B. Bellalta Mobile Communication Networks
|
|
- Coleen Lawson
- 6 years ago
- Views:
Transcription
1 IEEE e : EDCA B. Bellalta Mobile Communication Networks
2 Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance with bidirectional TCP traffic? STA
3 DCF (Distributed Coordination Function) Without the RTS/CTS handshake. EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA 1/λ MN2 BUSY 2 packet departure BUSY t backoff suspension (coll.) Queue empty X1 ACK empty slot MN3 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY DATA backoff suspension (succ.) The time (backoff) is slotted in empty slots of duration σ [seconds]
4 Exercise 1 Markov Chain (K=4) Traffic load: A = 4.5 * 0.2 = 0.9 Erlangs Balance Equations: Steady state probabilities: p(0)=2.4419e 01 p(1)=2.1977e 01 p(2)=1.9780e 01 p(3)=1.7802e 01 p(4)=1.6022e 01 EQ = 1.79 frames
5 Exercise 1
6 Exercise 1
7 Exercise 2 Assumptions: Poisson arrivals / Exponentially distributed service times. Real case: Statistical characterization of the service time in saturated IEEE networks Zanella, A. De Pellegrini, F. Communications Letters, IEEE Publication Date: March 2005
8 Exercise 3 (a)
9 Exercise 3 (ρ=1)
10 Exercise 3 (ρ=1)
11 Exercise 3 (ρ=0.4)
12 Exercise 3 (ρ=0.4)
13 Exercise 4 & 5 4) Difficult to answer (non-linear). n : p, N, X, alfa, rho, tau, p, N,... B : rho, tau, p, N, X, alfa, rho, p=1-(1-tau)^n, tau=f(b) Impact of n > tau In terms of performance, it is better to have few nodes. 5) For example, a fixed-point approach. Others?
14 EDCA
15 15 VoIP over WLANs Voice over IP Economical alternative to traditional telephony. Wireless LANs August 2003 Broadband access network to internet. 178,000 new Skype users per day! VoIP over WLANs. A market opportunity. Complement/Substitute of current cellular networks. Technical limitations.
16 16 VoIP over WLANs Voice over IP Economical alternative to traditional telephony. Wireless LANs Broadband access network to internet. VoIP over WLANs. A market opportunity. Complement/Substitute of current cellular networks. Technical limitations. August ,000 new Skype users per day!
17 VoIP over WLANs Limitations for VoIPoWLAN (and other real time services) Protocol overheads. Capacity varying channels (multi rate). Random Access MAC. Bandwidth penalty due to the distributed access. Unfairnes Downlink/Uplink. Difficult coexistence between heterogeneous (rigid and elastic) flows. Hand off / Roaming between WLANs. 17
18 18 VoIP over WLANs Example: Rdata = 2 Mbps, Rbasic = 1 Mbps, VoIP codec: G.729 (8 Kbps) Downlink/Uplink TCP flows simultaneous VoIP calls TCP packets ACK packets ACK packets TCP packets VoIP call ACK packets TCP packets VoIP call IEEE Solution: EDCA (Enhanced Distributed Channel Access): Traffic differentiation at MAC layer + CAC optional. EDCA is too conservative. Static Traffic Differentiation without Admission Control.
19 19 Multimedia Traffic Flows General Classification (queue occupation). Elastic flows (TCP based): use all available bandwidth, fair with other elastic flows. saturated source/queue with : B L/X, ρ =1 Streaming/Rigid flows (UDP based): use only the bandwidth required. finite load (un saturated) source/queue with: B ρ L/X, ρ 1 User Perception Rigid Traffic (UDP) Good Bad Minimum Bandwidth Video/audio streaming Voice over IP B Multimedia User Perception Elastic Traffic (TCP) Better Web (HTTP) FTP, e mail,... Worst B
20 The DCF/EDCA model
21 21 The scenario MN B=200 Kbps MN B=100 Kbps MN MN1 MN B=120 Kbps AP B=450 Kbps Be=max. av. MN B=max. av. MN B=max. av. MN MN2 B=max. av. MN B=80 Kbps MN and AP share the channel using a random access MAC protocol.
22 22 IEEE MAC Model (DCF) Each node is modelled by a M/M/1/K queue with packet arrival rate λ k (α = λ) and service time X. Assumption: Poisson arrivals and service time exponentially distributed. The model accounts for: queuing delays, packet losses. λ k X K EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA Queue empty X1 ACK 1/λ MN2 packet departure BUSY 2 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY backoff suspension DATA
23 23 IEEE MAC Model (DCF) Each node is modelled by a M/M/1/K queue with packet arrival rate λ k and service time X. Assumption: Poisson arrivals and service time exponentially distributed. The model accounts for: queuing delays, packet losses. λ k X K EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA Queue empty X1 ACK 1/λ MN2 packet departure BUSY 2 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY backoff suspension DATA
24 24 DCF EDCA EQ1:Queueing delay packet arrival (HOL) 1/λ MN1 packet arrival (queued) packet departure X1 1 DATA ACK BUSY 2 empty slot packet departure BUSY t backoff suspension (coll.) Queue empty X1 1/λ MN2 MN3 DATA ACK BUSY COLLISION t ACK COLLISION t X2 BUSY DATA backoff suspension (succ.) BEB AIFS TXOP
25 25 IEEE e MAC Model (EDCA) : TXOP Multiple packet transmission each time a MN/AP gets the channel The overall network throughput increases (S=Data/Time [bps]) Less wasted time in random access. Packet arrival MN 1 Packet arrival (Queued) DATA Packet arrival Packet arrival busy DATA ACK t DATA ACK busy DATA Packet arrival (Queued) DATA Packet arrival MN 2 Packet arrival (Queued) busy MN 2 MN 1 ACK No TXOP Service Time (X) ACK GAIN Packet arrival (Queued) busy ACK busy ACK DATA ACK TXOP t GAIN Service Time (X) DATA DATA t ACK t
26 26 IEEE e MAC Model (EDCA) : TXOP Each user is modeled as an M/G[1,B]/1 queue (bulk service time queue) TXOP (Burst length): maximum consecutive number of frames transmitted at each successful attempt i=b Renewal Analysis j K Departure distribution. Average TXOP length Average TXOP duration Stationary (equil.) distribution. Blocking Probability. Queue occuppation. Queuing delay.
27 27 IEEE e MAC Model (EDCA): AIFS AIFS MN1 BUSY BUSY BUSY BUSY BUSY t Extra blocked slots due to AIFS Aggregate load from other nodes MN1 BUSY Service Time BUSY BUSY BUSY BUSY Transmission Prob. t
28 IEEE e MAC Model (EDCA): EB, p Expected BackOFF slots Cond. Collision Probability Prioritizing a flow: TXOP AIFS CWmin This model is able to capture the impact of the other flows with different MAC parameters. 28
29 29 Wireless Scenario Single Hop Ad Hoc network. No hidden terminals and ideal channel conditions. Channel access based on the DCF (BA and RTS/CTS). Two types of flows: streaming (UPD like) and elastic (TCP like). 2 1 i n 3 n 1
30 30 Results Single cell WLAN (ad hoc) Two types of flows: S1 (streaming ~ unsaturated) Bs = 100 Kbps L = 400 bytes E1 (elastic ~ saturated) Be (network dependant) L = 1500 bytes Default WLAN MAC parameters 0 S1 flows. Solution (1): AIFS (elastic flows, A=3) 8 S1 flows The TCP throughput is reduced. S1 saturation point
31 Model Validation Single cell WLAN (ad hoc) Two types of flows: S1 (streaming ~ unsaturated) E1 (elastic ~ saturated) Bs = 100 Kbps L = 400 bytes Be (network dependant) L = 1500 bytes Solution (2): TXOP S1 (=4) 7 S1 flows. CWmin,E1 (=64) 6 S1 flows. 31
32 32 Call Admission Control
33 Problem statement: Providing QoS Flow level Admission Control. Adaptive selection of MAC parameters. 33
34 34 Problem statement: Providing QoS Flow level Admission Control. Adaptive selection of MAC parameters. maximize performance (under the QoS) random access MAC (Performance)=f(MAC parameters, number of nodes, traffic profile each node) non-linear relation
35 35 The available bandwidth estimation problem Ideal Channel Sharing Random Access Channel Sharing Bandwidth Bandwidth Flow rejected Available bandwidth Bandwidth penalty Flow rejected Available bandwidth n... the bandwidth penalty due to the distributed access depends on the number of flows active and the traffic profile of each flow.... how to decide if a flow can be admited? We have to compute or to test if the new flow is possible. n
36 Multi rate Problems on VoIP capacity 36
37 Transmission Rates PHY Rate: The PHY Preamble and Header are transmitted at this rate (lowest) Basic Rate: Maximum rate common to all STAs Control frames are transmitted at BASIC rate. MAC Headers are transmitted at BASIC rate. Multiple Data Rates: Rate at which data is transmitted Based on the channel conditions of the STA / AP. Good: Higher rates (less redundancy bits, higher modulations) Bad: Lower rates (more redundancy bits, lower modulations)
38 Multi rate transmission (Multiple data rates) 1 Mbps 2 Mbps 5.5 Mbps 11 Mbps Direct relationship between communication rate and the channel quality required for that rate As distance increases, channel quality decreases Therefore: tradeoff between communication range and link speed Multi rate provides flexibility to meet both consumer demands Coverage Speed (high data rates)
39 Rate (Mbps) Efficiency MAC Overhead 11.0 Data Medium Time (milliseconds)
40 Auto Rate Protocols Selects the rate to use for a packet ARF Adaptive based on success/failure of previous packets Simple to implement Doesn t require the use of RTS CTS or changes to spec Receiver Based Auto Rate (RBAR) Uses SNR measurement of RTS to select rate Faster & more accurate in changing channel Requires some tweaks to the header fields Opportunistic Auto Rate (OAR) Adds packet bursting to RBAR Allows nodes to send more when channel conditions are good Implements temporal fairness instead of packet fairness
41 IEEE a Rates
42 IEEE a Ideal rate, acceptable BER
43 43 Multirate wireless 11Mbps 11Mbps AP 11Mbps 11Mbps etc
44 44 Multirate wireless 1Mbps 11Mbps AP 11Mbps 11Mbps etc
45 45 Problem Statement While total cell capacity is around 12 calls when all of them transmit at 11Mbps this capacity falls with any change from fast to slow flows Distribution of VoIP flows in a cell (G.711 codec)
46 Multihop (Mesh) Networks VoIP capacity 46
47 Hidden Terminal Problem (a) A C Data Frame A transmits data frame B (b) Data Frame A B C senses medium, station A is hidden from C Data Frame C C transmits data frame & collides with A at B
48 CSMA with Collision Avoidance (RTS/CTS) (a) B RTS C A requests to send (b) CTS B A CTS C B announces A ok to send (c) Data Frame A sends B C remains quiet
49 CSMA/CA (optional) RTS Data Source SIFS CTS SIFS SIFS Ack Destination DIFS NAV (RTS) Other NAV (CTS) NAV (Data) Defer access
50 50 VoIP Capacity in a mesh network VoIP calls (G.279) MP MP MP MP Single channel 2 Mbps Channel Contention (MAC) hidden nodes D. Niculescu. S. Ganguly, K. Kim, R. Izmailov; Performance of VoIP in a Wireless Mesh Network. IEEE Infocom 2006, Barcelona, Spain.
51 51 VoIP Capacity in a mesh network VoIP calls A MP MP MP MP Multiple channels (Two channels) Channel Contention (MAC) hidden nodes VoIP calls B MP MP MP MP NO Channel Contention (MAC) NO hidden nodes Multiple channels (Three channels)
52 VoIP Capacity in a mesh network D. Niculescu. S. Ganguly, K. Kim, R. Izmailov; Performance of VoIP in a Wireless Mesh Network. IEEE Infocom 2006, Barcelona, Spain. 52
B. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More informationMobile Communication Networks. (Intro) Wireless Local Area Networks
(Intro) Wireless Local Area Networks Boris Bellalta Part of the material has been obtained from: Leon Garciat et al.; Communication Networks. Fundamental Concepts and Key architectures McGraw Hill, 2/e
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationCollision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks
International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationCall Admission Control for IEEE Contention Access Mechanism
Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:
More informationQuality of Service (QoS) Settings on AP541N Access Point
Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:
More informationEfficient Transmission of H.264 Video over WLANs
Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationA Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs
Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013
More informationCHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)
92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationCertified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationDuck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract
Performance Enhancement of Multi-Rate IEEE 802. WLANs with Geographically-Scattered Stations Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE Abstract
More informationEDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS
EDCA LIMITATION WITH HIGH TRAFFIC REAL TIME APPLICATIONS 1 AHMED ABU-KHADRAH, 2 ZAHRILADHA ZAKARIA, 3 MOHDAZLISHAH OTHMAN 1,2,3 Centre for Telecommunication Research and Innovation (CeTRI), Faculty of
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationModeling and Simulating Packet Dispersion in Wireless Networks
Worcester Polytechnic Institute Digital WPI Computer Science Faculty Publications Department of Computer Science 6 Modeling and Simulating Packet Dispersion in Wireless 8. Networks Mingzhe Li Worcester
More informationAn energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange
An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange Raúl Palacios, Fabrizio Granelli University of Trento Trento,
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationOptimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate e WLANs: Test-bed Implementation and Evaluation
Optimal CWmin Selection for Achieving Proportional Fairness in Multi-Rate 80.11e WLANs: Test-bed Implementation and Evaluation Vasilios A. Siris and George Stamatakis Institute of Computer Science, FORTH
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationPerformance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator
Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationMassive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications
Massive Random Access: Fundamental Limits, Optimal Design, and Applications to M2M Communications Lin Dai Department of Electronic Engineering City University of Hong Kong lindai@cityu.edu.hk March, 2018
More informationTable of Contents 1 WLAN QoS Configuration 1-1
Table of Contents 1 WLAN QoS Configuration 1-1 WLAN QoS Overview 1-1 Terminology 1-1 WMM Protocol Overview 1-2 Protocols and Standards 1-4 WMM Configuration 1-4 Configuration Prerequisites 1-4 Configuring
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationAnalysis of the Distribution of the Backoff Delay in DCF: A Step Towards End-to-end Delay Guarantees in WLANs
Analysis of the Distribution of the Backoff Delay in 802.11 DCF: A Step Towards End-to-end Delay Guarantees in WLANs Albert Banchs Universidad Carlos III de Madrid banchs@it.uc3m.es Outline I. The Daidalos
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationPLUS-DAC: An Admission Control Scheme for IEEE e Wireless LANs
PLUS-DAC: An Admission Control Scheme for IEEE 802.11e Wireless LANs KIRAN KUMAR GAVINI Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay M Tech. Project Presentation
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More informationWireless Network and Mobility
Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:
More informationADAPTIVE ADMISSION CONTROL MECHANISM FOR IEEE E WLANS
ADAPTIVE ADMISSION CONTROL MECHANISM FOR IEEE 82.11E WLANS Cristina Cano, Boris Bellalta, Miquel Oliver NETS Research Group - Universitat Pompeu Fabra (UPF) Passeig de la Circumval.lació No. 8, PC: 83
More informationDesign and analysis of MAC protocols for wireless networks
Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd
More informationDynamic Rate Adaptation in IEEE WLANs
Dynamic Rate Adaptation in IEEE 802.11 WLANs SongYiLin@ICT August 10, 2008 References [1] On the Performance Characteristics of WLANs: Revisited (SIGMETRICS 2005) [2] CARA: Collision-Aware Rate Adaptation
More informationAnalysis of the IEEE e EDCA Under Statistical Traffic
Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University
More informationA Call Admission Control Scheme for Multimedia. Support Over IEEE Wireless LANs
A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs Kauthale S. M., V. R. Chirchi & Dhone M. B. Dept. of CSE., MBES College of Engineering Ambajogai-431517, India Dept,
More informationCTS-to-self as a Protection Mechanism for the No Acknowledgment Protocol in VoIP WLANs
Contemporary Engineering Sciences, Vol. 11, 2018, no. 29, 1421-1435 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ces.2018.84136 CTS-to-self as a Protection Mechanism for the No Acknowledgment
More informationModeling and Analysis of TCP Dynamics over IEEE WLAN
Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationCross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks
Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Gabriel Lazar, Virgil Dobrota, Member, IEEE, Tudor Blaga, Member, IEEE 1 Agenda I. Introduction II. Reliable Multimedia
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationPage 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation
EEC173B/ECS152C, Spring 2009 Wireless LAN or Cellular Networks Wireless Mesh Networks Introduction Flow Control Issues Rate Adaptation Access point Infrastructure Network (Internet) PSTN Network Base station
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationMulti-Rated Packet Transmission Scheme for IEEE WLAN Networks
Multi-Rated Packet Transmission Scheme for IEEE 802.11 WLAN Networks Namgi Kim Telecommunication R&D Center, Samsung Electronics, 416, Maetan-3, Youngtong, Suwon, Kyounggi, 442-600, Korea namgi.kim@samsung.com
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN
More informationLink Layer. (continued)
Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationEBA: An Enhancement of IEEE DCF via Distributed Reservation
EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationTHE ANALYSIS OF BURST PACKET LOSSES IN SATURATED AD HOC NETWORKS USING SEMI-MARKOV PROCESS. A Thesis by. Samir Sharma
THE ANALYSIS OF BURST PACKET LOSSES IN SATURATED AD HOC NETWORKS USING SEMI-MARKOV PROCESS A Thesis by Samir Sharma Bachelor of Engineering, Kathmandu University, 2006 Submitted to the Department of Electrical
More informationDistributed Delay Estimation and Call Admission Control in IEEE WLANs
Distributed Delay Estimation and Call Admission Control in IEEE 82.11 WLANs Kenta Yasukawa 1 Department of Communications and Integrated Systems Tokyo Institute of Technology knt@net.ss.titech.ac.jp Andrea
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationInfrastructure CSMA/CA Network With Multiple Service Classes
Traffic and QoS Analysis of an Infrastructure CSMA/CA Network With Multiple Service Classes Ritabrata Roy December 13, 2002 Abstract This treatise aims at analysing a CSMS/CA network operating in an access
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationAnalytical Models for Capacity Estimation of IEEE WLANs using DCF for Internet Applications
1 Analytical Models for Capacity Estimation of IEEE 82.11 WLANs using DCF for Internet Applications George Kuriakose, Sri Harsha, Anurag Kumar and Vinod Sharma Abstract We provide analytical models for
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationQoS issues in Wi-Fi-WMM based triple play home networks
QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationHands-On Exercises: IEEE Standard
Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks
ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798
More informationPerformance Evaluation of IEEE e
Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput
More informationUsing Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks
Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University
More informationWireless & Mobile Networking
Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free
More information