P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
|
|
- Tracey Jacobs
- 6 years ago
- Views:
Transcription
1 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of FBR Figure 1 illustrates the state transition diagram of a mobile station for FBR. The diagram of FBR consists of eight states: IDLE, ARRIVE, BACKOFF, ATTEMPT, RETRY 1, RETRY 2, RETRY 3, and RETRY 4. Initially, the mobile station stays in IDLE state. When a data frame arrives, the state transits from IDLE state to ARRIVE state. In ARRIVE state, the arrival frame is queued in the buffer of the mobile station. When the data frame is saved by the mobile station, the mobile station selects a random backoff time to countdown. The mobile station enters into BACKOFF state. The state transition probability from ARRIVE to BACKOFF is P B. If the mobile station counts to zero and senses an idle channel, the mobile station starts to perform RTS/CTS handshaking and data transmission, and the state transits from ARRIVE state to ATTEMPT state. The state transition probability is 1 P B, and the average waiting time in ARRIVE state is equal to DIFS + W 2, where W is the minimum backoff window size (e.g., 32 slots). IDLE ARRIVE P B 1-P B PS (1-P F ) 4 ATTEMPT 1- (1-P RF ) 4 (1-P RF ) 2 1-P RF 1 (1-P RF ) 3 6 P F2 (1-P F ) 2 4 P F (1-P F ) 3 P F 4 4 P F 3(1-P F ) P A RETRY4 RETRY 3 RETRY 2 RETRY1 1-(1-P RF ) 2 P RF 1-(1-P RF ) 3 BACKOFF 1-(1-P RF ) 4 1-P A Figure 1: The state transition diagram for FBR. Assume that is the probability for successful RTS/CTS transmission. Let (1 P F ) denote the probability for successfully transmitting a fragmental data block, where P F = 1 (1 P b ) PHY+MAC+L+ACK [4] is the probability that a fragmental data block fails to transmit. P b denotes the bit error rate. L is the data length (in bits). PHY and MAC are repre-
2 sented physical layer head and MAC layer head, respectively. Note that due to the short length of PHY/MAC/ACK frames, frame errors for PHY/MAC/ACK can be ignored. If RTS/CTS and the four fragmental data blocks are successfully transmitted, the state returns to IDLE state with probability (1 P F ) 4. Otherwise, if there are errors in data block transmission, the state transmits from ATTEMPT state to RETRY 1, RETRY 2, RETRY 3, or RETRY 4 state depending on the number of failed data blocks. State RETRY i represents that i data blocks fail in the first transmission and will be retransmitted. The probabilities from ATTEMPT state to RETRY 1, RETRY 2, RETRY 3, and RETRY 4 states are equal to ( 4 1) P F (1 P F ) 3, ( 4 2) P 2 F (1 P F ) 2, ( 4 3) P 3 F (1 P F ), and ( 4 4) P 4 F, respectively. In RETRY 1, RETRY 2, RETRY 3, and RETRY 4 states, the mobile station retransmits fragmental data blocks at a lower data transmission rate. The lower data transmission rate can resist the noise interference and reduce the probability that there errors occur during the retransmission of a fragmental data block. If retransmission with a lower transmission rate fails, the state transmits from RETRY 1, RETRY 2, RETRY 3, or RETRY 4 state to BACKOFF state. Otherwise, the state transits from RETRY 1, RETRY 2, RETRY 3, or RETRY 4 state to IDLE state. Let P RF be the probability that a fragmental data block fails in retransmission, which is equal to P F 3 [2]. The probabilities from RETRY 1, RETRY 2, RETRY 3, and RETRY 4 states to IDLE state are 1 P RF, (1 P RF ) 2, (1 P RF ) 3, and (1 P RF ) 4, respectively. In ATTEMPT state, if the collision of RTS/CTS transmission occurs, the state transits from ATTEMPT state to BACKOFF state with the probability of 1. Note that due to the short length of RTS/CTS frames, frame error for RTS/CTS can be ignored. The derivation of is described as follows. We assume that the arrival process of frames at a mobile station forms the Poisson distribution with arrival rate λ. The probability that RTS/CTS frame is successfully transmitted is given by ( t) =exp Λ t, (1) where t is a slot time and Λ is the total frame arrival rate in the system. For the number N of mobile stations with arrival rate λ, the total arrival rate Λ is qual to Nλ. When residing in BACKOFF state, the mobile station selects a random backoff time according to the backoff rule. If the minimum backoff time is selected, the state for the mobile station transits from BACKOFF state to ATTEMPT state after the end of backoff countdown. The state transition probability is P A. (The derivation of P A will be shown in the next section.) Otherwise, the mobile station suspends the backoff countdown and waits for next contention with the probability 1 P A. In FBR, the renewal interval is defined as the time between successive renewal points. A renewal interval consists of an idle period and a busy period. In the idle period, the transmission medium remains idle due to backoff, DIFS interval, or no frame arrival. In the busy period, the medium is used to perform data/control frame transmission or fragmental data block retransmission. Based on the above discussions, the transition probability P B from ARRIVE state to BACKOFF state is expressed as P B = B I + B, (2) 2
3 where I and B are the average lengths of idle and busy periods in each renewal interval, respectively. The average length I of the idle period is derived by the following equation: I = 1/Λ+DIFS. We will discuss the average MAC delay in FBR. 1.2 The MAC Delay Derivation for FBR The average length B of the busy period for FBR is derived as follows. Let T S and T C respectively denote the average times for four-way handshaking and RTS/CTS transmission. T R (i) is denoted as the interval of the retransmission for i fragmental data blocks. From Figure 1(b) of previous section 2, we have T S = RTS +3τ +3SIFS + CTS +4L s + ACK (3) T C = RTS +2τ + SIFS + CTS (4) T R (i) =τ +2SIFS + il r + ACK (5) where τ is the propagation delay for frame transmission, and L s and L r are the transmission times of a fragmental data block with transmission rates of s and r Mbps, respectively. The propagation delay τ for the data block is omitted since τ is extremely small compared to the transmission time for the data frame [1]. Then based on Equations 2, 3, 4 and 5, the average length B of the busy period is derived as follows: B =(1 )T C + [ 4 i=1 ( 4 i )(1 P F ) 4 i P i F (1 P RF ) i (T R (i)+t S )+(1 P F ) 4 T S ]. (6) Let D 1 be the average MAC delay of a frame arrival for FBR. That is, D 1 is the interval between the time that the mobile station serves the frame and the time that the frame is successfully transmitted. Thus we have D 1 = P B ( B 2 + D B)+(1 P B )(DIFS + W 2 + D A), (7) where D A and D B are the average waiting times in ATTEMPT and BACKOFF states, respectively. From Figure 1, D A is given by D A =(1 )(T C + D B )+ [ 4 i=1 ( 4 i )(1 P F ) 4 i P i F (1 P RF ) i (T R (i)+t S )+(1 P F ) 4 T S ]. (8) 3
4 Similarly, D B is derived as D B = P A (DIFS + T B + D A )+(1 P A )(RTS + SIFS + D B ). (9) where T B is the mean backoff time for a frame transmission, and from [3], we have T B = 4i=0 [ ( t)(1 ( t)) i 2 i 1 W ]+(1 ( t)) W. Furthermore, P A can be derived as P A =exp Λ(DIFS+T B). Let X = [ 4 i=1 ( 4 i )(1 P F ) 4 i P i F (1 P RF ) i (T R (i)+t S ) +(1 P F ) 4 T S ]. (10) Let Y and Z denote (DIFS + T B ) and (RTS + SIFS), respectively. D A is re-written as D A = (1 )(T C + D B )+X and D B is re-written as D B = P A (Y + D A )+(1 P A )(Z + D B ). Hence, D A and D B are derived as shown in the following: and D A =(1 )( Y + T C + X Z + X), (11) D B = Y + T C + X Z T C. (12) Hence, by substitution, the average MAC delay D 1 for FBR could be derived based on the results of D A and D B, as shown in the following: D 1 = P B ( B + Y +T C+X Z 2 T C ) +(1 P B )[DIFS + W +(1 P 2 S)] ( Y +T C+X Z + X)]. (13) Our analytical model has been validated against the simulation experiments. The simulation model will be presented in the performance evaluation section. Figure 2 shows the average MAC delay obtained from analysis and simulation for FBR, where the average length for a data frame is assumed to be 1, 500 bytes and FER=0.1. From this figure, the analytical results are very closed to the experimental results. References [1] J. J. Garcia-Luna-Aceves and T. Asimakis, Receiver-initiated Collision Avoidance in Wireless Networks, ACM/IEEE Wireless Networks, vol. 8, no. 2/3, pp , Mar
5 [2] Texas Instruments Spread Spectrum Processor with Medium Access Control, 2001, see http : //focus.ti.com/pdfs/bcg/ti a cx100.pdf. [3] S.-T. Sheu, Y. Tsai, and J. Chen, MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE Ad Hoc Wireless Networks, ACM/Kluwer Wireless Networks, vol. 9, no. 2, pp , March [4] Z. Tang, Z. Yang, J. He and Y. Liu, Impact of bit errors on the performance of DCF for wireless LAN, IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions, vol.1, pp , June-July D (ms) : Analysis 1.5 : Simulation Traffic Load Figure 2: Comparison of the analysis and simulation result. 5
Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationOutline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationEnhancing the DCF mechanism in noisy environment
Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationSample solution to Midterm
College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the
More informationCharacterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions
More informationMassive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications
Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling
More informationReliable Multicast Scheme Based on Busy Signal in Wireless LANs
Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium
More informationSample Solution to Problem Set 3
College of Computer & Information Science Fall 2007 Northeastern University Handout 6 CSG250: Wireless Networks 25 October 2007 Sample Solution to Problem Set 3 (The problem numbers from the text are the
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationThroughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationSolutions to Exercise Session 4,
Solutions to Exercise Session 4, 27.4.2012 I.1. Chapter 14: 2, 4, 5, 7, 8, 21, 23, 24-26 2. a 4. b, c 5. c 7. b 8. a 21. a 23. a 24. 25. 26. Token bus networks are intended for factory automation; hence
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationCan Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationA Multi-channel MAC Protocol for Ad Hoc Wireless Networks
A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationTitle. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information
Title Performance Analysis for Total Delay and Total Packe Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga Proceedings : APSIPA ASC 2009 : Asia-Pacific Signal Citationand Conference: 791-796
More informationEffect of Fragmentation in WLAN Systems with Interference Problems
Effect of Fragmentation in WLAN Systems with Interference Problems Shakil Akhtar College of Information Technology UAE University s.akhtar@uaeu.ac.ae Abstract Results from simulation model of an 802.11
More informationAd Hoc b Cooperative Protocols: Performance in a Slow Fading Channel
Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationA Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks
A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationBEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks
: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationImplementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies
European Wireless 2009 1 Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies Anders Grauballe, Mikkel Gade Jensen, Achuthan Paramanathan,
More informationHigh Performance Wireless Switch Protocol for IEEE Wireless Networks
Mobile Networks and Applications 10, 741 751, 2005 C 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. High Performance Wireless Switch Protocol for IEEE 802.11 Wireless Networks
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationTHE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE PROTOCOL
J. Appl. Math. & Computing Vol. 22(2006, No. 1-2, pp. 501-515 THE MAC LAYER PACKET SERVICE TIME DISTRIBUTIONS OF DCF IN THE IEEE 802.11 PROTOCOL DONG HWAN HAN AND CHUL GEUN PARK Abstract. The IEEE 802.11
More informationH-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationOverview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV
Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationTotal /75 xxxxxxxxxx
ECE 358 Midterm Exam, F 2014 Dept. of Electrical and Computer Engineering ECE 358 Computer Networks Instructor: Sagar Naik Exam. Date and Time: Oct. 20, 2014, 1:30 PM 2:45 PM Rooms: EIT 1015 and RCH 307
More informationCollision Probability in Saturated IEEE Networks
in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest
More informationMidterm Exam CSCE 232: Computer Networks Fall Instructions:
Midterm Exam CSCE 232: Computer Networks Fall 2007 Last Name: First Name: Student ID: Instructions: 1. This is a close-book and close-notes exam. 2. There are seven questions in total. The number of points
More informationWireless & Mobile Networking
Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationChannel-Hopping Multiple Access
Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,
More informationCHAPTER 8: LAN Standards
CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationSimulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks
Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden
More informationSaturated Throughput Analysis of IEEE e EDCA
Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard
More informationWIRELESS Wireless local area networks (WLANs)
, March 16-18, 216, Hong Kong A Novel MAC Protocol for Improving the Throughput in Multi-Hop Wireless Networks Takumi Sanada, Xuejun Tian, Takashi Okuda, and Shi Xiao, Abstract WLANs have become increasingly
More information