Call Admission Control for IEEE Contention Access Mechanism

Size: px
Start display at page:

Download "Call Admission Control for IEEE Contention Access Mechanism"

Transcription

1 Call Admission Control for IEEE Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia and Abstract This paper proposes an admission control algorithm that enables the upcoming IEEE 82.11e contention based Enhanced Distributed Channel Access (EDCA) to provide quantitative bandwidth guarantees for Wireless Local Area Networks (WLANs), rather than a relative prioritized service. The algorithm estimates the throughput that flows would achieve if a new flow with certain parameters was admitted, and so indicates whether such a new flow can be admitted while preserving the Quality of Service (QoS) of existing flows. The algorithm deals with the EDCA parameters of minimum contention window size and transmission opportunity duration, and indicates what values should be used for different flows. Simulation results confirm the accuracy of the throughput estimates and the effectiveness of the admission control algorithm. I. INTRODUCTION The IEEE MAC uses the contention based Distributed Coordination Function (DCF) as the basic access mechanism and a polling based Point Coordination Function (PCF) to provide contention free channel access. IEEE task group E is defining mechanisms to enhance the QoS of the original MAC standard, including a new contention access scheme called Enhanced Distributed Channel Access (EDCA) [1] and an improved polling scheme based on PCF. Contention based access mechanisms are simple and robust, but they cannot guarantee delay and throughput because of their probabilistic nature. With small modification to the DCF access mechanism, which virtually all wireless LAN cards implement, relative priority service is provided. This paper focuses on the contention based EDCA access scheme, which provides a prioritized QoS service using an independent transmit queue and channel access function for each traffic class. Traffic belonging to a higher priority class has a higher probability of transmission, thus achieving a higher throughput when competing with lower priority traffic. However, no assurance can be given to higher priority traffic in terms of throughput and delay performance. The problem is especially apparent when the wireless channel is overloaded causing the bandwidth share of each flow to diminish. This limits the use of EDCA for many multimedia applications that are not capable of dynamically adapting to the available bandwidth at any instant. Since they require absolute bandwidth provision from the networks, resource reservation and management becomes a significant issue in WLANs especially when bandwidth is relatively scarce and has to be shared by many users. Admission control is an important tool to maintain QoS experienced by users. In this paper, we propose an admission control algorithm for the 82.11e EDCA that will take account of dynamic network conditions such as the number of active flows and the parameters adopted for these data flows. By predicting the achievable throughput of the data flows and avoiding channel overloading, the QoS of existing flows can be maintained. We incorporate the concepts of EDCA into the admission control algorithm and extend its ability to provide bandwidth guarantees, instead of providing a relative prioritized service. Simulation results demonstrate that by implementing the proposed admission algorithm, the throughput of existing flows can be protected and resources can be managed effectively according to network conditions. The algorithm is able to select suitable parameters for good bandwidth and delay performance. II. NEW FEATURES IN 82.11E EDCA The EDCA access mechanism supports relative priority service through the introduction of Access Categories (ACs). Instead of using a single queue and one channel access function as in DCF, each station implements multiple ACs. Each AC consists of an independent transmit queue and a channel access function with its own parameters, that include minimum and maximum Contention Windows (CWmin, CWmax), Arbitration Interframe Space (AIFS) and Transmission Opportunity (TXOP) duration. Operation of each channel access function is similar to DCF. Data transmission begins when the medium is idle for more than the AIFS time, with AIFS DIFS (DCF Interframe Space, see Fig. 1). If the medium is determined to be busy, the access function sets its backoff timer to an initial value of random(,cwmin[ac]) slot time. The backoff timer is decremented by a slot time for each time slot after the medium is sensed idle for an AIFS time and stops decrementing when a transmission is detected. It resumes when the medium is sensed idle again for an AIFS time. A channel access function can begin transmission on the channel as soon as the backoff timer reaches zero. An acknowledgement frame is sent to the sender to indicate a successful transmission of a data frame. If no acknowledgement is received after a Short IFS (SIFS), a collision is presumed to have occurred. The backoff timer after a collision is chosen to be random(,(cwmin[ac]+1) 2 i -1) slot time for each retransmission attempt i. In other words, the contention window size is doubled for each retransmission to reduce the probability of collision. Higher priority ACs adopt lower values for CWmin and AIFS to yield a higher

2 probability of successfully contending for channel access. TXOP). Other factors such as channel interference, signal strength and multipath fading will not be considered here since they cannot be known a priori medium priority, increasing bit rate Fig. 1: Backoff timer, IFS and CW in EDCA access Throughput (bytes/sec) highest priority Another new feature in 82.11e is the TXOP which is the period a channel access function has the right to access the medium after a successful contention, with the maximum duration defined in TXOPLimit[AC]. An EDCA-TXOP is obtained through contention channel access. A channel access function is allowed to continue transmission after waiting a SIFS following the successful completion of a frame exchange sequence, as long as the total transmission time does not exceed TXOPLimit[AC]. III. MAINTAINING QOS IN EDCA Real time multimedia traffic generated by applications like video conferencing, video on demand and voice over IP requires certain level of QoS. In a WLAN, it is crucial to restrict the volume of traffic in order to maintain service quality of current serving traffic. If there are no restrictions to limit the volume of traffic being introduced to the service set, throughput degradation and high medium access delay will result due to increasing backoff time. This is undesirable for inelastic traffic such as video and voice applications that requires a certain level of bandwidth and delay guarantees. In EDCA there is the problem of the spill over effect when traffic is overloaded in an AC, performance in other ACs will also be affected. Unlike wired networks where bandwidth provision can be managed at a centralized point, usually located at the boundary of a subnetwork, transmission queues in a WLAN are distributed and share the same medium. The extent of the effect will depend on the parameters adopted for the ACs and the current network condition. This problem is highlighted in Fig. 2 which shows a simulation of 8 Constant Bit Rate (CBR) streams at 1.5Mbps - 4 streams each in both (lowest priority) and (highest priority). Two streams in start transmitting at 1.5Mbps and increase their bit rate by 4kbps every 5 seconds. Without admission control, the channel becomes overloaded after 13 seconds. The effect on throughput performance of and is different due to different parameters being selected (see section V). By limiting the total admitted traffic in the WLAN below the total achievable throughput, current admitted traffic can be protected and channel utilization will not degrade significantly. The difficulty of implementing this approach in lies in estimating the value of the achievable throughput in the WLAN. This value depends on several time varying factors including the number of active stations, the offered traffic volume and each AC s parameters (i.e. CWmin, CWmax, 1 5 lowest priority Time (sec) Fig. 2: Effect of channel overloading Due to the non-deterministic nature of packet arrivals and the random nature of backoff timer values, it is difficult to provide absolute guarantees on delay and throughput on a small time scale. However, it is possible to derive bounds on achievable throughput over the longer term as channel statistics are collected and averaged. The achievable throughput can be estimated with minimal signaling cost and complexity. We argue that by keeping the traffic flow below this throughput limit, QoS can be maintained. Video and voice traffic, that generally have long (>6 seconds) connection times with similar packet statistics for each connection, will benefit from this approach. Admission control will help to maintain good user perceived quality by avoiding channel overloading. IV. ADMISSION CONTROL FOR EDCA A. Estimation of achievable throughput This section introduces a flow based throughput estimation algorithm for EDCA. A flow, in the context of this discussion, is defined as a set of packets belonging to the same AC of a station and uses the same set of parameters and backoff timer. The algorithm utilizes collision statistics of each flow to predict the achievable throughput. The estimation of achievable throughput for each data flow is based on the MAC analytical model proposed in [2]. We extend this work to estimate the throughput of flows, each with different channel access parameters and incorporate the concept of TXOP into the algorithm. In this model, the transmission probability of a flow can be derived with the following formula: P(tx in a slot flow = i) = 2(1 2p i ) (1 2p i )(W +1)+p i W (1 (2p i ) b ) p i = long term collision probability of flow i W = CW min size used for flow i b = maximum backoff stage with CW max =(CW min +1) 2 b 1 The model assumes that the packet collision probability is constant and independent of the transmission state. Traffic sources are assumed to have unlimited data to send. Since we are primarily interested in predicting achievable throughput (1)

3 P(successful transmission flow = i) Data payload size Achievable throughput[i] = (2) P(collision) Duration collision + P(slot is idle) aslott ime + P(successful transmission) Duration success Access scheme Cycle type Frame sequence in the cycle Basic Successful data tx Data frame + SIFS + ACK frame + DIFS Data frame + DIFS RTS/CTS Successful data tx RTS + SIFS + CTS + SIFS + Dataframe + SIFS + ACKframe + DIFS RTS + DIFS RTS/CTS with TXOP Successful data tx RTS + SIFS + CTS + SIFS + TXOPLimit[AC]+ DIFS RTS + DIFS Table 1: Cycle duration of different access schemes for each traffic flow under saturation conditions, the stated assumptions will not have a great impact on the accuracy of the results. The algorithm uses parameters decided at run-time including CWmin, CWmax, physical layer transmission rate and TXOP duration. Given these parameters and the monitored collision rate of each flow, the transmission probability for flow i at saturation condition is calculated using (1). In order to estimate the saturation throughput, three pieces of information are derived - the probabilities of transmission, collision and idle in a slot. The probability of a successful transmission with flow i is given by the product of the probability of flow i transmitting and all other flows not transmitting. A collision occurs when multiple flows transmit in the same slot with the probability given by the difference between probability of one or more transmissions in a slot and only one transmission in a slot. The slot is idle when all stations are not transmitting. Assuming that there are m active flows, the probabilities are calculated as follows: P(successful tx flow = i) = P(tx in a slot flow = i) (1 - P(tx in a slot flow i)) P(successful tx in a slot) = m P(successful tx flow = i) P(1 or more tx in a slot) = 1 - m (1 - P(tx in a slot flow = i)) P(collision in a slot) = P(1 or more tx in a slot) - m P(successful tx in a slot flow = i) P(slot is idle) = 1 - P(1 or more tx in a slot) With these probabilities, the achievable throughput of flow i is the proportion of time for transmitting data payload in respect to idle, collision and header transmission time, during a cycle of frame exchange. A cycle of frame exchange consists of several collision cycles and one successful data frame transmission plus header transmission and idle times. The achievable throughput for flow i is calculated as in equation (2). The cycle duration time is the time required to transmit the frame sequence plus the associated preambles and physical layer headers in the cycle (please refer to table 1). B. Implementation of Admission Control The proposed admission control uses the above achievable bandwidth estimation algorithm. The main objective is to prevent channel overload and protect admitted flows. This is particularly important to inelastic multimedia traffic that are sensitive to bandwidth fluctuations. The data stream will not be admitted if the control algorithm determines that there is insufficient bandwidth to service the new stream. The algorithm also aids in the selection of parameters such as contention window size and transmission opportunity duration, as finding the right parameters can be difficult [3]. The admission control is implemented in the Access Point (AP) operating in infrastructure mode with the responsibility of collision monitoring, throughput estimation and making admission decisions. Each active flow needs a counter to keep track of the collision rate. The collision rate is calculated every update period using exponential weighted average according to (3) to remove short term fluctuations due to interference. We adopted a value of.8 for α and 1 second for update period in our simulation. These two parameters control the variability of the estimated throughput. We believe the values chosen provide a good balance between removing short term fluctuations and reflecting the long term trend. Further optimization may be needed to determine the best parameters according to traffic behaviour. p i,new average =(1 α)p i,current + αp i,previous average (3) From this information, the admission controller is able to predict the achievable throughput of the flows. Stations need to make a request to the admission controller to obtain the desired bandwidth before transmission. If admitting the new flow causes total admitted traffic to exceed the limit, the request is rejected. The admission algorithm searches for the best parameters for CWmin and TXOP duration (if used), given the required bandwidth of the new stream. When a new flow request is made, the collision rate is initialized to the average collision rate of the existing flow having a similar achievable throughput as the desired bandwidth of the new flow. The basic operation involves iteratively reducing the contention window size and estimating the achievable throughput until it matches the bandwidth description of the new flow. Alternatively, if TXOP is used, the TXOP duration can be increased to yield a higher achievable throughput for the flow. for each update interval { if(no new flow requests) { update parameters and collision prob in record; run achievable bandwidth estimation algorithm; else if(new flow request exists) { collision rate[m+1] = collision rate of flow with similar throughput; for i = 1:num active flows + 1

4 calculate achievable throughput[i]; fori = 1:numactive flows + 1 { if(request bw[i] > achievable throughput[i]) { reduce CW or increase TXOP; re-estimate achievable throughput; if(cw or TXOP limit is reached) { reject new flow; restore to original parameters; exit program; admit new flow; distribute new parameters to stations; Fig. 3: Pseudocode of admission control V. SIMULATION RESULTS Simulations were conducted using the network simulator (ns-2) [4]. In these simulations, no hidden stations were present and the channel was assumed to be error free. All stations operated at 36Mbps complying with the 82.11a physical layer standard and had one active flow at a time. A. Achievable Throughput of a Flow We first verify the accuracy of throughput estimation at saturation level. Three ACs are used with CWmin sizes of 15, 31 and 63. Each AC consists of 4 CBR flows from 4 stations with unlimited data source and there are a total of 12 active flows. CWmax sizes for all three ACs are set to 123. AIFS is set equal to DIFS. Five simulation runs are conducted with varied MAC service data unit (MSDU) sizes from 256 to 248B. The achievable throughput for each AC is estimated and compared with simulation results. Throughput of only one stream for each AC is shown in Fig. 4 to ease comparison. saturation throughput (bytes/sec) Simulation Simulation Simulation Estimate Estimate Estimate MSDU size (bytes) Fig. 4: Estimated achievable throughput closely matches simulation results for different ACs. As seen from these results, the algorithm provides a good estimation of the achievable throughput of an AC. It is clear that high priority ACs, with smaller contention windows and larger MSDU sizes (or TXOP durations), will have a higher throughput when the channel is fully utilized. B. Effectiveness of Admission Control Algorithm The simulation starts with 15 stations and 15 CBR flows, 5 at 1.8Mbps with 1B packets and CWmin=13, 5 at 5kbps with 5B packets and CWmin=31, and 5 at 8kbps with 1B packets and CWmin=4. The CWmin values are determined by the admission control algorithm. RTS/CTS mechanism is used. These 15 flows are admitted to the service set and they reach the achievable throughput limit indicated by the admission control algorithm. The reason CBR traffic is chosen in these simulations is because we can accurately evaluate the achievable throughput limits estimated by the algorithm, by setting each flow transmitting close to the predicted throughput limit. In case of variable bit rate traffic, similar performance can be achieved by limiting the offered traffic of each flow below its estimated limit. Depending on the network situation, further traffic engineering tools can be applied (e.g. leaky bucket) to reduce the burstiness and allow traffic to transmit above the limits momentarily, thereby increasing efficiency. We now focus on the region when the channel is fully utilized. We would like to study the effect of admitting a new flow when the admission control indicates we should not do so. 2 seconds into the simulation, an additional flow (flow16) at 1.8 Mbps and packet size of 1B (CWmin=15) starts transmission. The result is that all flows experienced quality degradation due to channel overload. We identified two regions for investigation, the flow phase from 5 to 2 seconds when all flows are transmitting below their estimated achievable throughput limits, and the saturation phase from 2 seconds onwards when the new flow causes the limit to be exceeded. throughput (bytes/sec) flow 1 18Kbps flow 2 18Kbps flow 6 18Kbps flow 7 5Kbps flow 8 5Kbps flow 12 8Kbps flow 13 8Kbps Flow Phase Saturation Phase time (sec) Fig. 5: Throughput performance with admission control enabled (t = to 2s) and disabled (t = 2 to 4s) cumulative distribution (%) High Priority Medium Priority Low Priority flow 1 flow 2 flow 3 flow 4 flow 5 flow 6 flow 7 flow 8 flow 9 flow 1 flow 11 flow 12 flow 13 flow 14 flow latency (sec) Fig. 6: Medium access delays during flow phase

5 cumulative distribution (%) High priority Medium and low priorities flow 1 flow 2 flow 3 flow 4 flow 5 flow 6 flow 7 flow 8 flow 9 flow 1 flow 11 flow 12 flow 13 flow 14 flow 15 flow latency (sec) Fig. 7: Medium access delays during saturation phase Throughput performance is shown in Fig. 5 during the 35 second period. Throughput is stable for the first 15 seconds indicating the medium is capable of handling the traffic. However, we can see that the bandwidth fluctuates greatly in the saturation phase due to random backoff. Comparing this graph with Fig. 2, during the saturation phase (from 13 seconds onwards in Fig. 2), the flows that remain below their achievable throughput are unaffected. The situation is different in Fig. 5 since all flows are transmitting just below their achievable throughput. The effect of overloading extends to all flows, as the throughput of all flows starts to fluctuate. The implication of this effect can be applied to protect important flows by assigning higher achievable throughput to these flows than the offered traffic, thus providing a buffer to maintain QoS to some extents. The drawback is lower channel utilization and higher collision rates because of smaller contention window size and higher transmission probability. Fig. 6 shows the medium access delay distribution during the flow phase. Flows 11 to 15 have the worst delay performance but the maximum delay remains below 1ms. Fig. 7 shows the delay distribution during the saturation phase. The delay performance deteriorates rapidly as additional traffic is introduced to the network. Delay is greater than.6s for at least 1% of the traffic in the medium and low priority ACs. VI. RELATED WORK The Virtual MAC algorithm in [5] passively monitors the radio channel and estimates locally achievable service levels. The main criteria for the decision of admission control is based on delay and collision estimates. It does not provide any achievable throughput information, which is also useful to multimedia applications. Another drawback is that the virtual MAC algorithm computations complicate the mobile station. The Assured Rate MAC Extension proposed in [6] extends the assured rate service in Differentiated Services to WLANs. This scheme achieves the desired throughput by dynamically adjusting the contention window size based on observation of the estimated sending and desired rates. In the case when the sending rate is below the desired rate, the contention window size is reduced to obtain a higher throughput. Along with other similar proposals [7], [8] for MAC to support QoS, these schemes only provide relative priority and bandwidth of current flows are not protected. VII. CONCLUSION AND FUTURE WORK This paper highlights the difficulties of maintaining QoS in contention based WLANs. By considering the interaction of frame transmissions in the MAC layer, we are able to predict the achievable throughput for each flow. This information provides a useful guiding point to efficiently manage bandwidth provision in EDCA by eliminating much of the guesswork. Simulation results showed our proposed admission control can effectively maintain the QoS of admitted flows by preventing any new flows overloading the channel. Throughput and delay performance remained at acceptable levels for real-time traffic as long as offered traffic is below the estimated limits. The CWmin parameter affects both the delay and bandwidth that a flow experiences. In order for a flow to receive low delay, it needs to have a low CWmin, which gives it a high throughput. However, applications like voice require lower delay and lower throughput than applications like video. One solution is to assign larger TXOP duration to a voice flow to allow it to transmit multiple packets in each successful contention. However, the delay jitter will increase as the first packet in a packet burst will experience a higher delay compared to the subsequent packets. The extent of delay jitter requires further study. However, simulation results demonstrate that even if TXOPs are not used, delay can remain at satisfactory level. The current draft of 82.11e [1] specifies a direct link protocol to allow direct communications between non-ap stations in infrastructure mode, upon registration with the AP. Our proposed admission control algorithm can be modified for used under this scheme, with the work of collision monitoring being shifted to the non-ap stations and passing the collision information to the AP using a signaling protocol. Please refer to [9] for details. Future studies will also include various channel error models to study the effectiveness of the admission control algorithm. ACKNOWLEDGEMENTS This work is supported by the Australian Research Council and industry partner SingTel Optus Pty Ltd. REFERENCES [1] IEEE Draft Standard 82.11e/ D4.4, June. 23. [2] G. Bianchi, Performance Analysis of the IEEE Distributed Coordination Function, IEEE JSAC, 18(3): , Mar. 2. [3] S. Mangold et al., IEEE 82.11e Wireless LAN for Quality of Service, Proc. of European Wireless 22, pp [4] The Network Simulator (ns-2), [5] A. Veres et al., Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control, IEEE JSAC 19(1):281-93, Oct.21. [6] A. Banchs, X. Perez, Providing Throughput Guarantees in IEEE Wireless LAN, Proc. IEEE WCNC 22, Vol. 1, pp [7] K. Saitoh et al., An Effective Data Transfer Method by Integrating Priority Control into Multirate Mechanisms for IEEE Wireless LANs, Proc. IEEE VTC 22, Vol 1, pp [8] D. Qiao and K. G. Shin, Achieving Efficient Channel Utilization and Weighted Fairness for Data Communications in IEEE WLAN under the DCF, IEEE Int l Workshop on QoS, 22, pp [9] D. Pong, Technical Report - Admission control for IEEE82.11e EDCF, March 23. ( dennis/adcontrol8211.pdf)

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Quality of Service (QoS) Settings on AP541N Access Point

Quality of Service (QoS) Settings on AP541N Access Point Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs

PLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs PLUS-DAC: An Admission Control Scheme for IEEE 802.11e Wireless LANs KIRAN KUMAR GAVINI Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay M Tech. Project Presentation

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Optimized WLAN MAC Protocol for Multimedia Applications

Optimized WLAN MAC Protocol for Multimedia Applications Research Online ECU Publications Pre. 2011 2008 Optimized WLAN MAC Protocol for Multimedia Applications Hushairi Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542484 This article

More information

Table of Contents 1 WLAN QoS Configuration 1-1

Table of Contents 1 WLAN QoS Configuration 1-1 Table of Contents 1 WLAN QoS Configuration 1-1 WLAN QoS Overview 1-1 Terminology 1-1 WMM Protocol Overview 1-2 Protocols and Standards 1-4 WMM Configuration 1-4 Configuration Prerequisites 1-4 Configuring

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Performance evaluation of IEEE e

Performance evaluation of IEEE e IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation QoS Support for Time-Constrained Multimedia Communications in IEEE 8. WLANs: A Performance Evaluation José Villalón Francisco Micó Pedro Cuenca Luis Orozco-Barbosa Department of Computer Engineering, Universidad

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

IEEE e QoS for Wireless LAN:

IEEE e QoS for Wireless LAN: IEEE 802.11e QoS for Wireless LAN: A Research Direction James Yu 12/09/2003 TDC Network Seminar 1 IEEE 802.11 MAC Layer Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Different from CAMA/CD

More information

Dynamic Admission Control in IEEE e EDCA-based Wireless Home Network

Dynamic Admission Control in IEEE e EDCA-based Wireless Home Network This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Dynamic Admission Control in IEEE 802.11e

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Converging Voice, Video and Data in WLAN with QoS Support

Converging Voice, Video and Data in WLAN with QoS Support Research Online ECU Publications Pre. 211 28 Converging Voice, Video and Data in WLAN with QoS Support Hushairi Zen Daryoush Habibi Justin Wyatt Iftekhar Ahmad 1.119/WOCN.28.4542485 This article was originally

More information

An Analytical Model for the IEEE le EDCF

An Analytical Model for the IEEE le EDCF An Analytical Model for the IEEE 802.1 le EDCF Extended Abstract Zhifeng Tao, Shivendra S. Panwar Department of Electrical and Computer Engineering Polytechnic University Brooklyn, New York 11201 Abstract

More information

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Gabriel Lazar, Virgil Dobrota, Member, IEEE, Tudor Blaga, Member, IEEE 1 Agenda I. Introduction II. Reliable Multimedia

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Enhanced Controlled-Access and Contention-Based Algorithms for IEEE e Wireless LANs

Enhanced Controlled-Access and Contention-Based Algorithms for IEEE e Wireless LANs Enhanced Controlled-Access and Contention-Based Algorithms for IEEE 82.11e Wireless LANs Yaser Pourmohammadi Fallah and Hussein M. Alnuweiri Dept. of Electrical Engineering, University of British Columbia,

More information

A Performance Investigation of the Modified PCF with Priority Scheme

A Performance Investigation of the Modified PCF with Priority Scheme 2 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.3, NO.1 FEBRUARY 2005 A Performance Investigation of the Modified with Priority Scheme Apichan Kanjanavapastit 1 and Bjorn Landfeldt

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

QoS Analysis of IEEE /802.11e MAC Protocols

QoS Analysis of IEEE /802.11e MAC Protocols Australian Journal of Basic and Applied Sciences, 4(9): 4553-4563, 2010 ISSN 1991-8178 QoS Analysis of IEEE 802.11/802.11e MAC Protocols 1 Shahzad A. Malik, Ammar Abbas, 2 Madad Ali Shah 1 COMSATS Institute

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study A new Traffic Separation Mechanism (TSm) in Wireless 802.11e Networks: A simulation study Ricardo Moraes 1, Francisco Vasques 1, Paulo Portugal 1, José Alberto Fonseca 2 1 Faculdade de Engenharia Universidade

More information

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access by Anni Matinlauri Instructor: Jouni Karvo Supervisor: Professor Raimo Kantola Agenda Background Research

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012 33 Dynamic Traffic Prioritization and TXOP Allocation in 802.11e Based Multihop Wireless Networks Dongho

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

IEEE e Enhanced QoS

IEEE e Enhanced QoS IEEE 802.11e Enhanced QoS 國立中興大學資工系曾學文 Tel : (04)22840497 ext 908 E-mail: hwtseng@nchu.edu.tw Outlines Introduction Traffic Differentiation Hybrid Coordination Function (HCF) Contention-Based Channel Access

More information

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS

EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Sticky CSMA/CA: Implicit Synchronization and Real-time QoS in Mesh Networks

Sticky CSMA/CA: Implicit Synchronization and Real-time QoS in Mesh Networks Sticky CSMA/CA: Implicit Synchronization and Real-time QoS in Mesh Networks Sumit Singh a,, Prashanth Aravinda Kumar Acharya b, Upamanyu Madhow a, Elizabeth M. Belding-Royer b a Department of Electrical

More information

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

Understanding e contention-based prioritization mechanisms and their coexistence with legacy stations

Understanding e contention-based prioritization mechanisms and their coexistence with legacy stations Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations Giuseppe Bianchi (+), Ilenia Tinnirello ( ), Luca Scalia ( ) (+) Università degli Studi

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Qos Parameters Performance Analysis of VoIP and Video traffic in a network using IEEE e EDCA. Azzarà Andrea Faina Alessio Leboffe Antonio

Qos Parameters Performance Analysis of VoIP and Video traffic in a network using IEEE e EDCA. Azzarà Andrea Faina Alessio Leboffe Antonio Qos Parameters Performance Analysis of VoIP and Video traffic in a network using IEEE 802.11e EDCA Azzarà Andrea Faina Alessio Leboffe Antonio Introduction This work makes QoS parameters performances analysis

More information

Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control

Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 19, NO. 10, OCTOBER 2001 2081 Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control Andras Veres, Andrew T. Campbell,

More information

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e Simulating coexistence between 802.11y and 802.16h systems in the 3.65 GHz band An amendment for 802.11e IEEE 802.16 Presentation Submission Template (Rev. 8.3) Document Number: C802.16h-07/050 Date Submitted:

More information

Notes on the Inefficiency of e HCCA

Notes on the Inefficiency of e HCCA Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Performance Evaluation of IEEE 82.11e QOS Enhancements Deep Kaur

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 878 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Modeling Queueing and Channel Access Delay in Unsaturated IEEE 802.11 Random Access MAC Based Wireless Networks Omesh Tickoo and Biplab

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model

Saturated Throughput Analysis of IEEE e Using Two-Dimensional Markov Chain Model Saturated Throughput Analysis of IEEE 80.e Using Two-Dimensional Markov Chain Model Lixiang Xiong and Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 006 Australia

More information