Performance and QoS Issues in

Size: px
Start display at page:

Download "Performance and QoS Issues in"

Transcription

1 Performance and QoS Issues in Shashi Kumar Chinthakindi Clemson University,Clemson,SC ABSTRACT is the IEEE standard for wireless LANs. The paper discusses issues related to performance and QoS in networks, mainly b networks as it is the most widely used standard. The IEEE standard defines two operational modes for WLANS: infrastructure-based and infrastructure-less or ad hoc mode. In this paper, we present performance related issues of b standard in both the modes and some of the ongoing research for MAC level optimization. QoS enhancements to the standard being defined in e standard are presented. I.INTRODUCTION Wireless LANs are one of the fasted growing wireless access technologies. This technology is being increasingly deployed for wireless LAN communications. The IEEE standards specify an "over-the-air" interface consisting of radio frequency (RF) technology to transmit and receive data. It defines the physical layer and media access control (MAC) layer, each operating at a different frequency range and hence three variants of , a, b and g are defined for different physical layers b based wireless technology is the most popular and widely used wireless technology. The b protocol provides best effort services similar to Ethernet. In wired Ethernet, data rate is high and the physical layer s error rate is very low and hence QoS issues have been neglected. This does not apply for as most of the available data rate is consumed inter frame spacing, packet fragmentation, and MAC-level acknowledgment. For wired networks, IETF s integrated services and Differentiated services architectures guarantee QoS above the link layer. The e task group has proposed a number of enhancement to incorporate QoS for networks. This paper is organized as follows. In section II and introduction to b protocol is given. We then present some of the issues related to b networks in infrastructure based and ad hoc modes. The ongoing research for MAC level optimization is discussed in the next section. In the next section, QoS issues are presented along with the discussion on e standard. II IEE b The fundamental building block of a architecture is the cell known as basic service set (BSS). In infrastructure mode, one or more wireless stations connect to a central base station known as access point (AP). Multiple base stations can be connected together to form a distribution system (DS). In ad-hoc mode, multiple stations connect to each other. IEEE employs a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) medium access control protocol with binary exponential back-off algorithm, called distributed coordination function (DCF), and an optional Point Coordination function (PCF) which is a centralized MAC algorithm used to provide contention free service. PCF is built on top of DCF and exploits features of DCF to assure access to its users. A. Distributed Coordination Function DCF is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Before a data frame is sent, the station senses medium. If it is idle for al least a DIFS (DCF interframe space) period of time, the frame is transmitted. Otherwise a backoff time B (measured in timeslots is chosen randomly in the interval [0,CW), where CW is called Contention Window. Initially CW is set to CWmin. After the medium has been detected idle for at least a DIFS, the backoff timer is decremented by one for each time slot the medium remains idle. If the medium becomes busy during the backoff process, the backoff timer is paused, and is restarted when the medium has been sensed idle for a DIFS again. Once the backoff timer reaches zero, the station can initiate its frame transmission. Upon detection of collision (which is detected by the absence of an acknowledgement frame from the destination), the contention window is doubled according to the formula CWi = 2k+i 1 1, where i is the number of attempts (including the current one) to transmit the frame that has been done, and k is a constant defining the minimum contention window, CWmin = 2k 1. A new backoff time is then chosen and the backoff procedure starts over. The backoff mechanism is also used after a successful transmission before sending the next frame. After a successful transmission, the contention window is reset to CWmin[10]. In DCF all stations have equal probability to access the channel and share it according to equal frame rate and not according to equal throughput. This offers no support for priority access to the channel for time-sensitive traffic. Figure 1 shows the DCF message exchanges.

2 Figure 1: DCF Message Exchanges. RTS and CTS messages precedes each data packet. On receiving RTS, the neighboring nodes set their NAV s to the duration mentioned in RTS.On receiving CTS, the neighboring nodes of receiver set their NAVs to the duration mentioned in CTS. This way, the channel is reserved till the sender receives the ACK message. B. Point Coordination Function PCF is a centralized, polling-based access mechanism which requires the presence of a base station that acts as Point Coordinator (PC). If PCF is supported, both PCF and DCF coexist and in this case, time is divided into superframes as shown in figure 2. Each superframe consists of a contention period where DCF is used, and a contention free period (CFP) where PCF is used. The Point Coordinator (PC) periodically sends a beacon frame to broadcast network identification and management parameters specific to the wireless network. Since the beacon is sent using ordinary DCF access method, the base station has to contend for the medium, and therefore the CFP may be shortened. The PC keeps a list of mobile stations that have requested to be polled to send data. During the CFP, it sends poll frames to the stations when they are clear to access the medium. Upon reception of a poll frame, the station sends a data packet if it has any packet queued. To ensure that no DCF stations are able to interrupt this mode of operation, the IFS between PCF data frames is shorter than the usual DIFS. This space is called a PCF interframe space (PIFS). To prevent starvation of stations that are not allowed to send during the CFP, there must always be room for at least one maximum length frame to be sent during the contention period. The Point Coordinator (PC) periodically sends a beacon frame to broadcast network identification and management parameters specific to the wireless network. PCF splits the time into a contention-free period (CFP) and a contention period (CP). Only stations polled by the PC may transmit during the CFP. The CFP ends after the time announced by the beacon frame or by a CF-End Frame.[10] Even though the PCF can offer some sort of priority to an overloaded station, it cannot differentiate between traffic types or sources. Therefore, it cannot tell which stations have long queues of time-sensitive traffic, and which only hold best-effort traffic. Another problem with PCF is that the PC has to contend with other stations to gain control of the wireless medium. Therefore, the starting time and length of the CFP can vary. These downfalls led to the establishment of the IEEE e Work Group. Figure2: IEEE b superframe III.PERFORMANCE ISSUES OF b NETWORKS Wireless medium is an unreliable mode of data transmission and hence is never possible to achieve theoretical available bandwidth at the application level. The throughput that can be obtained over the b WLAN networks is much smaller than the normal bit rate of 11Mb/s. If there is not collisions, it is

3 shown that the maximum throughput achieved is 7.74 Mb/s [4]. The proportion of the useful throughput strongly depends on the number of competing hosts. In this section we discuss some of the problems that can arise in the wireless networks both in infrastructure mode and infrastructure-less modes (ad-hoc mode). The characteristics of the wireless medium make wireless networks fundamentally different from wired networks. The loss in performance can be attributed to various factors at various levels of protocol stack. The following discusses various issues that effect the performance of b networks. 1) The first performance loss is at physical radio link caused by noise. The theoretical limit of data rate R for a channel with bandwidth B with a Signal to Noise Ratio(SNR) is given by Shannon s equation R = B log2(1 + SNR) Additional loss at this level is caused because of multipath fading, Doppler shifts and bit errors. [1] A multipath is a phenomenon occurred in a wireless propagation channel where in the transmitted signal arrivals at the receiver from various directions over a multiplicity of paths because there are obstacles and reflectors in the wireless propagation channe. When the waves of the multipath signals are out of phase reduction in signal strength can occur and hence delay in transmission. This phenomenon is called Multipath fading. Doppler-frequency-shift is a deviation in the signal frequency due to a change in the path length between the transmitter and receiver. This can be due to movement of any or all of the following: the transmitter, the receiver, or reflective surfaces along the path. Lots of bit errors occur at this level because of the noise, Doppler shift phenomenon, multipath fading etc.. and hence accounts to the delay in transmission. 2) At physical layer, there is a significant amount of performance loss due to low data rate of the header for compatibility and reachability with all nodes in the network. This causes a reduced performance throughput [1]. Figure 3 gives the b frame format. The header PLCP Preamble and PLCP Header are transmitted at 1Mbps as shown in Figure3. Figure 3 : b frame format 3) TCP/IP over wireless networks: TCP/IP is the most popular in wired networks. TCP protocol is specifically adapted to wireless networks. The TCP/IP protocols can account for problems associated with the nature of the wireless network environment. The interaction of some features of MAC protocol (hidden/exposed problem, exponential back-off algorithm etc.. ) with the TCP protocol mechanisms ( Congestion control mechanisms) may lead to several unexpected serious problems. The performance of TCP/IP over wireless network is significantly affected when some of the mobile hosts use lower bit rate than the others. The reason being the assumption by TCP all losses in the network is due to congestion. 4) TCP over wireless also experience Self Collision, a scenario where the TCP data packets contend for the channel with the ACKs for the previous packets. This self collision is caused because of the half duplex nature of wireless networks. [1]. However [11] proposes a modification to the MAC protocol distributed coordination function to alleviate this problem. 5) Use of WEP ( Wired Equivalent Privacy ) encryption algorithm for every packets incur overhead and cause performance loss. 6) Station mobility may severely degrade the performance of the TCP protocol in mobile ad hoc networks. This is due to the inability of the TCP protocol to manage efficiently the effects of mobility. Station movements may cause route failures and route changes and, hence, packet losses and delayed ACKs. 7) Figure 4 shows a typical hidden station scenario. Let us assume that station B is in the transmitting range of both A and C, but A and C cannot hear each other. Let us also assume that A is transmitting to B. If C has a frame to be transmitted to B, according to the DFC protocol, it senses the medium and finds it free because it is not able to hear A s transmissions. Therefore, it starts transmitting the frame but this transmission will results in a collision at the destination Station B. [3]

4 Figure4: Hidden Station Problem the behavior of neighboring stations (a station must sense the medium before start transmitting) and by stations in its interfering range (interferences may cause collisions at the destination station).[3]. For example, it can be shown that in a string (or chain) topology, like the one shown in Figure 6, maximum expected bandwidth utilization is only This discrepancy is due to MAC inability to find the optimum schedule of transmissions by itself. In particular, in a chain topology it happens that stations early in the chain starve later stations (similar considerations applies to other network topologies). In general, the MAC protocol appears to be more efficient in case of local traffic patterns, i.e., when the destination is close to the sender[3] The use of four way handshake protocol is used to solve hidden node problem but causes loss in performance throughput due to overhead in additional management frames ( RTS/CTS/ACK). The performance issues for the IEEE b Ad-Hoc networks 1) The short-term unfairness caused due to hidden terminals configuration with the RTS-CTS exchange [3] 2) The presence of slow terminals in one-hop network slows down every other terminal that sends data at higher rates 3) The Exposed Station Problem: Let us assume that both Station A and Station C can hear transmissions from B, but Station A can not hear transmissions from C. Let us also assume that Station B is transmitting to Station A and Station C receives a frame to be transmitted to D. According to the DCF protocol, C senses the medium and finds it busy because of B s transmission. Therefore, it refrains from transmitting to C although this transmission would not cause a collision at A. The exposed station problem may thus result in a throughput reduction.[3] Figure 5: Exposed Station Problem 4) Influence of the network topology: Even in a static environment, the performances of an ad hoc network are strongly limited by the interaction between neighboring stations. Stations activity is limited by Figure 6: A String network topology IV. RELATED RESEARCH The following are some of the schemes seeking to modify the DCF channel access protocol to bring in performance enhancements. Multi-Rate b: Multi-Rate is the ability of a wireless card to automatically operate at several different bit-rates. IEEE b supports data transmission facility at multiple rates which are possible because of different modulation techniques optimized for different channel conditions. Auto Rate Fallback Scheme (ARF): As the multi-rate IEEE enhancements are physical layer protocols.,mac mechanisms are required to exploit this capability. The Auto Rate Fallback (ARF) protocol was the first commercial implementation of a MAC that utilizes this feature. It is a mechanism which gauges the changing channel conditions based on success or failure of previous transmissions. With ARF, senders attempt to use higher transmission rates after consecutive transmission successes (which indicate high channel quality) and revert to lower rates after failures. Under most channel conditions, ARF provides a performance gain over pure single-rate.[12] Receiver Based Auto Rate Scheme (RBAR): The core idea of RBAR is for receivers to measure the channel quality using physical-layer analysis of the request-tosend RTS) message. Receivers then set the transmission rate for each packet according to the highest feasible value allowed by the channel conditions. As the RTS message is sent shortly before data transmission, the estimation of the channel condition is quite accurate, so that RBAR yields significant throughput gains as compared to ARF (as well as compared to single-rate IEEE ). Moreover, as request- and clear-to-send messages are necessarily sent at the base rate so that all nodes can

5 overhear them, overhearing nodes are informed of the modified data transmission times so that they can set their backoff timers accordingly. [12] Hence rate adaptive scheme uses feedback information from the receiver to sense the channel condition rather than estimating it at the sender. Opportunistic Auto Rate Scheme (OAR): Opportunistic media access scheme (OAR) which extends RBAR and tries to utilize the period of good channel conditions to maximize the network throughput. The key idea of OAR is to opportunistically exploit high quality channels when they occur via transmission of multiple back-to-back packets. In particular, when the multi-rate MAC indicates that the channel quality allows transmission above the base rate, OAR grants channel access for multiple packet transmissions in proportion to the ratio of the achievable data rate over the base rate. Consequently, OAR nodes transmit more packets under high quality channels than under low quality channels.[12] DCF+: DCF+ tries to reduce the contention between data and TCP ACKs and hence solve self collision problem. In DCF, every node starts a contention after sensing the channel to be idle for DIFS period. DCF+ aims at removing the contention for TCP ACKs by living them preferential treatment and hence avoid the self collisions. V.QUALITY OF SERVICE QoS provides mechanisms to control access and usage of the medium based on the application. Each application has different needs in terms of latency, bandwidth and packet-error rate and, therefore, QoS must cater to each of these needs. IEEE b provides best effort service ie.., every data packet handed over to b interfaces receives similar treatment as other packets in terms of delivery guarantees. From application perspective, it receives no quality of service guarantees from the network in terms of available bandwidth, latency, jitters etc b provides a very rudimentary support for quality of service in its infrastructure mode of operation. The support is provided by MAC layer in terms of Point Coordinated Function. It is used to differentiate between traffic flows from different nodes. However, a mechanism Rether for IEEE b[1] provides bandwidth guarantees to individual flows.[1]. Rether is a software solution residing on the network stack of individual nodes and does not require any changes at MAC layer. The following figures shows the protocol layers and architecture of Wireless Rether[1] QoS limitation of the original MAC : DCF( Basic access method for the original MAC, Distributed Co-ordination function) does not have any provision to support QoS. All data traffic is treated in a first come first serve, best effort manner. It does not guarantee bandwidth, packet delay and jitter moreover throughput degradation occurs in heavy load. PCF (Point Coordination function) is an optional channel access function in the standard, which was design to support time bounded services. Contention free access to the wireless medium is controlled by a Point Coordinator (PC) collocated with the AP. It is regarded as an inefficient central polling scheme. Often unpredictable beacon frame delay occurs due to incompatible cooperation between CP and CFP modes. Another problem with PCF is the unknown transmission time of polled stations. The above are some of the problems with the PCF that led to the current activities to enhance to b protocol. To provide support for QoS the IEEE Task Group E (802.11e) defines enhancements to the original MAC described earlier. The e draft standard presents two new MAC schemes; EDCF is an extension of DCF, while the HCF is an extension of PCF. Unlike the original , where it was not compulsory to have a PC, both EDCF and HCF must boast a centralized Hybrid Controller (HC). With e, there may still be the two phases of operation within the superframes, i.e., a CP and a CFP, which alternate over time continuously. The EDCF is used in the CP only, while the HCF is used in both phases, which makes this new coordination function hybrid.[13] EDCF ( Enhanced Distributed Coordination function) : EDCF in e is the basis for the HCF.The EDCF is a contention-based channel access mechanism and introduces the concept of Traffic Categories (TCs). Within a station there is a maximum of eight TCs, each having its own MAC queue and backoff counter. The following four Key parameters are used for differentiation of priorities. 1)Minimum contention window size (CWMin). AC with higher priority is assigned a shorter CWMin. 2)Maximum contention window size (CWMax). 3)TXOP limit Specifies the maximum duration a QSTA can transmit and is specified per AC. The TXOP limit can be used to ensure that high-bandwidth traffic gets greater access to the medium. TXOP limit also makes the channelaccess protocol significantly more efficient. 4)Arbitration Inter-Frame Space (AIFS) specifies the time interval between the wireless medium becoming idle and the start of channel-access negotiation. Each AC is assigned a different AIFS[AC] based on the AC to further provide QoS differentiation. In the CP, each TC within the stations contends for a TXOP and independently starts a backoff after detecting the channel being idle for an Arbitration Interframe Space (AIFS); the AIFS is at least DIFS, and can be enlarged individually for each TC. After waiting for AIFS, each backoff sets a counter to a random number drawn from the interval [1,CW+1]. The minimum size (CWmin[TC]) of the CW is another parameter dependent on the TC. Priority over

6 legacy stations is provided by setting CWmin[TC]<15 (in case of a PHY) and AIFS=DIFS. Figure 8 illustrates the EDCF parameters. As in legacy DCF, when the medium is determined busy before the counter reaches zero, the backoff has to wait for the medium being idle for AIFS again, before continuing to count down the counter. A big difference from the legacy DCF is that when the medium is determined as being idle for the period of AIFS, the backoff counter is reduced by one beginning the last slot interval of the AIFS period. Note that with the legacy DCF, the backoff counter is reduced by one beginning the first slot interval after the DIFS period. After any unsuccessful transmission attempt a new CW is calculated with the help of the persistence factor PF[TC] and another uniformly distributed backoff counter out of this new, enlarged CW is drawn, to reduce the probability of a new collision. Whereas in legacy CW is always doubled after any unsuccessful transmission (equivalent to PF=2), e uses the PF to increase the CW different for each TC: newcw [TC]>=((oldCW[TC]+1)*PF)-1 The CW never exceeds the parameter CWmax[TC],which is the maximum possible value for CW. [13] [13] Figure 8: Multiple back off of MSDU(MAC Service Data Unit) streams with different priorities. A single station may implement up to eight transmission queues realized as virtual stations inside a station, with QoS parameters that determine their priorities. Figure 9: Virtual backoff of eight traffic categories Hybrid Coordination Function : HCF extends the EDCF access rules. The HCF has a notion of Hybrid Coordinator (HC) similar to the PC in PCF. The key differences between HCCA and PCF are that HCCA can poll the stations during CP and that it supports scheduling of packets based on QSTA s specific traffic-flow requirements. The traffic-flow requirements of the QSTAs are specified using Traffic Specifications (TSPECs). The HC can allocate TxOP (transmission opportunity, interval during which a node has the right to initiate transmissions)to itself or any other node at any time but after sensing the channel to be idle for a duration of PIFS, which is shorter than DIFS. This ensures that the HC has the highest priority over all other nodes at any given time. The HC allocates TxOP to pollable nodes in contention free periods and sometimes even during contention periods.[1]. Thus stations can be guaranteed predictable opportunity times. Using the distributed MAC approach, a prioritized service of heterogeneous traffic flows is provided. The e standard provides qualitative throughput, delay guarantees, MAC admission control mechanism and other QoS guarantees. References: [1] Srikant Sharma Analysis of b MAC: A QoS, Fairness, and Performance [2] Claude Chaudet, Dominique Dhoutaut, Isabelle Guérin Lassous Experiments of some performance issues with IEEE b in ad hoc networks [3] Giuseppe Anastasi, Marco Conti, Enrico Gregori IEEE Ad Hoc Networks: Protocols, Performance and Open Issues [4] Martin Heusse, Franck Rousseau, - Performance Anomaly of b [5] Stefan Mangold- IEEE e Wireless LAN for Quality of Service

7 [6] Shirish Karande, - ANALYSIS AND MODELING OF ERRORS AT THE b LINK LAYER [7] Yang Xiao, Jon Rosdahl Performance Analysis and Enhancement for the Current and Future IEEE MAC Protocols [8] Zuyuan Fang..- Performance Evaluation of a Fair Backoff Algorithm for IEEE DFWMAC [9] J. ANTONIO GARCIA-MACIAS..- Quality of Service and Mobility for thewireless Internet [10] ANDERS LINDGREN, ANDREAS ALMQUIST and OLOV SCHELÉN- Quality of Service Schemes for IEEE Wireless LANs An Evaluation [11] Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, and Jian Ma. Performance of Reliable Transport Protocol over IEEE Wireless LAN: Analysis and Enhancement. In Proceedings of the IEEE INFOCOM 02, June [12] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly OAR: An Opportunistic Autorate Media Access Protocol for Ad Hoc Networks [13] Stefan Mangold1, Sunghyun Choi2, Peter May3, Ole Klein1, Guido Hiertz1, Lothar Stibor1 IEEE e Wireless LAN for Quality of Service

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

IEEE e QoS for Wireless LAN:

IEEE e QoS for Wireless LAN: IEEE 802.11e QoS for Wireless LAN: A Research Direction James Yu 12/09/2003 TDC Network Seminar 1 IEEE 802.11 MAC Layer Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Different from CAMA/CD

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Abstract. 1 Introduction. 2 Wireless LAN

Abstract. 1 Introduction. 2 Wireless LAN Abstract Speaking of Wireless LAN, the general thought is about data transfer while using applications such as web browser, e-mail client, etc. As the technology is advancing, Wireless LANs are now also

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

IEEE e Enhanced QoS

IEEE e Enhanced QoS IEEE 802.11e Enhanced QoS 國立中興大學資工系曾學文 Tel : (04)22840497 ext 908 E-mail: hwtseng@nchu.edu.tw Outlines Introduction Traffic Differentiation Hybrid Coordination Function (HCF) Contention-Based Channel Access

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

MAC. OSI Layer 2 (Data Link) OSI Layer 1 (Physical)

MAC. OSI Layer 2 (Data Link) OSI Layer 1 (Physical) 教育部資通訊科技人才培育先導型計畫 無線區域網路媒體存取控 制層協定 任課老師 : 陳懷恩 助理教授兼任資訊工程研究所所長電算中心資訊網路組組長 國立宜蘭大學 Email: wechen@niu.edu.tw 1 Outline Introduction ti to IEEE 802.11 Frame Format Medium Access Control Protocol MAC Access

More information

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University A SURVEY OF QOS TECHNIQUES IN 802.11 Drabu, Yasir Department of Computer Science, Kent State University Contents 1. Abstract 2. Introduction 3. Background 3.1. 802.11 Mac Sub layer 3.2. Distributed Coordination

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access by Anni Matinlauri Instructor: Jouni Karvo Supervisor: Professor Raimo Kantola Agenda Background Research

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Qos support and adaptive video

Qos support and adaptive video Qos support and adaptive video QoS support in ad hoc networks MAC layer techniques: 802.11 e - alternation of contention based and contention free periods; differentiated (per class) Interframe Spacing

More information

Notes on the Inefficiency of e HCCA

Notes on the Inefficiency of e HCCA Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study A new Traffic Separation Mechanism (TSm) in Wireless 802.11e Networks: A simulation study Ricardo Moraes 1, Francisco Vasques 1, Paulo Portugal 1, José Alberto Fonseca 2 1 Faculdade de Engenharia Universidade

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Design and analysis of MAC protocols for wireless networks

Design and analysis of MAC protocols for wireless networks Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE 802.11 WLAN 1 Khan Tazeem Ahmad, 2 Beg M. T., & 3 Khan M. A. 1,2 Department of ECE, Faculty of Engineering & Technology, Jamia Millia Islamia,New

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

802.11MAC Fundamentals

802.11MAC Fundamentals Wireless Mesh and Vehicular Networks 802.11MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/teaching-duties/wmvn Copyright Quest opera è protetta dalla licenza:

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Gabriel Lazar, Virgil Dobrota, Member, IEEE, Tudor Blaga, Member, IEEE 1 Agenda I. Introduction II. Reliable Multimedia

More information

Analysis of b MAC: A QoS, Fairness, and Performance Perspective

Analysis of b MAC: A QoS, Fairness, and Performance Perspective Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective Srikant Sharma Department of Computer Science Stony Brook University Stony Brook, NY 11794-4400 srikant@cs.sunysb.edu Abstract Wireless

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information