A Study of Short-Term Fairness. in Wireless MAC Protocols. Andrew Swan and Suchitra Raman. May 11, 1998.

Size: px
Start display at page:

Download "A Study of Short-Term Fairness. in Wireless MAC Protocols. Andrew Swan and Suchitra Raman. May 11, 1998."

Transcription

1 A Study of Short-Term Fairness in Wireless MAC Protocols Andrew Swan and Suchitra Raman May 11, 1998 Abstract In this paper, we study short-term fairness in distributed, contention-based wireless medium access control (MAC) protocols. While most MAC protocols provide fairness among contending stations in the long term, they are not fair over shorter time scales. We rst demonstrate short-term unfairness of CSMA/CA using packet-level traces collected from an in-bulding wireless LAN network. We also analyze these traces and show adverse interactions between TCP and CSMA/CA. We then model the system of contending stations as a Markov chain and dene the short-term fairness index for this model as the zeroth-order entropy rate of the underlying stochastic process. We argue that because this quantity is a good measure of uncertainty in channel accesses, it models short-term fairness well. We solve the analytical model for a CSMA/CA-based system with dierent numbers of stations and conclude that its short-term fairness is signicantly lower than ideal. 1 Introduction The recent emergence of wireless networks has enabled many exciting new applications, but also brings with it new and challenging research problems. Some of these problems include protocol and application design for networks with non-negligible bit-error rates and asymmetry [1], providing transparent connectivity and services to mobile users [7], and managing limited resources in small portable devices[11]. An area that has received comparatively little attention is media access protocols for shared wireless channels. The problem of shared media access has been studied extensively on wired networks. In the Carrier Sense Multiple Access (CSMA) family of media access control (MAC) protocols, a station listens to the channel and determines if it is being used before starting a transmission. With basic CSMA, there is no guarantee that simultaneous tranmissions from dierent stations will not \collide", or interfere with each other in such a way that neither transmission succeeds. To resolve collisions in wired networks such as Ethernet, CSMA can be augmented with Collision Detection (CSMA/CD). In CSMA/CD, a transmitting station continues to listen to the channel during its transmission and is able to detect a collision because it can hear transmissions from all other stations sharing the channel. If a collision is detected, the transmitting stations wait a randomized short period of time and transmit again. One of the challenges in designing a media access control (MAC) protocol for a wireless network is the hidden terminal problem. The hidden terminal problem is actually a class of problems, all of which result from the fact that all devices connected to a single wireless LAN may not be able to communicate directly with each other over the wireless channel. Due to the hidden terminal problem, CSMA/CD is not suitable for wireless networks. As a result, CSMA with Collision Avoidance (CSMA/CA) has been proposed for wireless networks. In CSMA/CA, a transmitting station may not be able to determine that a collision has taken place. While CSMA/CA does not have a provision for re-transmissions they must be handled by a higher level protocol it does attempt to reduce the likelihood of collisions. In order to do this, a station that has transmitted waits some period of time before attempting to transmit again. This time is called the Inter-Frame Spacing (IFS). In both CSMA/CA and CSMA/CD, a station that must wait to transmit (due to either a collision or a busy carrier sense) uses a randomized timer. In an attempt to avoid collisions, the interval from which the timer is 1

2 chosen is backed o exponentially upon every collision or busy carrier sense. While this policy achieves high utilization of the channel by reducing the frequency of collisions, it leads to short-term unfairness. When multiple stations attempt to transmit simultaneously, one station will transmit successfully and the others will all back o. After the rst transmission is completed, there is a \timer race" all stations have set timers and the station whose timer expires rst will get access to the channel next. Since all other stations have backed their timers o, they are less likely to win the timer race, so they continue to back o. The interval over which the timer is chosen is typically bounded to prevent a station from getting completely starved, but it is still easy for a station to become completely backed o at which point its chance of winning the timer race is very small. Other recent research in the eld of wireless MAC protocols has proposed layering new mechanisms on top of CSMA/CA to provide fairness. Although such approaches are promising, we are not aware of any detailed study of the fairness properties of CSMA/CA alone to provide context for enhancements to it. In the rest of this paper, we carry out such a study. In the next section, we present the results of a series of experiments we carried out to observe the problem of short-term unfairness in real wireless networks. We present an analytical study of the short-term fairness properties of CSMA/CA in Section 3. In Section 4, we validate our analytical model with our experimental results. We conclude with a summary in Section 5. 2 Experiments We present experimental evidence of short-term unfairness in CSMA/CA-based systems from experiments on the Daedalus in-building wireless LAN testbed [6]. This wireless network uses Lucent's WaveLAN technology [12] that uses direct sequence spread spectrum (DSSS) modulation to meet the regulatory requirements for unlicensed usage in the 915 MHz ISM frequency band. WaveLAN has a rated data bandwidth of about 2 Mb/s and uses CSMA/CA as the channel access protocol. In this section, we analyze the short-term fairness properties from packet-level traces collected in our testbed. Traces were gathered using the tcpdump [5] packet capture tool running on a host connected to the same LAN. We perform two sets of experiments. The rst set involves multiple UDP [8] senders that always have data ready to transmit. This experiment allows us to analyze the exact channel access patterns for identical senders. In the second set of eperiments, we look at the eects of short-term unfairness on TCP [9] transfers. Our measurements show that CSMA does not eectively prevent a single host or small group of hosts from monopolizing the channel for several packet transmission times. Competing UDP transfers. Using two competing UDP transfers between distinct pairs of hosts as shown in Figure 1, we studied the channel access pattern of the two senders. Both the UDP senders were congured to transmit at 200 Kbps using 512B packets. Figure 2 shows the channel access pattern with two UDP senders. We nd that each host \captures" the channel for prolonged durations even though the other host has data ready for transmission. This causes each sender to burst out data when it does gain access to the channel. Since increased burstiness results in increased jitter in packet delays as perceived by the receiver, jitter is an approximate indication of short-term unfairness. Table 1 summarizes the packet arrival jitter at the receiving host. The jitter was computed over all correctly received packets 1 at the receiver as the mean linear deviation in packet transit time or delay. Jitter = nx i=1 j(r i+1? S i+1 )? (R i? S i )j where S i and R i are the sending and receiving times of packet i. As the number of competing UDP transfers is increased to 3 or 4, we nd that each host captures the channel for progressively smaller periods of time. However, we do still observe signicantly long intervals of time when one station does not gain access to the channel as shown in Figures 3 and 4. 1 We do not include dierences in transit delay between non-contiguous packets. 2

3 Sender Receiver Total transmitted Total received Jitter (packets) (packets) (ms) yacht-wl ajanta-wl cruiser-wl inr-daedalus Table 1: Two competing UDP transfers at 200 Kbps using 512B packets. In all these experiments, the long-range fairness over the entire duration of the transfer is close to ideal. We report the values of Jain's long-term fairness index [3] in all these cases in Table 2. S 1 Packet capture S 2 UDP transfer #1 Wireless LAN UDP transfer #2 R 1 R 2 Figure 1: Experimental setup for fairness experiments showing two identical contending UDP transfers. Yacht-wl Cruiser-wl yacht-wl cruiser-wl Elapsed time (s) Figure 2: With two competing UDP transfers in which both sources always had data to send, each source \captures" the channel for a prolonged period of time before the other station gains access. Single TCP connection. We studied the progress of a single TCP connection between two hosts connected over a single-hop Wave- LAN network. The TCP sequence plot for this transfer in Figure 6 shows that the sender is extremely bursty. The sender and receiver take turns monopolizing the wireless channel. The sender eectively transmits a full window of data, yielding the channel to the receiver. On gaining access, the receiver transmits a burst of ACKs that subsequently triggers the next window of data. This adverse interaction causes the \pipe" to remain under-utilized resulting in low TCP throughputs. In fact, the smooth ACK-clocked TCP protocol degenerates to a window-by-window stop and wait protocol. A similar eect was also reported in 3

4 Channel access cruiser-wl inr-daedalus-192 ajanta-wl Elapsed time (s) Figure 3: The channel access pattern with 3 UDP senders shows shorter capture periods. However, there are signicantly long durations in which one host does not gain access. Channel access yacht-wl cruiser-wl inr-daedalus-192 ajanta-wl Elapsed time (s) Figure 4: The channel access pattern with 4 UDP senders. CSMA/CD-based Ethernets [10]. In summary, while CSMA/CA is asymptotically fair, it is unfair over short time scales. This short-term unfairness leads to undesirable eects in feedback-based protocols such as TCP. While good metrics (e.g., minmax fairness index) exist to quantify long-term fairness, there is no quantitative metric for short-term fairness. Our goal, in the rest of this paper, is to model short-term fairness accurately. 3 Analysis of CSMA/CA In this section we present an analysis of the fairness properties of a simple CSMA/CA MAC protocol. 4

5 # Hosts Jain's fairness index Table 2: Min-max fairness is close to ideal (1.00) in all cases. S 1 Packet capture TCP transfer Wireless LAN R 1 Figure 5: A Single TCP connection across a wireless link ACK Data Sequence Number Elapsed time (s) Figure 6: The TCP sequence plot for a transfer between two hosts shows that there is no ne-grained sharing of the channel by the sender and receiver. The sender transmits a window of data in a single burst and waits for the receiver transmit a burst of ACKs that in turn trigger the sender, and so on. The result is long idle periods and low TCP throughput. 3.1 A Model for CSMA/CA We use a model for CSMA/CA based on the the Lucent WaveLAN wireless LAN system [12]. The model is as follows. Time is divided in to discrete slots. A transmission can begin only at the start of a new slot. The actual MAC protocol may not actually use a slotted time structure, but a slotted system is much easier to analyze while producing similar results. When a station wishes to transmit a packet, it rst performs a carrier sense. That is, it listens to the channel to determine if another station is currently transmitting. If it nds the channel idle, it proceeds 5

6 with the transmission at the beginning of the next time slot. If the channel is busy, the station waits until the transmission ends and then sets a timer, called the backo timer. When this timer expires, it conducts another carrier sense and repeats the procedure described above. The backo timer is randomized so that if two stations are attempting to transmit simultaneously, they will not remain synchronized in a state where neither can send. The length of the timer is initially chosen from a uniform distribution over the range [1; 32] slots. Every time a station senses a busy channel and has to wait for a transmission to complete, the range from which the timer is chosen is doubled. That is, after sensing a busy channel, the next timer is chosen uniformly from the range [1; 64], then [1; 128], and so on. To avoid starvation, the range never grows beyond [1; 256]. If a station concludes a sucessful transmission and has more packets to transmit, it waits for 16 slots before performing a carrier sense. This interval is called the Inter-Frame Spacing (IFS). We consider only the basic contention resolution protocol and not mechanisms such as RTS/CTS exchange or control protocols implemented in a base station [2]. While such mechanisms are often considered part of a MAC protocol, they are orthogonal to the study of fairness. We also don't consider the hidden-terminal problem since it is also orthogonal to fairness. 3.2 Analysis In our analysis, we consider a wireless LAN in which N stations attempt to transmit simultaneously. We assume that each station always has a packet to transmit. Since the basic CSMA contention algorithm is symmetric (i.e., each host executes the same algorithm) and there are mechanisms to prevent starvation, it provides fairness over suciently long time scales. That is, over a suciently long time scale, all hosts will receive roughly equal access to the channel (this claim is conrmed by the experimental results presented in Section 2). However, we are concerned with fairness over shorter time scales. A MAC protocol that provides long-term fairness but does not provide short-term fairness will interact poorly with higher level protocols. An example of such an interaction is illustrated for TCP in Figure 6. An application that transmits isochronous audio packets would also work very poorly if run over a MAC protocol with poor short-term fairness. Without short-term fairness, the receiver would see very high jitter (or variance in delay) of the incoming audio stream. While this problem can be mitigated by buering the incoming stream, buering makes it dicult to use such an application interactively. To evaluate the fairness properties of CSMA/CA over short time scales, we consider the random process fx i g where the index i refers to the ith successful transmission over the channel. Specically, we consider the entropy rate of this process, H(fX i g). The entropy rate of a random process measures the entropy per symbol and is dened as follows [4]. 1 H(fX i g) = lim n!1 n H(X 1; X 2 ; : : : ; X n ) Entropy quanties the uncertainty in a random variable. In a MAC protocol that relies only on randomization to provide fairness, the entropy rate of the process described above provides a reasonable measure of the protocol fairness. If there is a lot of uncertainty about which station will access the channel, that implies that all stations are competing fairly for the channel. Similarly, if there is little or no uncertainty about which station will access the channel, some station or stations do not get to compete fairly for the channel. For a random process in which each element is drawn from a discrete set of size N, the maximal entropy rate is attained by a process in which each value is independent and chosen uniformly. This process has an entropy rate of log N 2. Note that the entropy maximizing process described above correponds to an ideal fair MAC protocol. We can thus evaluate the fairness of a completely randomized MAC protocol by calculating H(fX i g) and comparing it 2 All logarithms in this paper are taken with a base of 2 6

7 to log N. This technique has limits: it is eective only for a MAC protocol that relies only on randomization for fairness. For example, applying this analysis to a MAC protocol based purely on Time Division Multiple Access (TDMA) would yield an entropy rate of 0; the channel access pattern is completely deterministic so there is no uncertainty. We begin by analyzing the case where N = 2 and then continue to the general case The N = 2 Case After every successful transmission, a station may be in one of ve states: It is the station that conducted the last transmission. We label this state T. It did not transmit the last packet. It thus chooses a timer uniformly from some interval. There are four of these states and we label them based on the size of the interval from which the timer is chosen: 32; 64; 128; 256. The state of the whole system includes the states of both stations. As illustrated in Figure 7, only 8 of the possible 25 combinations of states for the two stations are possible. These states form a Markov chain since the probability of a transition from one state to another depends only on what the current state is. {T,256} {256,T} {T,128} {128,T} {T, 64} {64, T} {T, 32} {32, T} Figure 7: State transition diagram for N = 2. Transitions on the right side are not shown but are equivalent to those on the left side. From a state ft; xg, there are two possible transitions, to states ft; next(x)g and f32; Tg, where next(x) = min(2x; 256). Note that states fx; Tg are equivalent to corresponding states ft; xg, with identical transitions and transition probabilities. The transition probabilities are straightforward to compute: ft; xg! ft; next(x)g This transition corresponds to the station that just transmitted transmitting again. This occurs when the randomized timer, which is drawn from a uniform distribution on [1; x], happens to be longer than 16 slots. This event has probability P ft;xg;ft;next(x)g = 1? 16 x ft; xg! f32; Tg This transition corresponds to the host that did not just transmit transmitting. This occurs when the 7

8 randomized timer is shorter than 16 slots, which happens with probability P ft;xg;f32;tg = 16 x State Probability ft;32g ft;64g ft;128g ft;256g f32;tg f64;tg f128;tg f256;tg Table 3: Steady-state probabilties of the Markov Chain for CSMA with N = 2. From these transition probabilities, it is straightforward to calculate the stationary distribution of the Markov chain. The steady-state probabilities are shown in Table 3. Even before calculating the entropy rate, we can see evidence of unfairness. The system spends nearly 75% of the time in a state in which one station is fully backed o (there are two such states, labeled ft;256g and f256;tg in Table 3). We can now calculate the entropy rate of the random process fx i g. For the case with only two stations, each state has only two out transitions, one of which correponds to the same station transmitting again, while the other corresponds to a change in the transmitting station. X As a result, the entropy rate is easily calculated: H(fX i g) = s h(p s ) statess where P s is the probability of the same station transmitting again from state s and h(p) is the entropy of a Bernoulli random variable with parameter p: h(p) =?p log p? (1? p) log(1? p) Combining the steady-state probabilities from Table 3 and the transition probabilities calculated above, we calculate that for N = 2, H(fX i g) = 0:474 Recall that a fair protocol for two stations would have H(fX i g) = The General Case As in the N = 2 case, each station may be in one of ve states after a transmission. These states are, as before, labeled T; 32; 64; 128; 256. The state of the system as a whole consists of an N-tuple of such states. Again, only a small fraction of the 5 N possible states are actually attainable (e.g., the state ft; T; : : :; Tg is invalid). From any state, there are N transitions, one for each station that might successfully transmit (including the station that just transmitted). The transition probabilities are calculated as follows. Note that we only consider transitions in which the rst station transmits. Permuting the ordering of stations does not aect the transition probabilities so we cover all transitions. (For example, if N = 3, the transitions ft; 32; 256g! f32; 64; Tg and f256; T; 32g! ft; 32; 64g have the same probabilties). There are two types of transitions with the following transition probabilities: ft; x 2 ; : : : ; x N g! ft; next(x 2 ); : : : ; next(x N )g This transition corresponds to another transmission by the station that just transmitted. This occurs when 8

9 the randomized timers of stations 2 through N are all longer than 16 slots. Let T i be the length of the timer at station i (i.e., T i is a realization of a random variable drawn from a uniform distribution ver the interval [1; x i ]). Since the randomization at a station is independent of all other stations: P(fT; x 2 ; : : :; x N g! ft; next(x + 2); : : :; next(x N )g) = P(T 2 > 16; T 3 > 16; ; T N > 16) = = Y Y 2iN 2iN P(T i > 16) (1? 16 ) x i fx 1 ; x 2 ; : : : ; x N?1; Tg! ft; next(x 2 ); : : : ; next(x N?1); 32g This transition occurs when station 1 transmits a packet after station N transmitted the previous packet. Station 1's randomized timer must be less than 16 slots (so that it transmits before station N) and also shorter than the randomized timers of stations 2 through N? 1. The transition probability is calculated as follows: P(fx 1 ; x 2 ; : : : ; x N?1; Tg! ft; next(x 2 ); : : : ; next(x N?1); 32g) = P(T 1 < 16; T 1 < T 2 ; T 1 < T 3 ; ; T 1 < T N?1) = P(T 1 < 16) = 16 x 1 Y 2iN?1 Y 2iN?1 (1? 8 x i ) P(T 1 < T i jt 1 < 16) From these transition probabilities, it is straightforward to generate the full state diagram with all transitions. However, as N grows, the number of states grows rapidly. We wrote a script to generate the linear equations that must be solved to calculate the stationary distribution and calculated the stationary distributions for values of N up to 6. We then use the same technique as above to calculate the entropy rate of the random process fx i g: X H(fX i g) = s H(P s ) statess Note that in this case, P s is a probability distribution dened over a discrete set of size N, rather than simply a Bernoulli random variable as before. The entropy for a probability distribution P over a discrete set of size N is dened as: The complete results are shown in Table 4. H(P ) =? NX i=1 P (i) log P (i) N H(fX i g) log N Table 4: Entropy rate for the random process fx i g. For a completely fair MAC protocol, H(fX i g) = log N. 9

10 4 Discussion To validate our theoretical model for CSMA and the analysis carried out in Section 3, we calculated the empirical entropy rate of the actual sequences of transmission observed on a real wireless LAN. The traces we examined are those illustraed in Section 2. The results are summarized in Table 5. Entropy Rate N Theoretical Empirical N/A Table 5: Predicted and measured entropy rates. For reasons we do not yet understand, we were unable to calculate the stationary distribution for the N = 4 case. We used Mathematica for the step that involves solving a system of linear equations but although it could solve the more complex systems correponding to N = 5 and N = 6, it could not solve the system for N = 4. We plan to investigate this problem more thoroughly. We rst examined the trace illustrated in Figure 2. In this trace, two stations transmitted UDP ows across a shared channel for a period of 13 seconds. Over the full 13 seconds, the MAC protocol provided reasonable fairness one host successfully transmitted 984 packets while the other transmitted 992 packets. However, there is ample evidence of short-term unfairness in Figure 2. To quantify this unfairness, we calculated the empirical entropy rate to compare it to the theoretical rate calculated previously. As shown in Table 5, the theoretical prediction matched the empirically observed entropy very well. For traces with more hosts, we observed a trend that the empirical fairness is smaller than the entropy rate predicted by our theoretical model. We did not have time to study this eect in detail but we conjecture that it is due to a bug in the MAC protocol implementation in the WaveLAN adapters used in our experiments. For all our experiments, we used older ISA based WaveLAN cards; we plan to repeat the experiments with newer PCMCIA based WaveLAN cards to see if the bug has been identied and xed. 5 Summary In this paper we have presented a detailed study of the short-term fairness properties of CSMA/CA. Our study includes both experimental results that demonstrate that a popular CSMA/CA based wireless LAN system exhibits short-term unfairness and an analytical framework for evaluating CSMA/CA. Our results indicate that short-term fairness is poor in CSMA/CA and provides a context for other MAC protocol research that addresses fairness. 6 Acknowledgements We would like to thank Hari Balakrishnan for suggesting this very interesting topic to us and advising us on this project. References [1] Balakrishnan, H., Padmanabhan, V., Seshan, S., and Katz, R. H. A Comparison of Mechanisms for Improving TCP Performance over Wireless Links. IEEE/ACM Transactions on Networking (December 1997). [2] Bharghavan, V. A New Protocol for Medium Access in Wireless Packet Networks. In University of Illinois, Urbana-Champaign Tech. Report. (1998). [3] Chiu, D.-M., and Jain, R. Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks. Computer Networks and ISDN Systems 17 (1989), 1{14. 10

11 [4] Cover, T. M., and Thomas, J. A. Elements of Information Theory. John Wiley & Sons, Inc., [5] Jacobson, V., Leres, C., and McCanne, S. TCPDUMP(1). Available via anonymous ftp to ftp.ee.lbl.gov, June [6] Katz, R. H., et al. The Bay Area Research Wireless Access Network(BARWAN). In Proceedings of the Spring COMPCON Conference (San Jose, CA, 1996). [7] Myles, A., Johnson, D. B., and Perkins, C. A Mobile Host Protocol Supporting Route Optimization and Authentication. IEEE Journal on Selected Areas in Communications 13, 5 (June 1995), 839{849. [8] Postel, J. B. User Datagram Protocol. RFC, ISI, Los Angeles, CA, RFC-768. [9] Postel, J. B. Transmission Control Protocol. SRI International, Menlo Park, CA, Aug RFC-793. [10] Ramakrishnan, K. K., and Yang, H. The Ethernet Capture Eect: Analysis and Solution. In Proceedings of 19th IEEE Conference on Local Computer Networks (MN, Oct. 1994). [11] Weiser, M. Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM 36, 7 (July 1993), 74{84. [12] The WaveLAN Home Page

ACK Data B Sequence Number. Station Elapsed time (s) Time (sec)

ACK Data B Sequence Number. Station Elapsed time (s) Time (sec) An Analysis of Short-Term Fairness in Wireless Media Access Protocols Can Emre Koksal, Hisham Kassab, and Hari Balakrishnan Massachusetts Institute of Technology fhari,hans,emreg@mit.edu Abstract We investigate

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

SHORT-TERM FAIRNESS OF NETWORKS WITH SEVERAL HOSTS

SHORT-TERM FAIRNESS OF NETWORKS WITH SEVERAL HOSTS SHORT-TERM FAIRNESS OF 802.11 NETWORKS WITH SEVERAL HOSTS Gilles Berger-Sabbatel, Andrzej Duda, Martin Heusse, and Franck Rousseau LSR-IMA G Laboratory Grenoble, France "Cgberger, duda, heusse, rousseauj@imag.fr

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Lecture 17: Wireless Networking"

Lecture 17: Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Backbone Router. Base Station. Fixed Terminal. Wireless Terminal. Fixed Terminal. Base Station. Backbone Router. Wireless Terminal. time.

Backbone Router. Base Station. Fixed Terminal. Wireless Terminal. Fixed Terminal. Base Station. Backbone Router. Wireless Terminal. time. Combining Transport Layer and Link Layer Mechanisms for Transparent QoS Support of IP based Applications Georg Carle +, Frank H.P. Fitzek, Adam Wolisz + Technical University Berlin, Sekr. FT-2, Einsteinufer

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information