Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks
|
|
- Ernest Potter
- 6 years ago
- Views:
Transcription
1 Wireless Pers Commun DOI /s Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract Medium access control overhead is the primary reason for low throughput in wireless networks. Performing blind contentions, contentions without any information of other contenders, and exchanging control message are time-consuming control operations. In this study, we propose a new MAC protocol called distributed sequential access MAC (DSA-MAC) which provides the transmission order without any explicit control operations. It may induce very light control overhead; therefore, compared to existing wireless MAC protocols, DSA-MAC can remarkably enhance network throughput. Keywords Unique ID-based MAC Sequential access Wireless networks 1 Introduction In recent years, short-range single-hop wireless networks such as mobile hotspots [1], Bluetooth WPAN [2], and resource-sharing home networks have been widely used. These networks adopt traditional wireless MAC protocols including contention based MAC, e.g., DCF [3] and polling based MAC, e.g., [4]. Although both types of MAC protocols are easy to implement, they consume some portion of the MAC link capacity. Contention-based MAC protocols perform blind contention whereas polling-based MAC protocols exchange control messages for polling and polling-list management. Because of heavy control overheads, traditional MAC protocols rarely achieve high network throughput, which is essential for supporting multimedia content communications and real-time applications [5]. In addition, wireless MAC should be evolved to over the scalability problem in terms of parameters such as physical data rate or the number of users because the scale of networks largely grows every year [6]. A single-hop wireless network may be characterized such that every node can monitor the network. Based on the characteristics of being able to monitor the medium, we propose a K. Lee C. Kim (B) Networking and Distributed Systems Lab, Room 341, PIRL, POSTECH, Hyoja-Dong, Pohang , Korea mic0@postech.ac.kr
2 K. Lee, C. Kim new MAC protocol, called distributed sequential access MAC (DSA-MAC), which excludes any operations for blind contention or control message exchange because it can control the medium access sequence using the monitoring result. DSA-MAC enables all active nodes to sequentially access the medium according to their assigned order of unique IDs. All active nodes transmit data in turn from the smallest ID node to the largest ID node. Each active node can find its turn simply by counting the number of previous data transmissions. DSA- MAC enables a node to acquire a unique ID through a distributed ID reporting process when it becomes active. It also enables all active nodes to detect unused IDs and dynamically rearrange their ID accordingly. Most operations involved in DSA-MAC require very light overhead so that DSA-MAC can remarkably enhance network throughput and support good scalability; this result is proved by comparing medium utilization. 2 Distributed Sequential Access MAC (DSA-MAC) 2.1 Operation Overview In DSA-MAC, time is divided into a sequence of periods, each consisting of three subperiods: synchronization, ID reporting, and data transmission (Fig. 1). At the end of each ID reporting subperiod, all active nodes can find their largest ID and determine the medium access sequence according to the order of IDs assigned to them. To proceed to the ID reporting process, all nodes need to be synchronized using beacon signals, which need not be decoded. Initially, any node can send a beacon signal. Subsequently, the last data transmission node in a period sends a beacon signal in the next period. All active nodes start reporting their IDs after the beacon signal. When a node becomes active, it should acquire a new ID. For the moment, we assume that all active nodes have their own unique IDs. The acquisition of a new ID will be described in the subsequent section. All active nodes perform the ID reporting process in the same way as the contention process of CSMA/IC [7], which is outlined here. Note that ID reporting helps a newly active node to independently acquire a new ID. For ID reporting, all active nodes keep their IDs in binary form, having the same number of bits, called the length of the ID field. The number of ID reporting slots in the ID reporting subperiod is defined to be equal to the length of the ID field. All ID reporting slots, which are arranged in consecutive order, match each bit of the ID starting from the most significant bit. Each node executes the following operations from the first ID reporting slot. At the ID reporting slot that represents the bit 1 in its ID, the node sends a bit-on-signal. At the ID reporting slot that represents the 0 bit in its ID, the node senses the medium. When it senses that the medium is busy, it stops the ID reporting process; otherwise the node continues. According to this rule, all nodes, except the node that has the largest ID (D in Fig. 1), stop the ID reporting process. Therefore, all nodes can find the largest ID (0110) among all active nodes. In CSMA/IC, only the node, which has the largest ID, gets the medium access opportunity. On the other hand, in the proposed scheme, all active nodes get medium access opportunities using the largest ID information, which is used to indicate the number of transmissions in the subsequent data transmission subperiod and currently unused IDs. In the data transmission subperiod, each active node transmits data in the order of IDs from 0 ID node to the largest ID node. To prevent conflict between two consecutive transmissions, the minimum idle time, called the inter transmission space (ITS), is defined between them. Each node can find its turn by counting the number of data transmissions. In Fig. 1, node A, which has ID 0001, can transmit after a transmission because it has the second ID. However,
3 Distributed Sequential Access MAC Protocol Node states A B C D E ID 0001 ID 0000 ID 0011 ID 0110 NewI D 0111 ~ 1111 ID 0010 ID 0101 ID 0100 ID 0011 Check points Sense medium Bit-on signal ITS SIFS ITS SIFS ITS ITS SIFS ITS ITS ITS SIFS ITS Beacon TX node B A C K TX Node A A C K ID 0010 is vacant. à rearrange ID TX Node C A C K ID 0011 is vacant. à rearrange ID TX NodeD A C K Time Synchronization subperiod ID Reporting subperiod Data transmission subperiod period (t p) *TX: Transmission *I TS :InterTransmission Space Fig. 1 Three subperiods of DSA-MAC some IDs between 0 and the largest ID may not be used (e.g in Fig. 1) andsome transmission turns should be skipped (the third transmission turn corresponding to 0010). The unused IDs are called vacant IDs. A vacant ID can be detected if no transmission is detected at the expected time. At the first check point in Fig. 1, it is expected that a node whose ID is 0010 transmits data but there is not such a node. So, 0010 is a vacant ID. Because a vacant ID induces unnecessary idle time, our proposed scheme introduces the vacant ID removing process; whenever nodes detect a vacant ID, every node which has larger ID than the vacant ID decreases its ID by 1. This process works even when multiple vacant IDs exist and they are successive or distributed. At the first check point in Fig. 1, all nodes can detect vacant ID Nodes which have larger IDs than 0010, node C and D decrease their IDs by 1. After this process, node C whose updated ID is 0010 transmits data. At the second check point in Fig. 1, all nodes can detect vacant ID Node D whose ID is larger than 0011 decreases its ID by 1. At the check point 3 after this process, 0011 is still vacant ID. Therefore, node D performs another vacant ID removing process. After that, node D whose ID becomes 0011 will transmit data. In summary, a node whose ID is larger than the vacant ID decreases its ID until no consecutive idle ITSs are detected. Note that it takes only an additional ITS time to detect. So, the time cost to for removing a vacant ID is very light compared to what we obtain from contention-free transmissions. When a node fails to count the number of transmissions and misses its transmission turn, it may cause a collision. For example, if node with ID 0100 misses counting a transmission, it stays idle during its transmission turn and waiting node having larger IDs than it by 1, node with ID 0101, moves forward one transmission turn. Therefore, two nodes collide with each other. When two nodes collide, they must find new IDs in the next period. 2.2 ID Management Operations In this subsection, we present our proposed self ID acquisition scheme which is based on medium monitoring, and a dynamic ID length control scheme for reducing the number of ID collisions and vacant IDs.
4 K. Lee, C. Kim After ID reporting period, a newly active node randomly selects an ID that is larger than the current largest ID and participates in ID reporting process in the next period. Therefore, there is no conflict with existing IDs, but ID collision, which causes data transmissions to collide, is possible when multiple newly active nodes choose the same ID at the same time. Note that ID collision is inevitable in distributed ID acquisition. When collision occurs, all collided nodes repeat this ID acquisition until they acquire unique IDs. Unfortunately, the probability of ID collision remains the same in successive ID acquisition. Thus, to reduce the probability, the length of ID field increases in our proposed scheme when the probability is larger than a threshold specified in Eqs. (1) (6). After ID acquisition, one of the newly selected IDs naturally becomes the largest ID in the next period because all newly selected IDs are larger than any IDs in this period. Therefore, the data transmission subperiod will be extended until the largest ID node among the newly active nodes transmits data. There could be some vacant IDs after random selection. The number of ID collisions and vacant IDs depends on the length of the ID field. As the length of the ID field increases, the range of selectable IDs for newly active nodes also increases and the number of ID collisions is likely to drop. On the other hand, the interval between newly selected nodes increases. Therefore, the number of unused IDs between the largest ID in the previous period and the largest ID after ID acquisition also increases. An ID length control scheme is proposed to manage this trade-off relation between the number of ID collisions and the number of vacant ID. The metric used for ID length control is time wasted in a period, t w, which is caused by vacant IDs and ID collisions within a period. t w can be calculated using Eqs. (1) (6) where N unused is the number of unused IDs, N new is the number of newly active nodes during aperiodandt ITS is the length of ITS. It is assumed that all active nodes have the same transmission time (t x ). t w = 2 t ITS E[N vacant ]+t x E[N IDcollision ] (1) m E[N vacant ]= (P[N new = k] E k,m [N vacant ]) (2) E k,m [N vacant ]= k=1 m ( x k 1 ) m k (x k + E k,m [N IDcollision ]) x=k E[N IDcollision ]=m (3) (P[N new = k] E k,m [N IDcollision ]) (4) k=2 P[N new = k] =e λt (λt p p) k k! ki=2 (i k C i ( m 1 )i (1 m 1 )k i ) (k 2) E k,m [N IDcollision ]= 0 (k = 1) E[N vacant ] is the average number of vacant IDs in a period and E k,m [N vacant ] is the average number of vacant IDs when N new = k and N unused = m. E[N IDcollision ] is the average number of nodes which experience ID collision in a period and E k,m [N IDcollision ] is the average number of nodes which experience ID collision in a period when N new = k and N unused = m. We assume that N new follows a Poisson distribution with rate λ (Eq. 3) and we approximate E k,m [N IDcollision ] adopting a binomial distribution (p = m 1 ) (Eq. 4). Using these assumptions, E[N IDcollision ], E[N vacant ] and t w can be obtained. (5) (6)
5 Distributed Sequential Access MAC Protocol Periodically solving Eqs. (1) (6) to find the ID field length that minimizes t w in dynamically changing network conditions, especially λ, requires high computing power. To avoid complex computations, we propose a simple guide derived from rigorous computing over reasonable parameters. A node measures the number of new nodes for a certain number of periods to acquire N new, and monitors the ID reporting process to acquire N unused. When measured N new < 0.6, the ID field length should be increased by 1 if average N unused < 2. When 0.6 < measured N new < 2, the ID field length should be increased by 1 if N unused < 4. When average measured N new > 2, the ID field length should be increased by 1 if N unused < 8. The above three rules can also be applied to the ID field length decrement. The ID field length should be decreased by 1 if the above conditions are satisfied after the ID field length decrement. All active nodes insert a 0 bit in the most significant bit for ID field length increment and eliminate the most significant bit for ID field length decrement. 2.3 PHY Layer Issues ID reporting signal stability and synchronization accuracy are important engineering issues in the DSA-MAC protocol. The ID reporting signal should be differentiated from background noise. If the magnitude of the background noise is smaller than the carrier sensing threshold, nodes can easily differentiate the ID reporting signal, even in a one-dimensional signal space (magnitude axis) [8]. The synchronization errorinduced by the synchronization beacon signal arrival time difference, which untunes the starting point of the ID reporting period, is equal to the maximum propagation time in the network. An ID reporting slot is long enough to compensate for the synchronization error. In addition, the effect of clock drift is insignificant because synchronization is performed at the beginning of every period. 3 Numerical Results In this section, we compare the control overhead of our proposed MAC with CSMA/IC [7] and CP-Multipoll [9] using the PHY layer parameters of standard [3], indicated by italic type in the following paragraphs. Because DSA-MAC rearranges the access sequence at the end of every period, we calculate the total overhead for N active, the number of active nodes, times transmissions. The DSA-MAC overhead is SynchronizationTime + IDReportingTime + (N active + 1) IT S (Fig. 1). SynchronizationTime (23µs), which equals aslottime +3 aairpropagationtime, includes abundant propagation time for synchronization. IDReportingTime is IDlength aslottime(20 µs). ITS is defined to take 15 µs(2 (arxrfdelay + arx- PLCPDelay + amacprocessingdelay) +arxtxturnaroundtime), which is larger than asifstime(10 µs) to detect vacant ID in a stable way. Therefore, the total overhead of our distributed sequential access MAC is 23 µs + IDlength 20 µs + (N active + 1) 15 µs. CSMA/IC [7] is a collision-free contention-based MAC protocol which is known to require the smallest overhead among all contention-based MAC protocols. CSMA/IC also performs contention by comparing the unique IDs of all contenders after a short synchronization process. The CSMA/IC overhead per contention becomes anidlesensingtime + SynchronizationTime + IDComparingTime. The total CSMA/IC overhead is N active (15 µs + 23 µs + IDlength 20 µs) because the contention process completes only in IDlength times contention slots. The contention-period multi-polling protocol (CP-Multipoll) [9] is a polling-based MAC protocol that always succeeds in polling. A dedicated node assigns unique backoff values to
6 K. Lee, C. Kim (a) (b) Fig. 2 Medium utilization comparisons. a Data rate: 54 Mbps, b data rate: 54 4 Mbps all nodes (STAs) in the polling list. All STAs perform the CSMA/CA contention process using these uniquely assigned back-off values. The best case overheads of CP-Multipoll is N active BackoffValueAssigningTime +N active (adifstime(50 µs)+aslottime(20 µs)). BackoffValueAssigningTime is a data transmission time that includes at least asifstime(10 µs) + apreamblelength(144µs) + aplcpheaderlength(48µs). BackoffValueAssigningTime is not a repetitive control overhead, so it is excluded in overhead calculation.
7 Distributed Sequential Access MAC Protocol Figure 2 clearly shows that our DSA-MAC includes a much smaller control overhead than the aforementioned MAC schemes. Though the contention overhead of CSMA/IC is compatible with DSA-MAC, a single data transmission is made after each contention process. CP-Multipoll also includes a polling overhead, which should be performed repetitively. Due to the light control overhead, DSA-MAC is more scalable than others. As the number of nodes increase, only the utilization of DSA-MAC increases. And, when the data rate speed becomes high, the utilization loss of DSA-MAC is less than that of others. 4Conclusion As the demand for real time communications and multimedia communications of portable electronic devices grows, the throughput requirement for communications between devices comprising a single-hop network becomes high. In this study, we propose a DSA-MAC protocol that controls the medium access sequence without any control operations. DSA- MAC has little control overhead; therefore, we believe that our proposed MAC is and suitable for high-network-throughput applications and support high medium utilization even when the scale of the network becomes large. Acknowledgments This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency) (NIPA-2012-H ). References 1. Pack, S. H., Rutagemwa, H., Shen, X., Mark, J. W., & Cai, L. (2007). Performance analysis of mobile hotspots with heterogeneous wireless links. IEEE Transactions on Wireless Communications, 6(10), Ali, K. A., & Mouftah, H. T. (2011). Wireless personal area networks architecture and protocols for multimedia applications. Ad Hoc Networks, 9(4), IEEE WG: IEEE Standard Part11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. 4. IEEE WG: IEEE Standard Part15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs). 5. IEEE WG: IEEE Standard /312r0. Applications and usage scenarios for mesh-wpan. 6. Teymoori, P. (2012). DT-MAC: An efficient and scalable medium access control protocol for wireless networks. IEEE Transaction on Wireless Communications, 99, Lee, K., Oh, S. & Kim, C. (2012), A dynamic ID management protocol for CSMA/IC in ad hoc networks. Ad Hoc Networks Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press. 9. Lo, S.-C., Lee, G., & Chen, W.-T. (2003). An efficient multipolling mechanism for IEEE wireless LANs. IEEE Transactions on Computer, 52(6),
8 K. Lee, C. Kim Author Biographies Ki-seok Lee got his B.S. degree in Computer Engineering from Kyungpook National University in 2006, and in 2013 he got his Ph.D. in Computer Science and Engineering from Pohang University of Science and Technology. Cheeha Kim is a Professor (1989-present) at CSE, POSTECH, Korea. He got his B.S. degree in Electronics Engineering from Seoul National University in 1974 and M.S. in Computer Science from University of Maryland, College Park, in In 1986, he got his Ph.D. from University of Maryland, College Park, in Computer Science. He is a Member of the IEEE Computer society, IEEE Communication society, and ACM. He has chaired a number of international conferences on computer communications, and served as an Editor for LNCS. His research interests include computer communications, mobile computing, cognitive radio, sensor networks, distributed systems and performance evaluation.
H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationModeling of Partially Overlapping Wireless Personal Area Networks
Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,
More informationFairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs
Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationOn the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationCollision Free and Energy Efficient MAC protocol for Wireless Networks
110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationDistributed Interference-aware Medium Access Control for IEEE Visible Light Communications
Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More informationCSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks
CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department
More informationNumerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks
Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationA Novel Framework for Radio Resource Management in IEEE Wireless LANs
Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin
More informationMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES ABSTRACT Joo Rak Kang 1 and Tae-Jin Lee 2 1 Samsung Electro-Mechanics Co., Ltd., Suwon, Korea College of Information and Communication
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationEnhanced Power Saving Scheme for IEEE DCF Based Wireless Networks
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea
More informationA Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs
Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationA Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs
A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science
More informationA new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake
Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi
More informationIEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering
by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationA Finite State Model for IEEE Wireless LAN MAC DCF
First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationInitialization Protocols for IEEE Based Ad Hoc Networks Λ
Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationPower-efficient Communication Protocol for Social Networking Tags for Visually Impaired
Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationTwo-phase Collision Avoidance to Improve Scalability in Wireless LANs
Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationIEEE modifications and their impact
Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University
More informationCooperative Communication Protocol based on Relay Node Grouping in Wireless Networks
Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationPerformance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology
Circulation in Computer Science Vol.2, No.7, pp: (9-13), August 2017 https://doi.org/10.22632/ccs-2017-252-41 Performance Analysis of IEEE 802.15.4 based Sensor Networks for Large Scale Tree Topology Ziyad
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationCharacterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationA Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs
A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationOptimization on TEEN routing protocol in cognitive wireless sensor network
Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationTMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks
: A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationEBA: An Enhancement of IEEE DCF via Distributed Reservation
EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationWireless Local Area Network (IEEE )
Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationThroughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationFair and Effective Transmissions in IEEE e WLAN
GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationRound. Stations {A,B,C,D,E} {A,B} 6 {C,D,E} {A,B} {C} 13 {E} 12 {D}
A Priority MAC Protocol to Support Real-time Multimedia Traffic in Ad Hoc Networks Λ Jang-Ping Sheu Λ, Chi-Hsun Liu Λ, Shih-Lin Wu ΛΛ, and Yu-Chee Tseng y Λ Dept. of Computer Sci. and Info. Eng., National
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationExperimental Framework and Simulator for the MAC of Power-Line Communications
Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch
More informationHigh Performance Distributed Coordination Function for Wireless LANs
High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu
More informationA Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks
A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase
More informationReliable Multicast Scheme Based on Busy Signal in Wireless LANs
Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationVolume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationFig. 1. Superframe structure in IEEE
Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More information