Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Size: px
Start display at page:

Download "Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks"

Transcription

1 Wireless Pers Commun DOI /s Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract Medium access control overhead is the primary reason for low throughput in wireless networks. Performing blind contentions, contentions without any information of other contenders, and exchanging control message are time-consuming control operations. In this study, we propose a new MAC protocol called distributed sequential access MAC (DSA-MAC) which provides the transmission order without any explicit control operations. It may induce very light control overhead; therefore, compared to existing wireless MAC protocols, DSA-MAC can remarkably enhance network throughput. Keywords Unique ID-based MAC Sequential access Wireless networks 1 Introduction In recent years, short-range single-hop wireless networks such as mobile hotspots [1], Bluetooth WPAN [2], and resource-sharing home networks have been widely used. These networks adopt traditional wireless MAC protocols including contention based MAC, e.g., DCF [3] and polling based MAC, e.g., [4]. Although both types of MAC protocols are easy to implement, they consume some portion of the MAC link capacity. Contention-based MAC protocols perform blind contention whereas polling-based MAC protocols exchange control messages for polling and polling-list management. Because of heavy control overheads, traditional MAC protocols rarely achieve high network throughput, which is essential for supporting multimedia content communications and real-time applications [5]. In addition, wireless MAC should be evolved to over the scalability problem in terms of parameters such as physical data rate or the number of users because the scale of networks largely grows every year [6]. A single-hop wireless network may be characterized such that every node can monitor the network. Based on the characteristics of being able to monitor the medium, we propose a K. Lee C. Kim (B) Networking and Distributed Systems Lab, Room 341, PIRL, POSTECH, Hyoja-Dong, Pohang , Korea mic0@postech.ac.kr

2 K. Lee, C. Kim new MAC protocol, called distributed sequential access MAC (DSA-MAC), which excludes any operations for blind contention or control message exchange because it can control the medium access sequence using the monitoring result. DSA-MAC enables all active nodes to sequentially access the medium according to their assigned order of unique IDs. All active nodes transmit data in turn from the smallest ID node to the largest ID node. Each active node can find its turn simply by counting the number of previous data transmissions. DSA- MAC enables a node to acquire a unique ID through a distributed ID reporting process when it becomes active. It also enables all active nodes to detect unused IDs and dynamically rearrange their ID accordingly. Most operations involved in DSA-MAC require very light overhead so that DSA-MAC can remarkably enhance network throughput and support good scalability; this result is proved by comparing medium utilization. 2 Distributed Sequential Access MAC (DSA-MAC) 2.1 Operation Overview In DSA-MAC, time is divided into a sequence of periods, each consisting of three subperiods: synchronization, ID reporting, and data transmission (Fig. 1). At the end of each ID reporting subperiod, all active nodes can find their largest ID and determine the medium access sequence according to the order of IDs assigned to them. To proceed to the ID reporting process, all nodes need to be synchronized using beacon signals, which need not be decoded. Initially, any node can send a beacon signal. Subsequently, the last data transmission node in a period sends a beacon signal in the next period. All active nodes start reporting their IDs after the beacon signal. When a node becomes active, it should acquire a new ID. For the moment, we assume that all active nodes have their own unique IDs. The acquisition of a new ID will be described in the subsequent section. All active nodes perform the ID reporting process in the same way as the contention process of CSMA/IC [7], which is outlined here. Note that ID reporting helps a newly active node to independently acquire a new ID. For ID reporting, all active nodes keep their IDs in binary form, having the same number of bits, called the length of the ID field. The number of ID reporting slots in the ID reporting subperiod is defined to be equal to the length of the ID field. All ID reporting slots, which are arranged in consecutive order, match each bit of the ID starting from the most significant bit. Each node executes the following operations from the first ID reporting slot. At the ID reporting slot that represents the bit 1 in its ID, the node sends a bit-on-signal. At the ID reporting slot that represents the 0 bit in its ID, the node senses the medium. When it senses that the medium is busy, it stops the ID reporting process; otherwise the node continues. According to this rule, all nodes, except the node that has the largest ID (D in Fig. 1), stop the ID reporting process. Therefore, all nodes can find the largest ID (0110) among all active nodes. In CSMA/IC, only the node, which has the largest ID, gets the medium access opportunity. On the other hand, in the proposed scheme, all active nodes get medium access opportunities using the largest ID information, which is used to indicate the number of transmissions in the subsequent data transmission subperiod and currently unused IDs. In the data transmission subperiod, each active node transmits data in the order of IDs from 0 ID node to the largest ID node. To prevent conflict between two consecutive transmissions, the minimum idle time, called the inter transmission space (ITS), is defined between them. Each node can find its turn by counting the number of data transmissions. In Fig. 1, node A, which has ID 0001, can transmit after a transmission because it has the second ID. However,

3 Distributed Sequential Access MAC Protocol Node states A B C D E ID 0001 ID 0000 ID 0011 ID 0110 NewI D 0111 ~ 1111 ID 0010 ID 0101 ID 0100 ID 0011 Check points Sense medium Bit-on signal ITS SIFS ITS SIFS ITS ITS SIFS ITS ITS ITS SIFS ITS Beacon TX node B A C K TX Node A A C K ID 0010 is vacant. à rearrange ID TX Node C A C K ID 0011 is vacant. à rearrange ID TX NodeD A C K Time Synchronization subperiod ID Reporting subperiod Data transmission subperiod period (t p) *TX: Transmission *I TS :InterTransmission Space Fig. 1 Three subperiods of DSA-MAC some IDs between 0 and the largest ID may not be used (e.g in Fig. 1) andsome transmission turns should be skipped (the third transmission turn corresponding to 0010). The unused IDs are called vacant IDs. A vacant ID can be detected if no transmission is detected at the expected time. At the first check point in Fig. 1, it is expected that a node whose ID is 0010 transmits data but there is not such a node. So, 0010 is a vacant ID. Because a vacant ID induces unnecessary idle time, our proposed scheme introduces the vacant ID removing process; whenever nodes detect a vacant ID, every node which has larger ID than the vacant ID decreases its ID by 1. This process works even when multiple vacant IDs exist and they are successive or distributed. At the first check point in Fig. 1, all nodes can detect vacant ID Nodes which have larger IDs than 0010, node C and D decrease their IDs by 1. After this process, node C whose updated ID is 0010 transmits data. At the second check point in Fig. 1, all nodes can detect vacant ID Node D whose ID is larger than 0011 decreases its ID by 1. At the check point 3 after this process, 0011 is still vacant ID. Therefore, node D performs another vacant ID removing process. After that, node D whose ID becomes 0011 will transmit data. In summary, a node whose ID is larger than the vacant ID decreases its ID until no consecutive idle ITSs are detected. Note that it takes only an additional ITS time to detect. So, the time cost to for removing a vacant ID is very light compared to what we obtain from contention-free transmissions. When a node fails to count the number of transmissions and misses its transmission turn, it may cause a collision. For example, if node with ID 0100 misses counting a transmission, it stays idle during its transmission turn and waiting node having larger IDs than it by 1, node with ID 0101, moves forward one transmission turn. Therefore, two nodes collide with each other. When two nodes collide, they must find new IDs in the next period. 2.2 ID Management Operations In this subsection, we present our proposed self ID acquisition scheme which is based on medium monitoring, and a dynamic ID length control scheme for reducing the number of ID collisions and vacant IDs.

4 K. Lee, C. Kim After ID reporting period, a newly active node randomly selects an ID that is larger than the current largest ID and participates in ID reporting process in the next period. Therefore, there is no conflict with existing IDs, but ID collision, which causes data transmissions to collide, is possible when multiple newly active nodes choose the same ID at the same time. Note that ID collision is inevitable in distributed ID acquisition. When collision occurs, all collided nodes repeat this ID acquisition until they acquire unique IDs. Unfortunately, the probability of ID collision remains the same in successive ID acquisition. Thus, to reduce the probability, the length of ID field increases in our proposed scheme when the probability is larger than a threshold specified in Eqs. (1) (6). After ID acquisition, one of the newly selected IDs naturally becomes the largest ID in the next period because all newly selected IDs are larger than any IDs in this period. Therefore, the data transmission subperiod will be extended until the largest ID node among the newly active nodes transmits data. There could be some vacant IDs after random selection. The number of ID collisions and vacant IDs depends on the length of the ID field. As the length of the ID field increases, the range of selectable IDs for newly active nodes also increases and the number of ID collisions is likely to drop. On the other hand, the interval between newly selected nodes increases. Therefore, the number of unused IDs between the largest ID in the previous period and the largest ID after ID acquisition also increases. An ID length control scheme is proposed to manage this trade-off relation between the number of ID collisions and the number of vacant ID. The metric used for ID length control is time wasted in a period, t w, which is caused by vacant IDs and ID collisions within a period. t w can be calculated using Eqs. (1) (6) where N unused is the number of unused IDs, N new is the number of newly active nodes during aperiodandt ITS is the length of ITS. It is assumed that all active nodes have the same transmission time (t x ). t w = 2 t ITS E[N vacant ]+t x E[N IDcollision ] (1) m E[N vacant ]= (P[N new = k] E k,m [N vacant ]) (2) E k,m [N vacant ]= k=1 m ( x k 1 ) m k (x k + E k,m [N IDcollision ]) x=k E[N IDcollision ]=m (3) (P[N new = k] E k,m [N IDcollision ]) (4) k=2 P[N new = k] =e λt (λt p p) k k! ki=2 (i k C i ( m 1 )i (1 m 1 )k i ) (k 2) E k,m [N IDcollision ]= 0 (k = 1) E[N vacant ] is the average number of vacant IDs in a period and E k,m [N vacant ] is the average number of vacant IDs when N new = k and N unused = m. E[N IDcollision ] is the average number of nodes which experience ID collision in a period and E k,m [N IDcollision ] is the average number of nodes which experience ID collision in a period when N new = k and N unused = m. We assume that N new follows a Poisson distribution with rate λ (Eq. 3) and we approximate E k,m [N IDcollision ] adopting a binomial distribution (p = m 1 ) (Eq. 4). Using these assumptions, E[N IDcollision ], E[N vacant ] and t w can be obtained. (5) (6)

5 Distributed Sequential Access MAC Protocol Periodically solving Eqs. (1) (6) to find the ID field length that minimizes t w in dynamically changing network conditions, especially λ, requires high computing power. To avoid complex computations, we propose a simple guide derived from rigorous computing over reasonable parameters. A node measures the number of new nodes for a certain number of periods to acquire N new, and monitors the ID reporting process to acquire N unused. When measured N new < 0.6, the ID field length should be increased by 1 if average N unused < 2. When 0.6 < measured N new < 2, the ID field length should be increased by 1 if N unused < 4. When average measured N new > 2, the ID field length should be increased by 1 if N unused < 8. The above three rules can also be applied to the ID field length decrement. The ID field length should be decreased by 1 if the above conditions are satisfied after the ID field length decrement. All active nodes insert a 0 bit in the most significant bit for ID field length increment and eliminate the most significant bit for ID field length decrement. 2.3 PHY Layer Issues ID reporting signal stability and synchronization accuracy are important engineering issues in the DSA-MAC protocol. The ID reporting signal should be differentiated from background noise. If the magnitude of the background noise is smaller than the carrier sensing threshold, nodes can easily differentiate the ID reporting signal, even in a one-dimensional signal space (magnitude axis) [8]. The synchronization errorinduced by the synchronization beacon signal arrival time difference, which untunes the starting point of the ID reporting period, is equal to the maximum propagation time in the network. An ID reporting slot is long enough to compensate for the synchronization error. In addition, the effect of clock drift is insignificant because synchronization is performed at the beginning of every period. 3 Numerical Results In this section, we compare the control overhead of our proposed MAC with CSMA/IC [7] and CP-Multipoll [9] using the PHY layer parameters of standard [3], indicated by italic type in the following paragraphs. Because DSA-MAC rearranges the access sequence at the end of every period, we calculate the total overhead for N active, the number of active nodes, times transmissions. The DSA-MAC overhead is SynchronizationTime + IDReportingTime + (N active + 1) IT S (Fig. 1). SynchronizationTime (23µs), which equals aslottime +3 aairpropagationtime, includes abundant propagation time for synchronization. IDReportingTime is IDlength aslottime(20 µs). ITS is defined to take 15 µs(2 (arxrfdelay + arx- PLCPDelay + amacprocessingdelay) +arxtxturnaroundtime), which is larger than asifstime(10 µs) to detect vacant ID in a stable way. Therefore, the total overhead of our distributed sequential access MAC is 23 µs + IDlength 20 µs + (N active + 1) 15 µs. CSMA/IC [7] is a collision-free contention-based MAC protocol which is known to require the smallest overhead among all contention-based MAC protocols. CSMA/IC also performs contention by comparing the unique IDs of all contenders after a short synchronization process. The CSMA/IC overhead per contention becomes anidlesensingtime + SynchronizationTime + IDComparingTime. The total CSMA/IC overhead is N active (15 µs + 23 µs + IDlength 20 µs) because the contention process completes only in IDlength times contention slots. The contention-period multi-polling protocol (CP-Multipoll) [9] is a polling-based MAC protocol that always succeeds in polling. A dedicated node assigns unique backoff values to

6 K. Lee, C. Kim (a) (b) Fig. 2 Medium utilization comparisons. a Data rate: 54 Mbps, b data rate: 54 4 Mbps all nodes (STAs) in the polling list. All STAs perform the CSMA/CA contention process using these uniquely assigned back-off values. The best case overheads of CP-Multipoll is N active BackoffValueAssigningTime +N active (adifstime(50 µs)+aslottime(20 µs)). BackoffValueAssigningTime is a data transmission time that includes at least asifstime(10 µs) + apreamblelength(144µs) + aplcpheaderlength(48µs). BackoffValueAssigningTime is not a repetitive control overhead, so it is excluded in overhead calculation.

7 Distributed Sequential Access MAC Protocol Figure 2 clearly shows that our DSA-MAC includes a much smaller control overhead than the aforementioned MAC schemes. Though the contention overhead of CSMA/IC is compatible with DSA-MAC, a single data transmission is made after each contention process. CP-Multipoll also includes a polling overhead, which should be performed repetitively. Due to the light control overhead, DSA-MAC is more scalable than others. As the number of nodes increase, only the utilization of DSA-MAC increases. And, when the data rate speed becomes high, the utilization loss of DSA-MAC is less than that of others. 4Conclusion As the demand for real time communications and multimedia communications of portable electronic devices grows, the throughput requirement for communications between devices comprising a single-hop network becomes high. In this study, we propose a DSA-MAC protocol that controls the medium access sequence without any control operations. DSA- MAC has little control overhead; therefore, we believe that our proposed MAC is and suitable for high-network-throughput applications and support high medium utilization even when the scale of the network becomes large. Acknowledgments This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency) (NIPA-2012-H ). References 1. Pack, S. H., Rutagemwa, H., Shen, X., Mark, J. W., & Cai, L. (2007). Performance analysis of mobile hotspots with heterogeneous wireless links. IEEE Transactions on Wireless Communications, 6(10), Ali, K. A., & Mouftah, H. T. (2011). Wireless personal area networks architecture and protocols for multimedia applications. Ad Hoc Networks, 9(4), IEEE WG: IEEE Standard Part11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. 4. IEEE WG: IEEE Standard Part15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs). 5. IEEE WG: IEEE Standard /312r0. Applications and usage scenarios for mesh-wpan. 6. Teymoori, P. (2012). DT-MAC: An efficient and scalable medium access control protocol for wireless networks. IEEE Transaction on Wireless Communications, 99, Lee, K., Oh, S. & Kim, C. (2012), A dynamic ID management protocol for CSMA/IC in ad hoc networks. Ad Hoc Networks Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press. 9. Lo, S.-C., Lee, G., & Chen, W.-T. (2003). An efficient multipolling mechanism for IEEE wireless LANs. IEEE Transactions on Computer, 52(6),

8 K. Lee, C. Kim Author Biographies Ki-seok Lee got his B.S. degree in Computer Engineering from Kyungpook National University in 2006, and in 2013 he got his Ph.D. in Computer Science and Engineering from Pohang University of Science and Technology. Cheeha Kim is a Professor (1989-present) at CSE, POSTECH, Korea. He got his B.S. degree in Electronics Engineering from Seoul National University in 1974 and M.S. in Computer Science from University of Maryland, College Park, in In 1986, he got his Ph.D. from University of Maryland, College Park, in Computer Science. He is a Member of the IEEE Computer society, IEEE Communication society, and ACM. He has chaired a number of international conferences on computer communications, and served as an Editor for LNCS. His research interests include computer communications, mobile computing, cognitive radio, sensor networks, distributed systems and performance evaluation.

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES

MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES ABSTRACT Joo Rak Kang 1 and Tae-Jin Lee 2 1 Samsung Electro-Mechanics Co., Ltd., Suwon, Korea College of Information and Communication

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology Circulation in Computer Science Vol.2, No.7, pp: (9-13), August 2017 https://doi.org/10.22632/ccs-2017-252-41 Performance Analysis of IEEE 802.15.4 based Sensor Networks for Large Scale Tree Topology Ziyad

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Optimization on TEEN routing protocol in cognitive wireless sensor network

Optimization on TEEN routing protocol in cognitive wireless sensor network Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Fair and Effective Transmissions in IEEE e WLAN

Fair and Effective Transmissions in IEEE e WLAN GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Round. Stations {A,B,C,D,E} {A,B} 6 {C,D,E} {A,B} {C} 13 {E} 12 {D}

Round. Stations {A,B,C,D,E} {A,B} 6 {C,D,E} {A,B} {C} 13 {E} 12 {D} A Priority MAC Protocol to Support Real-time Multimedia Traffic in Ad Hoc Networks Λ Jang-Ping Sheu Λ, Chi-Hsun Liu Λ, Shih-Lin Wu ΛΛ, and Yu-Chee Tseng y Λ Dept. of Computer Sci. and Info. Eng., National

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information