A smart exponential-threshold-linear backoff mechanism for IEEE WLANs

Size: px
Start display at page:

Download "A smart exponential-threshold-linear backoff mechanism for IEEE WLANs"

Transcription

1 INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2011; 24: Published online 13 January 2011 in Wiley Online Library (wileyonlinelibrary.com) A smart exponential-threshold-linear backoff mechanism for IEEE WLANs Chih-Heng Ke 1, Chih-Cheng Wei 2, Kawuu W. Lin 2,, and Jen-Wen Ding 3 1 Department of Computer Science and Information Engineering, National Quemoy University, Kinmen, Taiwan 2 Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan 3 Department of Information Management, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan SUMMARY Based on the standardized IEEE Distributed Coordination Function (DCF) protocol, this paper proposes a new backoff mechanism, called Smart Exponential-Threshold-Linear (SETL) Backoff Mechanism, to enhance the system performance of contention-based wireless networks. In the IEEE DCF scheme, the smaller contention window (CW) will increase the collision probability, but the larger CW will delay the transmission. Hence, in the proposed SETL scheme, a threshold is set to determine the behavior of CW after each transmission. When the CW is smaller than the threshold, the CW of a competing station is exponentially adjusted to lower collision probability. Conversely, if the CW is larger than the threshold, the CW size is tuned linearly to prevent large transmission delay. Through extensive simulations, the results show that the proposed SETL scheme provides a better system throughput and lower collision rate in both light and heavy network loads than the related backoff algorithm schemes, including Binary Exponential Backoff (BEB), Exponential Increase Exponential Decrease (EIED) and Linear Increase Linear Decrease (LILD). Copyright 2011 John Wiley & Sons, Ltd. Received 20 April 2010; Revised 9 August 2010; Accepted 11 October 2010 KEY WORDS: DCF; backoff algorithm; contention window; BEB; EIED; LILD 1. INTRODUCTION Wireless local area networks (WLANs) have recently gained widespread popularity and have consequently become ubiquitous in our society. An increasing number of wireless mobile computing devices are being introduced, including portables, palmtops and personal digital assistants. WLANs have been successfully adopted in many domains, such as health-care, manufacturing, retail outlets, warehousing, libraries and academia. WLANs have been widely deployed and thus people can now easily access the Internet using wireless services, and nowadays are quite familiar with transmitting multimedia contents, voice and video over WLANs. The dominant standard for WLANs is the IEEE protocol [1]; It includes detailed specifications both for Medium Access Control (MAC) and Physical Layer (PHY). In WLANs, the media constituting PHY is shared by all mobile stations and has a limited connection range. The MAC protocol provides the contention-free Point Coordination Function (PCF) and the contention-based Distributed Coordination Function (DCF) to access the shared wireless channel. The results of many studies have shown that currently designed PCF is not able to guarantee sufficient QoS Correspondence to: Kawuu W. Lin, Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan. linwc@cc.kuas.edu.tw Copyright 2011 John Wiley & Sons, Ltd.

2 1034 C.-H. KE ET AL. [2 4]. Further, the DCF is imperative for IEEE products. Therefore, we will only focus on how to improve the performance of IEEE DCF. In the IEEE protocol, DCF is the fundamental method of access used to support asynchronous data transfer on a best effort basis. The DCF is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), in which all stations compete for the wireless channel with the same priority. Binary Exponential Backoff (BEB) with CSMA/CA is employed as a scheme of obtaining stability and enabling the media to be shared. At the first transmission attempt of a packet, all competing stations randomly select the backoff time according to the BEB scheme which is set from a uniform distribution over the interval [0,CW min 1], where CW min is the minimum contention window (CW) size. Every time a station experiences transmission collision, the CW size doubles up to its maximum CW max. And the new CW is used for the following transmission attempt. Following a successful transmission, the station resets its CW size to the minimum size. However, the CW resetting mechanism of BEB causes a very large variation in the CW size, and degrades the performance of a network when it is heavily loaded since each new packet starts with the CW min, which increases the probability of collision. Accordingly, there have been many proposals for improving the performance. The mechanism of Exponential Increase Exponential Decrease (EIED) [5] suggests a slower reduction of the CW after a successful transmission. In the EIED mechanism, the CW is doubled after a collision and halved after a successful transmission. This improves the performance if the number of competing stations is large. The CW size is thus kept large in order to avoid frequent collisions, but the rapid variations in CW size may be too sensitive to adapt to the network load. Another algorithm, Linear Increase Linear Decrease (LILD), which is based on Multiple Increase Linear Decrease (MILD) originally proposed in [6], provides better performance than DCF and EIED mechanisms when the number of stations is large. In the LILD mechanism, the CW is plus one or CW min after a collision and minus one or CW min after a successful transmission. Other contention resolution mechanisms have also been proposed to improve the network performance of IEEE DCF. Most of them, however, require an exchange of information between stations and complicated computation [7 10]. These algorithms are not considered here and we consider only acknowledgment based on the backoff algorithm. The remainder of this paper is organized as follows. Section 2 reviews the DCF and describes various schemes presented in the literature that were designed to improve the performance of contention-based wireless networks. Section 3 introduces the proposed scheme and presents an analytical model in detail. Model validation, a simulation and experimental results are presented in Section 4. Section 5 concludes the paper and discusses future works. 2. RELATED WORKS 2.1. IEEE DCF DCF is the primary access protocol of the IEEE standard for stations to share the wireless medium with the same priority. DCF is basically a CSMA/CA. Each station with a new packet ready for transmission monitors the channel activity. If a station senses that the medium has been idle, the transmission may begin. If it senses that the channel is busy, the station will wait until it senses that the medium is idle again after which the station is then allowed to transmit. The basic access mechanism of DCF is shown in a simple diagram in Figure 1. First, a station with a new packet to transmit senses the channel state until it senses that the channel is idle, then waits longer for a DIFS period and generates a backoff time in a CW state. The IEEE DFC uses the BEB algorithm. The backoff timer is uniformly chosen in the range (0, W i 1). CW is also known as contention window, which is an integer with the range determined by the PHY characteristics between a minimum value of CW min and a maximum value of CW max,andwithw i as the current CW. The number of failed transmissions of the same packet is represented by i. At the first transmission attempt, the CW is set at W 0 =CW min. After each unsuccessful transmission, CW is doubled and W i =2 W i 1 =2 i CW min, until the maximum value CW max =2 m CW min is

3 AN SETL BACKOFF MECHANISM FOR IEEE WLANS 1035 Figure 1. Basic mechanism of DCF. Figure 2. Backoff algorithm for the DCF scheme. Figure 3. CW variation in the BEB scheme. reached. m is the maximum number of backoff stages. Conversely, for each successful transmission, CW will reset to the minimum value CW min. In the IEEE DCF standard for the Direct Sequence Spread Spectrum (DSSS) physical channel, CW min =32, CW max =1024 and m =5. Figure 2 presents a diagram of the transitions in a backoff stage in the BEB scheme. The values CW min and CW max are assumed to be 32 and The CW variations of the BEB scheme are illustrated in Figure 3.

4 1036 C.-H. KE ET AL. Figure 4. Backoff algorithm for the EIED scheme. Figure 5. CW variation in the EIED scheme EIED backoff scheme As mentioned in Section 2.1, the IEEE DCF uses the BEB scheme to enable active stations to compete accessing the medium. Another alternative backoff scheme, called EIED [5], has been proposed in order to lower the collision probability and improve performance. In EIED, whenever a packet transmitted from a station is involved in a collision, the CW size for that station is increased by backoff factor r I, and the CW for that station is decreased by backoff factor r D after a successful transmission. The EIED backoff algorithm is represented by the following: W i =min[ri W i 1,CW max ] for a collision, and W i =max[w i 1 /r D,CW min ] for a successful transmission. For r I =r D =2, the CW both increases and decreases exponentially. Whenever a successful transmission occurs, this does not mean that the number of competing stations has been reduced. Thus, to prevent CW from immediately returning to the initial state CW min and increasing the probability of collision, the EIED aims to reduce the CW slowly, exponentially, after a successful transmission. A diagram of the transitions in a backoff stage for EIED is shown in Figure 4, and variations in the CW in the EIED scheme are shown in Figure LILD scheme In [5], another backoff scheme is proposed, called MILD; after a successful transmission the CW is reduced by one to CW min, and multiplied by 1.5 to the maximum CW max. The backoff algorithm

5 AN SETL BACKOFF MECHANISM FOR IEEE WLANS 1037 Figure 6. Backoff algorithm for the LILD scheme. of MILD could be expressed as follows: W i =min[wi 1 1.5,CW max] for a collision, and W i =max[w i 1 1,CW min ] for a successful transmission. The LILD scheme also represents an improvement of the MILD mechanism, as it increases and decreases the CW size linearly. Therefore, regardless of whether a transmission succeeds or fails, the CW changes with the value of CW min, and is also limited by CW max and CW min. The backoff algorithm of LILD is represented by the following. W i =min[w i 1 +CW min,cw max ] for a collision, and W i =max[w i 1 CW min,cw min ] for a successful transmission. The LILD linearly slows down or increases the variations in CW. When a station faces many collision incidents and its CW is in the higher region, a slow linear decrease in CW after successful transmission will help resolve contention. The network load may be still heavy. Keeping the CW in the higher region can help avoid contention occurrence. A diagram of the transitions in a backoff stage for LILD is shown in Figure Comparison of the related works For contention-based DCF, the adjustment of CW is very important. A proper tuning of the CW resolution mechanism that is coordinated with the network load will improve the system s throughput and prevent transmission collision. As mentioned above, the EIED mechanism provides a rapid variation of CW, and is suitable for an environment with fewer competing stations and a light network load. The LILD, on the other hand, changes the CW slowly, which makes it suitable for heavy network loads with a large number of competing stations. There is a tradeoff between the waste of transmission time and the risk of collision followed by retransmission. To address this tradeoff, we propose a new backoff algorithm, called Smart Exponential Threshold Linear backoff algorithm scheme (SETL), that combines the advantages of EIED and LILD. Furthermore, we adjust the policy after a successful transmission to further improve the performance of IEEE DCF. 3. THE PROPOSED SCHEME As shown in the comparison in Section 2, the EIED mechanism performs better than the LILD mechanism with a light network load of less competing stations. Conversely, the LILD mechanism performs better than the EIED mechanism when the network load is heavy with more competing stations. In order to enhance the performance in both a light and heavy network load environment, we combine the advantages of the EIED and LILD mechanisms in order to adapt to the conditions of a wireless network. In the proposed SETL backoff algorithm, a threshold value of CW, CW Threshold, is set in order to determine whether there are more or less competing stations in the WLANs. If the current CW size of a competing station is more than the CW Threshold, the CW is in the higher region, which means that the competing station has retransmitted many times due to a collision

6 1046 C.-H. KE ET AL Normalized saturation throughput with different counter 'S' Normalized Saturation Throughput "stations=10" "stations=30" "stations=50" "stations=70" "stations=90" "stations=110" "stations=130" "stations=150" Continuous consecutive successful counter 'S' Figure 15. Normalized saturation throughput with different counter S. Collision Rate (%) Collision rate with different counter 'S' "stations=10" "stations=30" "stations=50" "stations=70" "stations=90" "stations=110" "stations=130" "stations=150" Continuous consecutive successful counter 'S' Figure 16. Collision rate with different counter S. consecutive successful transmission counter S, the SETL scheme is stably tuned to prevent the CW from being directly reduced after each successful transmission, which invites the probability of collision. We validated our analysis model by means of simulations, and from the results of our experiments, we confirmed that the SETL works better than other related backoff schemes, offering higher saturation throughput and a lower collision rate. In our future work, we are interested in applying the SETL scheme to a contention-based wireless network of multi-rate environment. By adjusting the continuous consecutive successful transmission counter S to assign different transmitting priorities for different transmission rates, performance can be improved even further. REFERENCES 1. IEEE standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. ISO/IEC :1999(E), August Kuo WK, Chan CY, Chen KC. Time bounded services and mobility management in IEEE wireless LANs. Proceedings of the IEEE Personal Wireless Communication Conference, Mumbai, India, 1997;

7 AN SETL BACKOFF MECHANISM FOR IEEE WLANS Visser MA, Zarki ME. Voice and data transmission over an wireless network. Proceedings of the Personal, Indoor and Mobile Radio Communications Conference, Toronto, Ont., Canada, vol. 2, September 1995; Sanchez J, Martinez R, Marcellin MW. A survey of MAC protocols for wireless ATM. IEEE Network 1997; 11: Song N, Kwak B, Song J, Miller LE. Enhancement of IEEE distributed coordination function with exponential increase exponential decrease backoff algorithm. The 57th IEEE Semiannual Spring VTC, Orlando, FL, U.S.A., vol. 4, Bharghavan V, Demers A, Shenker S, Zhang L. MACAW: a media access protocol for wireless LAN s. Proceeding ACK SIGCOMM 94, London, England, Bianchi G, Fratta L, Oliveri M. Performance evaluation and enhancement of the CSMA/CA MAC protocol for wireless LANs. Proceedings of PIMRC 96, Taipei, Taiwan, October 1996; Cali F, Conti M, Gergori E. Dynamic tuning of the IEEE protocol to achieve a theoretical throughput limit. IEEE/ACM Transactions on Networking 2000; 8(6): Qiao D, Shin KG. UMAV: a simple enhancement to the IEEE DCF. Proceedings of the 36th Hawaii International Conference on System Science (HICSS-36), Hawaii, January Deng DJ, Ke CH, Chen HH, Huang YM. Contention window optimization for IEEE DCF access control. IEEE Transactions on Wireless Communications 2008; 7(12): Natkanies M, Pach AR. An analysis of the backoff mechanism used in IEEE networks. IEEE Symposium on Computer and Communication, Antibes-Juan les Pins, France, July 2000; Wu H, Peng Y, Long K, Cheng S. A simple model of IEEE Wireless LAN. IEEE International Conference on Info-tech and Info-net, Beijing, China, vol. 2, November 2001; Wu H, Cheng S, Peng Y, Long K, Ma J. IEEE distributed coordination function (DCF) analysis and enhancement. IEEE International Conference on Communications, New York, NY, U.S.A., vol. 1(28), May 2002; Kwak BJ, Song NO, Miller LE. Analysis of the stability and performance of exponential backoff. IEEE Wireless Communications and Networking Conference, New Orleans, LA, U.S.A., vol. 3(3), 2003; Xiao Y. Backoff-based priority schemes for IEEE IEEE International Conference on Communications 2003, Anchorage, AK, U.S.A., vol. 3, May 2003; Velkov ZH, Spasenovski B. Saturation throughput-delay analysis of IEEE DCF in fading channel. IEEE International Conference on Communications 2003, Anchorage, AK, U.S.A., vol. 1, May 2003; Chatzimisios P, Boucouvalas AC, Vitsas V. IEEE packet delay a finite retry limit analysis. IEEE Global Telecommunications Conference 2003, San Francisco, U.S.A., vol. 2, 2003; Chen H, Li Y. Performance model of IEEE DCF with variable packet length. IEEE Communications Letters 2004; 8(3): Bianchi G. Performance analysis of the IEEE distributed coordination function. IEEE Journal on Selected Areas in Communication 2000; 18(3): The Network Simulator NS-2. Available from: AUTHORS BIOGRAPHIES Chih-Heng Ke received his BS and PhD degrees in Electrical Engineering from the National Cheng-Kung University, in 1999 and He is an assistant professor of Computer Science and Information Engineering, in the National Quemoy University, Kinmen, Taiwan. His current research interests include multimedia communications, wireless network, and QoS network. Chih-Cheng Wei received the BS degree from the Electrical Engineering Department, National Central University, Taiwan in 1991 and the MS degree in Computer Science and Information Engineering from the National Kinmen Institute of Technology, Kinmen, Taiwan in He is now a PhD student in the Electronics Department of the National Kaohsiung University of Applied Sciences. His research interests are performance evaluation and optimization in wireless networks.

8 1048 C.-H. KE ET AL. Kawuu W. Lin received the BS from the Department of Computer Science and Information Engineering, National Taiwan University (NTU), Taiwan, 1999, and received his PhD from the Department of Computer Science and Information Engineering, National Cheng-Kung University (NCKU), Taiwan, Since August 2007, he has been an assistant professor in the Department of Computer Science and Information Engineering, National Kaohsiung University of Applied Sciences (KUAS), Taiwan. His research interests include data mining and its applications, sensor technologies, and parallel and distributed computing. He is a member of Phi Tau Phi honorary society, and has won the Phi Tau Phi Scholastic Honor in Jen-Wen Ding is an Associate Professor in the Department of Information Management, the National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan. He received his BS, MS, and PhD degrees in Engineering Science from the National Cheng Kung University, Tainan, Taiwan, in 1996, 1998, and 2001, respectively. His research interests include video streaming and multimedia communications. He has authored/co-authored over 30 refereed papers in journals, conference, and workshop proceedings. He also holds several patents in multimedia storage and communications. He received the Best Paper Award of 2007 Asia-Pacific Workshop on Visual Information Processing (VIP 2007) and Acer Long-Term Prize in Dr Ding was the Editor of the proceeding of 2008 Pacific-Rim Conference on Multimedia (PCM 2008) and the Guest Editor of the Special Issue on Ubiquitous Multimedia Computing: Systems, Networking, and Applications for International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC). He has been invited to serve on the technical program committee at many national and international conferences. He is also a member of the IEEE as well as of IEEE Circuits and Systems Society.

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 376 ~ 382 DOI: 10.11591/ijeecs.v5.i2.pp376-382 376 Performance Evaluation of Different Backoff Algorithms

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Enhanced high-performance distributed coordination function for IEEE multi-rate LANs

Enhanced high-performance distributed coordination function for IEEE multi-rate LANs INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2009; 22:1045 1061 Published online 27 May 2009 in Wiley InterScience (www.interscience.wiley.com)..1025 Enhanced high-performance distributed

More information

N-BEB: New Binary Exponential Back-off Algorithm for IEEE

N-BEB: New Binary Exponential Back-off Algorithm for IEEE N-BEB: New Binary Exponential Back-off Algorithm for IEEE 802.11 Mohammad Shurman 1, Bilal Al-Shua'b 2 (1) Jordan University of Science and Technology/Network Engineering and Security Department, Irbid,

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

International Journal of Technical Research and Applications e-issn: , Special, Issue 43 (March 2017), PP.

International Journal of Technical Research and Applications e-issn: ,  Special, Issue 43 (March 2017), PP. COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS IN IEEE 802.11 DCF MAC PROTOCOL 1 Aditi Harugade, 2 Priyanka Karunglikar, 3 Damini Jadhav, 4 Prem Kumar, 5 T.N. Sawant 1,2,3,4,5 Electronics and Telecommunication

More information

THE wireless local area network (WLAN) is emerging as. A Multichain Backoff Mechanism for IEEE WLANs Shiang-Rung Ye and Yu-Chee Tseng

THE wireless local area network (WLAN) is emerging as. A Multichain Backoff Mechanism for IEEE WLANs Shiang-Rung Ye and Yu-Chee Tseng IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 5, SEPTEMBER 2006 1613 A Multichain Backoff Mechanism for IEEE 802.11 WLANs Shiang-Rung Ye and Yu-Chee Tseng Abstract The distributed coordination

More information

Research Article 2017

Research Article 2017 International Journal of Emerging Research in Management &Technology Research Article May 2017 Special Issue of International Conference on Emerging Trends in Science & Engineering (ICETSE 2017) Conference

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks

Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless etworks Xiaohui Ye *, Xin Liu #, S. J. Ben Yoo *, and Zhi Ding * * Department of Electrical and Computer Engineering,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

ACK-based QoS Support and Throughput Improvement over WLANs

ACK-based QoS Support and Throughput Improvement over WLANs ACK-based QoS Support and Throughput Improvement over 802.11 WLANs Mehmet Fatih Tüysüz Department of Computer Engineering Harran University ftuysuz@harran.edu.tr ABSTRACT In IEEE 802.11 wireless network

More information

International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 1, January 2012)

International Journal of Emerging Technology and Advanced Engineering Website:   (ISSN , Volume 2, Issue 1, January 2012) Performance Improvement of 802.11 MAC by enhancements in DCF Vikram Jain 1, Siddharth Dutt Choubey 2, Rohit Singh 3, Sandeep Gupta 4 1 Research Scholar, Singhania University, INDIA 2,3,4 ME / MTech (CS

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Performance analysis of the IEEE MAC protocol for wireless LANs

Performance analysis of the IEEE MAC protocol for wireless LANs INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 25; 18:545 569 Published online 2 June 25 in Wiley InterScience (www.interscience.wiley.com). DOI: 1.12/dac.717 Performance analysis

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

PAPER Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness

PAPER Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness IEICE TRANS. COMMUN., VOL.E93 B, NO.2 FEBRUARY 2010 369 PAPER Analysis of an Adaptive P-Persistent MAC Scheme for WLAN Providing Delay Fairness Chih-Ming YEN a), Student Member, Chung-Ju CHANG, Yih-Shen

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network

A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network Neetesh Nema Mahendra Rai M.E.( Computer Science and Engineering) H.O.D.(Department of Information Technology) (0205cs10me08)

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Jiaqing (James) Song songs@acm.org Spring 2002 Table of Contents Introduction to WLAN Performance enhancement Implementation with OPNET

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN

COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN E WIRELESS LAN COLLISION-AWARE ADAPTION OF CONTENTION WINDOW IN 802.11E WIRELESS LAN Shih-Wei Pan, Jung-Shyr Wu and Ming-Wei You Department of Communication Engineering, National Central University, JhungLi City, Taiwan

More information

Accountability of WMNs using BEB Algorithm

Accountability of WMNs using BEB Algorithm Accountability of WMNs using BEB Algorithm Shafi Jasuja Department of Information Technology Chandigarh Engineering College, Landran, Mohali, Punjab, India Parminder Singh Department of Information Technology

More information

An Approach for Improving Performance of Back off Algorithm

An Approach for Improving Performance of Back off Algorithm International Journal of Computer Applications (975 8887) Volume 46 No.5, May 212 An Approach for Improving Performance of Back off Algorithm Swati Bhagoria Computer Engineering Department Shri G.S. Institute

More information

PERFORMANCE ENHANCEMENT OF WLAN IEEE FOR ASYMMETRIC TRAFFIC

PERFORMANCE ENHANCEMENT OF WLAN IEEE FOR ASYMMETRIC TRAFFIC PERFORMANCE ENHANCEMENT OF WLAN IEEE 802.11 FOR ASYMMETRIC TRAFFIC Elena Lopez-Aguilera, Jordi Casademont, Josep Cotrina, Alfonso Rojas Wireless Networks Group - Telematics Department Technical University

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 4, JULY

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 4, JULY IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 4, JULY 2004 1235 A New Collision Resolution Mechanism to Enhance the Performance of IEEE 802.11 DCF Chonggang Wang, Bo Li, Senior Member, IEEE,

More information

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN

EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE WLAN EVALUATION OF BACK-OFF ALGORITHM PERFORMANCE OF MAC LAYER IEEE 802.11 WLAN 1 Khan Tazeem Ahmad, 2 Beg M. T., & 3 Khan M. A. 1,2 Department of ECE, Faculty of Engineering & Technology, Jamia Millia Islamia,New

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

New Algorithm for High Throughput of IEEE Distributed Coordination Function

New Algorithm for High Throughput of IEEE Distributed Coordination Function Sadiq H. Abdulhussain Dheyaa J. Kadhim Basheera M. Ridha Amna M. Abbas Department of Electrical Engineering, College of Engineering, University of Baghdad, Baghdad, Iraq New Algorithm for High Throughput

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Prioritization scheme for QoS in IEEE e WLAN

Prioritization scheme for QoS in IEEE e WLAN Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs

Comparison of the Quality of Service (QoS) on the IEEE e and the g Wireless LANs ENSC 427: COMMUNICATION NETWORKS Comparison of the Quality of Service (QoS) on the IEEE 802.11e and the 802.11g Wireless LANs Spring 2010 Final Report Group 5 Yalda Hakki (yha17@sfu.ca) Rosy Johal (rja2@sfu.ca)

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays

An Improved IEEE CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays An Improved IEEE 802.11 CSMA/CA Medium Access Mechanism Through the Introduction of Random Short Delays Nirmala Shenoy, John Hamilton, Andres Kwasinski and Kaiqi Xiong Rochester Institute of Technology,

More information

Research Article Adaptive Backoff Algorithm for Contention Window for Dense IEEE WLANs

Research Article Adaptive Backoff Algorithm for Contention Window for Dense IEEE WLANs Mobile Information Systems Volume 2016, Article ID 8967281, 11 pages http://dx.doi.org/10.1155/2016/8967281 Research Article Adaptive Backoff Algorithm for Contention Window for Dense IEEE 802.11 WLANs

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Demo Plan Jiaqing (James) Song songs@acm.org Spring 2002 Contents of Demo OPNET WLAN Models PHY Characteristics WLAN Parameters Adaptive

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Research Article The Performance Evaluation of an IEEE Network Containing Misbehavior Nodes under Different Backoff Algorithms

Research Article The Performance Evaluation of an IEEE Network Containing Misbehavior Nodes under Different Backoff Algorithms Hindawi Security and Communication Networks Volume 7, Article ID 45978, 8 pages https://doi.org/.55/7/45978 Research Article The Performance Evaluation of an IEEE 8. Network Containing Misbehavior Nodes

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Performance Improvement In MANET By Using A Modified BEB Algorithm

Performance Improvement In MANET By Using A Modified BEB Algorithm Performance Improvement In MANET By Using A Modified BEB Algorithm Aparna S. Mankar 1, Mangla S. Madankar 2 1 ME Student, Wireless Communication & Computing, GHRCE Nagpur 2 Assistant Professor, Department

More information

Fair and Effective Transmissions in IEEE e WLAN

Fair and Effective Transmissions in IEEE e WLAN GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea

More information

Key-Words: Ad hoc network, multimedia, QoS, routing protocol.

Key-Words: Ad hoc network, multimedia, QoS, routing protocol. Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Implementation of an IEEE Wireless LAN Model using OPNET

Implementation of an IEEE Wireless LAN Model using OPNET Implementation of an IEEE 802.11 Wireless LAN Model using OPNET Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks

Characterising the interactions between unicast and broadcast in IEEE ad hoc networks University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2008 Characterising the interactions between unicast and broadcast in

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler

Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Design and Analysis of Fragmentation Threshold and Buffer Size of Wireless LAN using OPNET Modeler Rakesh Kumar 1, Dr. Vishnu Shrivastava 2 1 P.hD. Scholar ECE Department, Vivekanand Global University,

More information

Neighbor-Aware Multiple Access Protocol for 5G mmtc Applications

Neighbor-Aware Multiple Access Protocol for 5G mmtc Applications REVIEWS Neighbor-Aware Multiple Access Protocol for 5G mmtc Applications Yang Yang 1,2, Guannan Song 1,2,3, Wuxiong Zhang 1,2, Xiaohu Ge 4, Chengxiang Wang 5 1 Key Lab of Wireless Sensor Networks & Communications,

More information

Performance evaluation of IEEE e

Performance evaluation of IEEE e IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information