEEE, vol.pp, pp.1-24, April

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Mitigating Deafness in Multiple Beamforming Antennas

Mitigating Deafness in Multiple Beamforming Antennas Mitigating Deafness in Multiple Beamforming Antennas Vivek Jain and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing Department of ECECS, University of Cincinnati, Cincinnati, OH 45221-0030

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

A Wireless Full-duplex and Multi-hop Network with Collision Avoidance using Directional Antennas

A Wireless Full-duplex and Multi-hop Network with Collision Avoidance using Directional Antennas A Wireless Full-duplex and Multi-hop Network with Collision Avoidance using Directional Antennas Yusuke Sugiyama, Kenta Tamaki, Shunsuke Saruwatari Shizuoka University, Japan Email: saru@inf.shizuoka.ac.jp,

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas

The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas The Deafness Problems and Solutions in Wireless Ad Hoc Networks using Directional Antennas Hrishikesh Gossain, Carlos Cordeiro, Dave Cavalcanti, and Dharma P. Agrawal OBR Center for Distributed and Mobile

More information

AD hoc wireless networks have attracted a growing

AD hoc wireless networks have attracted a growing IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 12, DECEMBER 2007 1 CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks Thanasis Korakis, Member, IEEE, Gentian

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Implicit MAC Acknowledgment: An Optimization to

Implicit MAC Acknowledgment: An Optimization to Implicit MAC Acknowledgment: An Optimization to 802.11 Romit Roy Choudhury Abrita Chakravarty Tetsuro Ueda University of Illinois at Urbana-Champaign Infosys Technologies, Pune, India ATR Adaptive Communications

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks P.Sivanesan Department of Information Technology Kurinji College of Engineering and Technology Tiruchirappalli, Tamilnadu, India

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks

Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks Cross-Layer Directional Antenna MAC and Routing Protocols for Wireless Ad Hoc Networks Hrishikesh Gossain, Carlos Cordeiro, Tarun Joshi, and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Mahasweta

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Using Directional Antennas for Medium Access Control in Ad Hoc Networks

Using Directional Antennas for Medium Access Control in Ad Hoc Networks Using Directional Antennas for Medium Access Control in Ad Hoc Networks Romit Roy Choudhury, + Xue Yang, + Ram Ramanathan and Nitin H. Vaidya + + Dept. of Electrical and Computer Engineering, and Coordinated

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

A Busy-Tone based MAC Scheme for Wireless Ad Hoc Networks using Directional Antennas

A Busy-Tone based MAC Scheme for Wireless Ad Hoc Networks using Directional Antennas Macau University of Science and Technology From the SelectedWorks of Hong-ing Dai 7 A Busy-Tone based MAC Scheme for Wireless Ad Hoc etworks using Directional Antennas Hong-ing Dai, Chinese University

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Directional medium access control for ad hoc networks

Directional medium access control for ad hoc networks Wireless Netw (2009) 15:1059 1073 DOI 10.1007/s11276-008-0102-9 Directional medium access control for ad hoc networks Jianfeng Wang Æ Hongqiang Zhai Æ Pan Li Æ Yuguang Fang Æ Dapeng Wu Published online:

More information

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks 22nd IEEE Personal Indoor Mobile Radio Communications Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks Ari Raptino H Graduate school of Shizuoka University Hamamatsu, Japan Email:

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

FSA: A Fast Coordination Scheme for Opportunistic Routing

FSA: A Fast Coordination Scheme for Opportunistic Routing F: A Fast Coordination Scheme for Opportunistic Routing Zhenyu Yang, Kai Zeng and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Worcester, MA 69 {zyyang, kzeng, wjlou}@wpi.edu Abstract

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks : An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks Shu Du Yanjun Sun David B. Johnson Systems and Applications R&D Center, Texas Instruments, Dallas, TX, USA Department of Computer

More information

WIRELESS Wireless local area networks (WLANs)

WIRELESS Wireless local area networks (WLANs) , March 16-18, 216, Hong Kong A Novel MAC Protocol for Improving the Throughput in Multi-Hop Wireless Networks Takumi Sanada, Xuejun Tian, Takashi Okuda, and Shi Xiao, Abstract WLANs have become increasingly

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Control Frame Shaping in Power Controlled and Directional MAC Protocols

Control Frame Shaping in Power Controlled and Directional MAC Protocols Ad Hoc & Sensor Wireless Networks Vol., pp. 1 26 Reprints available directly from the publisher Photocopying permitted by license only 27 Old City Publishing, Inc. Published by license under the OCP Science

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay)  Wireless MAC Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make

More information

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels

A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels A Rate-adaptive MAC Protocol Based on TCP Throughput for Ad Hoc Networks in fading channels Shoko Uchida, Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information