COLORED PETRI NET MODELING AND THROUGHPUT ANALYSIS FOR WIRELESS INFRASTRUCTURE NETWORKS

Size: px
Start display at page:

Download "COLORED PETRI NET MODELING AND THROUGHPUT ANALYSIS FOR WIRELESS INFRASTRUCTURE NETWORKS"

Transcription

1 COLORED PETRI NET MODELING AND THROUGHPUT ANALYSIS FOR WIRELESS INFRASTRUCTURE NETWORKS H. Abdul Rauf, Dean (CSE/IT), V.L.B. Janakiammal College of Engineering & Technology, Coimbatore A. Ebenezer Jeyakumar Principal, Government College of Engineering, Salem ABSTRACT CPN model consists of a set of modules, each of which contains a network of places, transitions and arcs. The modules interact with each other through a set of well-defined interfaces, in a similar way as known from many modern programming languages. The graphical representation makes it easy to see the basic structure of a complex CPN model, i.e., understand how the individual processes interact with each other. Throughput is a measure of the actual data that can be sent per unit of time across a network, channel or interface. Throughput is more often used in a practical sense, for example, to measure the amount of data actually sent across a network. Keywords: Throughput, Colored Petri Net, Access Point, Network Response Time, Model Time Unit 1 INTRODUCTION Colored Petri Net (CPN) is a graphical oriented language for design, specification, simulation and verification of systems. It is in particular well-suited for systems that consist of a number of processes which communicate and synchronize. Typical examples of application areas are communication protocols, distributed systems, automated production systems, and work flow analysis. Throughput can be a theoretical term like bandwidth, but in this paper it is used to measure the amount of data actually sent across a network in the real world. The remainder of the paper is organized as follows: Section (2) details the theory and background of the paper. Section (3) focuses on modelling of network components. Section (4) emphasizes on throughput analysis and graphical output. Section (5) the conclusion and future scope of the paper. 2 BACKGROUND Dmitry A. Zaitsev (2005) proposed Colored Petri Net model for the representation of wired LAN and a special measuring model to determine the network response time. The drawback of this scheme is that the results are obtained by simulation and does not provide accurate results. Also, the model excludes WLAN. Miorandi, Kherani A. A. and Altman E. (2004) proposed TCP flow control over The flow control aspect of Transmission Control Protocol (TCP) strongly influenced the Medium Access Control (MAC) layer behaviour, including the probabilities of packet collisions between wireless stations. The method does not handle a wide variety of network scenarios including the co-existence of both upstream and downstream TCP flows. Taka Sukari and Stephan Hanly (2004) proposed that in the wider Internet, the large bulk of traffic on a typical WLAN consists of applications such as web browsing that are carried over the TCP and collision between TCP packets are the main causes for the performance degradation of the network. The TCP throughput has been analyzed as a function of number of TCP flows when transmitted over an IEEE WLAN and dependent on the number of stations. The method validates the analytical results with simulation. 3 HETEROGENEOUS ENTERPRISE NETWORK MODEL The Enterprise Network Model consists of various components of the network which involves wired network and wireless network. Volume 3 Number 3 Page 155

2 3.1 Model of Switch A model for a static switching table is constructed. A separate input and output buffers of frames for each port and common buffer of the switched frames are considered. The model of switch is presented in Figure 1. The swi represents records of switching table. It maps each known MAC address to the number of port. The swf describes the switched frames, waiting for output buffer allocation. The field portnum stores the number of the target port. The places In and Out represent the input and output buffers of the ports correspondingly. [dst=target] token. The places In and Out are contacted ones. 3.2 Model of Access Point The model of Access Point (AP) is same as that of switch except that the delay involved in it varies. It is represented in Figure 2. In [dst=target] [target,port] APta* Api (src,dst,nf,port) In [target,port] SwTa * swi Out Out* (src,dst,nf,1) Apf Figure 2. Model of Access Point Bu* Out Out* (src,dst,nf,1) swf Figure 1. Model of Switch Each token represents the record of the switching table, for example (1,1)++1 (2,1)++1 (3,2)++1 (4,2). For instance, token 1 (4,2) means that the host with MAC address 4 is attached to port 2. The fusion place Buffer is represented with Bu* (Bu1, Bu2, Bu3) and it corresponds to the switched frames buffer. The fusion place SwitchTable is represented with SwTa* (SwTa1, SwTa2, SwTa3). It allows the convenient modeling of switches with an arbitrary number of ports avoiding numerous cross lines. The transitions In* model the processing of input frames. The frame is extracted from the input buffer only in cases where the switching table contains a record with an address that equals to the destination address of the frame (dst =target). During the frame displacement the target port number (port) is stored in the buffer. The transitions Out* model the displacement of switched frames to the output ports buffers. The fixed time delays (@+1) are assigned to the operations of the switching and the writing of the frame to the output buffer. When a frame is extracted from the input buffer by transition In*, it is replaced with the label. The label indicates that the channel is free and able for transmission. Before the transition Out* sends a frame into a port, it analyses if the channel is able by checking the 3.3 To investigate the frames, flow transmitting through LAN and to estimate the Network Response Time (NRT) it is necessary to construct the models of terminal devices attached to the network. For an accepted degree of elaboration it is consider that periodically repeated requests of workstations to servers with random uniformly distributed delays. LAN in LAN out f(src,dst,1) [dst=target] target src dst@+delay() dst Figure 3. Own mac Remote On reply to an accepted request a server sends a few packets to the address of the requested workstation. The number of packets sent and the time delays are uniformly distributed random values. A model of workstation is represented in Figure 3. The places LANin and LANout model the input and output channels of the LAN correspondingly. mac Volume 3 Number 3 Page 156

3 The workstation listens to the network by means of transition Receive that receives frames with the destination address, which is equal to the own address of the workstation (dst=target) saved in the place Own. The processing of received frames is represented by the simple absorption of them. The workstation sends periodic requests to servers by means of transition Send. The servers addresses are held in the place Remote. The sending of the frame is implemented only if the LAN ment is free. It operates by checking place LANout for a token. The workstation interacts with a few servers holding their addresses in the place Remote. The workstation only assigns the value of a unit to it. P1 In P1 Out Model of Switch P1 In P1 Out 3.4 Device Delay Calculation Model of Access The experimental setup with wired (two desktops with a switch) and wireless network (two laptops with an access point) is considered. A file is transferred from one node to another via twisted pair cable to determine the overall transfer time, T1. The same file is transferred between the same pair of nodes via switch. Then, the transfer time is noted as T2. Again the same file is transferred between the same pair of nodes via switch and AP. The transfer time is taken as T3. The Switch delay is calculated by the difference between T2 and T1. The AP delay is determined by the difference between T3 and T Parameters of Model and Delay Values Obtained The unit of Model Time Unit (MTU) equals 1 millisecond. The parameters, real value obtained after experimentation and model value obtained as shown in Table 1. Using these values CPN model obtained as shown in Figure 4. The port in and port out are mentioned as P1 In and P1 Out as shown in Figure 4. Similarly, the workstations connected through AP will be connected using ports for input and output of packets. Table 1 Parameters of Model Figure 4. Colored Petri Net for the Experimental Set-up 4 THROUGHPUT ANALYSIS The TCP throughput over IEEE WLANs for the experimental set-up shown in Figure 5 is estimated. Various network configurations, starting with the case of one STAtion (STA) and Active Window (AWND) > 1 are considered and then finally generalized to the case of multiple STAs. Parameters Real value Model value (ms) LAN switch read frame delay LAN switch write frame delay Access point read frame delay Access point write frame delay Workstation delay Figure 5. Experimental Set-up and IP Connected 4.1 Single Station The assumption AWND > 1 means that collisions between TCP data packets and TCP Acknowledge (ACK) packets are possible. It also Volume 3 Number 3 Page 157

4 means that the TCP sender, after transmitting a data packet, does not always need to wait for a TCP ACK before sending another packet, since it may already have another packet in queue. To simplify the analysis, the key assumption that the transmit buffer at the TCP sender is never empty. In this approach the analysis of throughput is by focusing on the average time t cycle between successfully transmitted packets by the TCP sending node. The second key assumption is that the system achieves an equilibrium state where the average rate of successfully transmitted packets from the TCP sending node equals the average rate of successfully transmitted TCP ACKs from the TCP receiving node. In other words, the average time between successfully transmitted packets by the TCP receiving node is also given by t cycle. The throughput is given by, S = l data /t cycle Mbps (1) Where, t cycle = t data + t ack + t bc (2) The t data is given by MAC acknowledgement timeout parameter defines the time that must elapse before the sending MAC layer deems that a collision has occurred. 4.2 Multiple Stations A model for the case of n > 2 active STAs is developed. In this case, either all TCP data packets (in the downstream case) or all TCP acknowledgement packets (in the upstream case) flow through the AP transmit buffer. Therefore, it is reasonable to assume that the AP transmit buffer never empties. It is denoted by t cycle the average time between packets successfully transmitted by the AP, and assumed that an equilibrium state is reached such that the combined effect of the n active STAs is to yield a sequence of successfully transmitted TCP packets (either data packets or ACK packets) with average spacing that is also equal to t cycle. The throughput is given by, S = l data / t cycle Mbps (8) Where t cycle =t data +t ack +t bc + β (9) t data =t phy +((l mac +l tcpip +l data )/r data )+ t sifs +t phy +(l ack /r ctrl )+t difs (3) The t ack is given by t ack =t phy +((l mac +l tcpip )/r data )+ t sifs +t phy +(l ack /r ctrl )+t difs (4) In a t cycle period, the TCP sending node successfully transmits one packet, freezes its back-off counter when the TCP receiving node successfully transmits one packet, and increases its back-off stage whenever there is a collision. In this case it is assumed that, each transmitted packet has a constant and independent collision probability p. With this assumption, the quantity t bc can be written as t bc = (1-p)A 0 +p(1-p)a 1 +..p m-1 (1-p)A m-1 (5) The assumption that at each transmission attempt of a given AP packet, there is a probability p of colliding with STA packets, resulting in an average back-off window, τ. This assumption on the average packet spacing for the STA population as a whole implies that each individual STA produces a sequence of successfully transmitted packets with an average spacing nt cycle. Given this assumption, it is natural to assume that each STA has an average effective back-off time of nτ. The probability q that in any given slot is determined and a packet from the tagged STA has a collision with a packet from at least one other STA but not with a packet from the AP. The probability of a collision with a packet from at least one other STA is 1-(1-1/(nτ)) n-1, and the probability of a collision with an AP packet is 1/τ. Therefore, the Eq. 10 is obtained, Case 1: For 0<=k<=m q = ( 1- ( 1- ( 1/nτ ) ) n-1 )(1-(1/τ)) (10) A k = k t coll + t slot ((2 j W min -1)/2) lim j=0 to k (6) Case 2: For k>m A k = k t coll + t slot ((2 j W min -1)/2) + (k-m ) (2 m W min -1)/2) lim j=0 to m (7) Where, t coll is the time duration of the collided packet plus the MAC acknowledgement timeout. The The total number of retransmissions per packet from the tagged STA is then given by q=(1-q), and the total occupancy of the channel β due to collisions between STA packets is given by, β = t sta q /(1-q) (11) In case of upstream flows, the packet is a TCP ACK packet, t sta =t ack Volume 3 Number 3 Page 158

5 In case of downstream flows, the packet is a TCP data packet, 60 t sta =t data Collision probability Vs Throughput for n=2 4.3 Throughput Calculation Using the delay values calculated in the Section Throughput Throughput 3.5 and the parameters in the Table 2, throughput is 20 calculated Table g MAC and Physical Parameters collision probability T h r o u g h p u t S.No Parameters Value 1 r data 54Mbps 2 r ctrl 1Mbps 3 l ack 112 bits 4 l mac 224 bits 5 l tcpip 320 bits 6 t phy 192 µs 7 t slot 20 µs 8 t sifs 10 µs 9 t difs 50 µs 10 W min W max M 7 13 m Graphical Output The Collision Probability versus the Throughput for single station and multiple stations are shown in Figure 6 and Figure 7 respectively collision probability Vs Throughput for n= collision Probability Figure 6. Collision Probability versus Throughput for Single Station Throughput Figure 7. Collision Probability versus Throughput for Two Station 5 CONCLUSION The CPN model has been developed for various components of the experimental set-up and experimentation is conducted to measure the delay caused by the switch, the AP and the workstations. Throughput for WLAN decreases as the probability of collision increases. When the number of stations connected within the network increases, throughput decreases for a certain level. Once it reached a saturation level, throughput remains constant even when the number of stations goes on increasing in the network. 6 REFERENCES [1] M. Beaudouin-Lafon, W.E. Mackay, M. Jensen: CPN Tools: A Tool for Editing and Simulating Colored Petri Nets. LNCS 2031: Tools and Algorithms for the Construction and Analysis of Systems, pp (2001). [2] Daniele Miorandi, Arzad A. Kherani, and Eitan Altman: A queueing model for HTTP traffic over IEEE WLANs, In Proceedings of ITC Specialist Seminar on Performance Evaluation of Wireless and Mobile Systems, Antwerp, (2004). [3] Daniele Miorandi and Eitan Altman: On the effect of feedback traffic in IEEE b WLANs, Technical Report, RR4908, INRIA, (2003). [4] D.P. Heyman, T.V. Lakshman, and A.L. Neidhardt: A new method for analyzing feedback based protocols with applications to engineering web traffic over the internet. In Proceedings of ACM SIGMETRICS, pp (1997). [5] M. Elsaadany, T. Singhal, Lui Ming: Performance study of buffering within switches in local area networks. In Proceedings of fourth International Conference on Computer Communications and Networks, pp (1995). [6] Giuseppe Bianchi: Performance analysis of the IEEE distributed coordination function. Volume 3 Number 3 Page 159

6 IEEE Journal on Select Areas in Communication, Vol. 18, pp (2000). [7] W. Cohen: The multiple phase service network with generalized processor sharing. Acta Informatica, Vol. 12, pp (1979). [8] L.L.H. Andrew, S.V. Hanly, and R.G. Mukhtar: CLAMP: Maximizing the performance of TCP over low bandwidth variable rate access links. Technical Report, , CUBIN, University of Melbourne (2004). [9] W. Berger, and Y. Kogan: Dimensioning bandwidth for elastic traffic in high-speed data networks. IEEE/ACM Transactions on Networking, Vol. 8, pp (2000). H. Abdul Rauf received the Bachelors Degree in Electrical and Electronics Engineering in He completed his Masters degree in Business Administration (M.B.A) Degree in the year 1996 and his masters degree in Computer Science and Engineering in the year 1999.He is currently a PhD candidate in the faculty of Information and Communication Engineering, Anna University of Chennai. His research interests includes mobile computing, Computer Networks, Network Security, Advanced Networks and Performance Evaluation of Computer Networks. He is currently the Dean (CSE/IT), V.L.B. Janakiammal College of Engineering & Technology, Coimbatore, India Dr. Ebenezer Jeyakumar is currently the Principal of Government College of Engineering, Salem, India. Being an eminent professor of Anna University, there are many students doing their research under his guidance in various fields. Some of main areas of research are Networking, mobile computing, high voltage engineering and other related areas. Volume 3 Number 3 Page 160

An Evaluation of Network Response Time using a Coloured Petri Net Model of Switched LAN

An Evaluation of Network Response Time using a Coloured Petri Net Model of Switched LAN An Evaluation of Network Response Time using a Coloured Petri Net Model of Switched LAN Dmitry A. Zaitsev Odessa National Telecommunication Academy, Kuznechnaya, 1, Odessa, 65029, Ukraine Web: http://www.geocities.com/zsoftua

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs A Scheme for Enhancing TCP Fairness and Throughput in IEEE 802.11 WLANs Eun-Jong Lee 1, Hyung-Taig Lim 1, Seung-Joon Seok 2, and Chul-Hee Kang 1 1 Department of Electronics Engineering, Korea University

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Computer Networks (Fall 2011) Homework 2

Computer Networks (Fall 2011) Homework 2 5-744 Computer Networks (Fall 20) Homework 2 Name: Due: Oct. 2th, 20, 3:00PM (in class) Andrew ID: October 2, 20 A Short Questions. Which of the following is true about modern high-speed routers? A. A

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

ENHANCEMENT OF TCP FAIRNESS IN IEEE NETWORKS

ENHANCEMENT OF TCP FAIRNESS IN IEEE NETWORKS ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS Bhuvana LN 1, Divya PD 2 and Divya A 3 Department of Information Technology, Easwari Engineering College, Affiliated to Anna University, Chennai 1 bhuvana.n21@gmail.com

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Raffaele Bruno, Marco Conti, and Enrico Gregori Italian National Research Council (CNR) IIT Institute Via G. Moruzzi, 1-56100 Pisa, Italy {firstname.lastname}@iit.cnr.it

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Efficient Power MAC Protocol in Ad-hoc Network s

Efficient Power MAC Protocol in Ad-hoc Network s Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Modeling and Analysis of TCP Dynamics over IEEE WLAN Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r

More information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition

Research Article Performance Analysis of IEEE DCF under Nonsaturation Condition Mathematical Problems in Engineering Volume 2008, Article ID 574197, 17 pages doi:10.1155/2008/574197 Research Article Performance Analysis of IEEE 802.11 DCF under Nonsaturation Condition Yutae Lee, 1

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Introduction and Scope of Research

Introduction and Scope of Research TCP Performance over Wi-Fi Shiva Raj Pokhrel spokhrel@swin.edu.au Supervisors Prof. Hai L. Vu & Dr. Manoj Panda Introduction and Scope of Research Setup Wi-Fi, Up-Downloads. Infrastructure mode, DCF. Loss-based

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent

More information

TCP Fairness in e WLANs

TCP Fairness in e WLANs 1 TCP Fairness in 82.11e WLANs D.J. Leith, P. Clifford Hamilton Institute, NUI Maynooth Abstract We investigate the use of the 82.11e MAC EDCF to address transport layer unfairness in WLANs. A simple solution

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Performance Evaluation of Wireless IEEE b used for E-Learning Classroom Network

Performance Evaluation of Wireless IEEE b used for E-Learning Classroom Network Performance Evaluation of Wireless IEEE 802.11b used for E-Learning Classroom Network Salam A. Najim, Ibrahiem M. M. El Emary, and Samir M. Saied Faculty of Engineering, Al Ahliyya Amman University Amman,

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Design and Analysis of an Adaptive Backoff Algorithm for IEEE DCF mechanism

Design and Analysis of an Adaptive Backoff Algorithm for IEEE DCF mechanism Design and Analysis of an Adaptive Backoff Algorithm for IEEE 802.11 DCF mechanism Mouhamad Ibrahim and Sara Alouf INRIA B.P. 93 06902 Sophia Antipolis France {mibrahim,salouf}@sophia.inria.fr Abstract.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012

ISSN: International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Optimized MAC Protocol with Power Efficiency in Mobile Ad-hoc Network Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur,

More information

AN ABSTRACT OF THE THESIS OF

AN ABSTRACT OF THE THESIS OF AN ABSTRACT OF THE THESIS OF Richard Edgecombe for the degree of Master of Science in Computer Science presented on March 17, 2008. Title: An Implementation of a Reliable Broadcast Scheme for 802.11 using

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

An Accurate Model for Energy Efficiency in IEEE WLANs

An Accurate Model for Energy Efficiency in IEEE WLANs An Accurate Model for Energy Efficiency in IEEE 802.11 WLANs Eleni-Constantina Davri, Emmanouil Kafetzakis, Kimon Kontovasilis, Charalabos Skianis National Centre for Scientific Research Demokritos, Athens,

More information

Throughput Analysis of UDP and TCP Flows in IEEE b WLANs: A Simple Model and its Validation

Throughput Analysis of UDP and TCP Flows in IEEE b WLANs: A Simple Model and its Validation Throughput Analysis of UDP and TCP Flows in IEEE 82.11b WLANs: A Simple Model and its Validation Raffaele Bruno, Marco Conti, Enrico Gregori Italian National Research Council (CNR) IIT Institute Via G.

More information

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,

More information

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677

More information

Virtual residential gateways: Architecture and performance

Virtual residential gateways: Architecture and performance Virtual residential gateways: Architecture and performance Younes Khadraoui Email: younes.khadraoui@telecom-bretagne.eu Xavier Lagrange Email: xavier.lagrange@telecom-bretagne.eu Abstract With the increase

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

6th Slide Set Computer Networks

6th Slide Set Computer Networks Prof. Dr. Christian Baun 6th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/36 6th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences

More information

Written Exam in Information Networks TSIN01

Written Exam in Information Networks TSIN01 Written Exam in Information Networks TSIN01 10th August 2006 08:00-12:00 Location: TER2 Examiner: Robert Forchheimer Teacher: Peter Johansson, 4017 or 0702-141405 Aids: Standard mathematical/technical

More information

Improving the performance of Wireless LANs with MAC Adaptation

Improving the performance of Wireless LANs with MAC Adaptation Improving the performance of 82.11 Wireless LANs with MAC Adaptation Dorothy A. Rambim 1, Mjumo Mzyece 2 and Karim Djouani 2 Department of Electrical Engineering French South Africa Technical Institute

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for Based Wireless Networks

Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for Based Wireless Networks Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks Santosh Hosamani, G.S.Nagaraja Dept of CSE, R.V.C.E, Bangalore,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Performance Analysis of Various Application Protocols for MANET

Performance Analysis of Various Application Protocols for MANET Performance Analysis of Various Application Protocols for MANET Dr. Ravi Sindal Associate Professor IET DAVV, Indore M.P. India Nidhi Jaiswal M.E. Student IET DAVV Indore M.P. India Abstract A mobile ad

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Master s Thesis. Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment

Master s Thesis. Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment Master s Thesis Title Congestion Control Mechanisms for Alleviating TCP Unfairness in Wireless LAN Environment Supervisor Professor Hirotaka Nakano Author Masafumi Hashimoto February 15th, 21 Department

More information

Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots

Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots Throughput Evaluation and Enhancement of TCP Clients in Wi-Fi Hot Spots Raffaele Bruno 1, Marco Conti 1, and Enrico Gregori 1 Italian National Research Council (CNR) - IIT Institute, Via G. Moruzzi 1,

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information