MASTaR: MAC Protocol for Access Points in Simultaneous Transmit and Receive Mode

Size: px
Start display at page:

Download "MASTaR: MAC Protocol for Access Points in Simultaneous Transmit and Receive Mode"

Transcription

1 MASTaR: MAC Protocol for Access Points in Simultaneous Transmit and Receive Mode Seongwon Kim, Chan-Byoung Chae, and Sunghyun Choi Department of Electrical and Computer Engineering and INMC, Seoul National University, Korea School of Integrated Technology, Yonsei University, Korea Abstract In-band simultaneous transmit and receive (STR) is expected to increase the efficiency of wireless local area network (WLAN). A major obstacle to implementing STR capability, however, has been insufficient suppression of self-interference. In addition, tackling several problems will require modifications to the current IEEE medium access control (MAC) protocol. In this paper, we propose MASTaR, a novel MAC protocol supporting STR in WLAN, backward compatible with legacy The performance of MASTaR is extensively evaluated via ns-3 simulation. The simulation results demonstrate that significant performance enhancement can be achieved in the current WLANs by an access point (AP) with STR capability and a properly designed MAC protocol. Index Terms IEEE WLAN, medium access control (MAC) protocol, in-band simultaneous transmit and receive (STR), full duplex, scheduling. I. INTRODUCTION The ability of a node to successfully receive signals from another node while transmitting signals to that same node or to other nodes is referred to as in-band simultanous transmit and receive (STR), a.k.a. in-band full duplex. In-band STR is considered a promising technology to increase network capacity in wireless communication systems including IEEE wireless local area network (WLAN) [1]. The main challenge, however, for realizing in-band STR in practice has been self-interference (SI). For a successful reception during transmission, a node should be capable of cancelling or suppressing the SI to the level of noise floor. This capability is known as self-interference cancellation (SIC). Without perfect SIC, the achievable capacity of in-band STR is restricted to less than the full-duplex limit. How SIC may be brought to real radios has been studied in [2 5]. According to the nodes engaged in a STR transmission, the transmission is classified into a symmetric mode and an asymmetric mode. In the symmetric mode, two nodes transmit and receive signals to/from each other simultaneously as shown in Fig. 1(a). On the other hand, in the asymmetric mode, a node transmits and receives to/from different nodes as shown in Fig. 1(b). The node that initiates a transmission primary transmission is called the primary transmitter (PTX); and the corresponding receiver is called the primary receiver (PRX). Similarly, the transmitter and receiver of a subsequent transmission the secondary transmission are called the secondary transmitter (STX) and secondary receiver (SRX). In Fig. 1(b), for instance, if transmits first and AP AP (a) Symmetric mode PTX PRX/STX AP (b) Asymmetric mode Fig. 1. Operational modes of STR in WLANs. SRX subsequently transmits, {PTX, PRX, STX, SRX}={, AP, AP, }. In IEEE WLAN, the asymmetric mode is more feasible because STR capability is not easily implemented in mobile stations, especially small devices such as smartphones. What is more likely, however, to become capable of STR are access points (APs). APs are relatively large and exhibit high performance. Our consideration in this work, therefore, is limited to the asymmetric mode for better feasibility and practicality. On the other hand, to support STR in IEEE WLANs there is needed a modification to medium access control (MAC) protocol. To bring STR to the current IEEE MAC protocol, the following problems should be addressed: 1) With carrier sense multiple access with collision avoidance (CSMA/CA) based channel access, a node that can simultaneously transmit on a busy channel cannot access the channel since its channel status is indicated as BUSY. 2) The current Acknowledgement (ACK) mechanism faces a new problem. Assuming that, in Fig. 1(b), finishes its transmission earlier than AP, ACK timeout happens because AP cannot send ACK due to its ongoing data transmission to. 3) If PTX causes significant interference to SRX in an asymmetric mode, the secondary transmission fails due to low received signal-to-interference-plus-noise ratio (SINR). There is also a fairness issue on the inter-frame spacing (IFS) setting and a backward compatibility issue on network allocating vector (NAV) setting as discussed in [6]. Accordingly, many studies have developed a new WLAN MAC protocol. Proposed in [7] is a centralized MAC protocol scheduling both UL and DL transmissions based on conflict map. Due to the nature of centralized protocol, considerable modifications must be made to the current behavior of WLANs, which generally operate in a distributed manner. Distributed approaches focusing on symmetric modes are proposed in [8 13]. The proposed protocols in [8, 9] enable /16/$ IEEE

2 Decision to adapt transmit (Tx) power block Block Ack Exchange request frame Element ID Length Link margin calculation report frame Element ID Length Tx power Link margin Ack policy = Block Ack S I F S Protocol AP Fig. 2. IEEE h procedure. STR in WLAN based on collision avoidance (by utilizing RTS/CTS) and collision detection (by embedding pseudo noise sequence in preamble), respectively. Proposed in [10 13] are MAC protocols that consider the asymmetric modes. Modified RTS/CTS [10, 11], orthogonal frequency division multiple access (OFDMA)-based on busy tone [12], and power-controlled pseudo noise signature [13] are used to arrange simultaneous transmissions. Those approaches, however, are not compatible with legacy devices. In this paper, we propose a novel MAC protocol for APs supporting STR in WLANs, named MASTaR (MAC protocol for Access points in Simultaneous Transmit and Receive mode). MASTaR solves the aforementioned problems by enabling (i) access to a busy channel after identifying PTX, (ii) bit padding and explicit block ACK, and (iii) transmission scheduling based on link map. The three key components solve the first, second, and third problems mentioned above, respectively. As designed based on the current IEEE standard, moreover, MASTaR s main advantage is compatibility with legacy devices. To the best of our knowledge, this is the first standard-compliant STR MAC protocol in IEEE WLANs, supporting asymmetric mode with legacy STAs. The rest of the paper is organized as follows. In Section II, we introduce IEEE functions utilized in the proposed protocol. In Section III, we present detailed operation of MASTaR. Its performance is evaluated in Section IV. Section V concludes the paper. II. PRELIMINARIES We first introduce preliminary IEEE functions and RF capability, which are utilized in the proposed protocol. A. IEEE h Transmit Power Control () IEEE h is the amendment for spectrum and transmit power management extensions. Within the amendment,, which was originally designed to satisfy maximum transmit power regulation, provides a procedure for a client station (STA) to notify its link margin to the associated AP. As shown in Fig. 2, an AP triggers the procedure by sending a request frame to its STA. Upon the request reception, the STA sends a report frame conveying the STA s link margin information. According to the standard, a STA s link margin is defined as the ratio of the received STA Fig. 3. Explicit block ACK procedure. signal strength of the corresponding request frame to the minimum desired signal strength by the STA. The specific algorithm for computing the link margin is implementation dependent. For example, link margin can be computed as follows. First, with the presence of interference, link margin can be redefined as the ratio of SINR during the reception of a request frame to the desired SINR. Secondly, assuming STAs are aware of their radio frequency (RF) parameters such as receiver sensitivities and noise floor, STA i can estimate desired SINR using its RF parameters as SINR i,m = RxSens i,m NF i, (1) where SINR i,m, RxSens i,m, and NF i are STA i s desired SINR for modulation and coding scheme (MCS) m, Rx sensitivity for MCS m, and noise floor, respectively. All the above values are on the db scale. Then, STA i s link margin with the presence of the interference from STA j is calculated as λ j i,m (Received SINR) i SINR i,m, (2) We assume that the received SINR is measured by comparing the received power before and after the frame detection. B. Explicit Block ACK In baseline IEEE ACK policy, every single unicast frame should be individually acknowledged. IEEE e defines block ACK () policy which allows several data frames to be transmitted before an ACK is returned. With the explicit policy, after sending a data block, an originator sends a block ACK request (R) frame, as shown in Fig. 3. The recipient then responds to the R frame with a frame, which indicates whether each individual data frame is successfully received or not. In this way, explicit policy makes it possible for the transmitter to control when the receiver should send ACK after receiving data frames. C. Second Frame Capture In wireless networks, if more than one frame is being transmitted in the same channel, a node can receive only the strongest frame depending on the relative signal power and the arrival timings of the colliding frames. If the strongest frame arrives at the receiver later than the other frames, the successful reception of the later-arriving frame is referred to as second frame capture. It has been found that approximately 10 db signal-to-interference ratio (SIR) is required for second frame

3 Identify PTX by MAC hdr. 2 nd frame capture Request Broadcast D I F S + Backoff (a) PTX identification by MAC header Identify PTX by RTS RTS CTS 1 st frame capture D I F S + Backoff ACK policy field set to Normal ACK Report Pad (c) Broadcasting request Request Unicast Report (e) Simultaneous (implicit) Pad ACK policy field set to Block ACK R (b) PTX identification by RTS (d) Unicasting request (f) Explicit by R Fig. 4. Basic operation of MASTaR. capture [14], and commercial WLAN devices generally have the second capture capability [15]. Therefore, a later-arriving frame can be decoded if its signal strength is higher than that of an earlier arriving frame by 10 db or more. III. MASTaR: PROPOSED MAC PROTOCOL In this section, we propose a novel MAC protocol, namely MASTaR. We consider only downlink (DL) secondary transmission, i.e., AP starts a secondary transmission after identifying the transmitter of uplink (UL) transmission. 1 We assume that STR capability is implemented in only APs, and STAs are the legacy devices. 2 Based on the functions described in Section II, MASTaR consists of the following components. A. PTX Identification To initiate a secondary transmission, the STX, i.e., AP, should identify that the PTX is one of its client STAs. We propose two PTX identification methods, each for primary transmission initiated with/without RTS, respectively. For data transmission without RTS, AP peeks the MAC header of the frame on the primary transmission as shown in Fig. 4(a). 3 In a strict sense, since bit errors can occur, AP is not convinced of the PTX before checking cyclic redundancy check (CRC). However, the probability that the erroneous MAC address becomes the same as one of client STAs addresses is quite low. If the source address of primary transmission s MAC header does not agree with any of AP s client STAs, PTX identification fails and secondary transmission is not initiated thus preventing possible erroneous operations. If 1 If we modify STA devices, UL secondary transmission is also possible. 2 MASTAR can also consider the STAs with STR capability, by prioritizing the symmetric mode transmissions when it schedules secondary transmission. In the followings, however, we focus on the asymmetric mode. 3 According to IEEE ac [1], VHT-SIG-A field in PLCP header for DL frames contains partial AID which indicates individual client STA. However, for uplink frames, only basic service set ID (BSSID) is contained in VHT-SIG- A field, thus the transmitter of an uplink transmission cannot be identified by PLCP header. If the new IEEE standard defines a new PLCP header conveying transmitter identifier as suggested in [16], AP can identify PTX before decoding MAC header. the source address corresponds to one of AP s client STAs, AP initiates a secondary transmission. 4 If PTX sends RTS before its data transmission, AP can clearly identify PTX before the primary transmission, as shown in Fig. 4(b). In this case, AP schedules a secondary transmission right after CTS in order to make SRX better receive the secondary transmission by first frame capture. 5 B. Training: Link Map Management To choose the best SRX for a given PTX, AP manages link map. For each pair of STAs i and j, link map is defined as L(j, i) : (j, i) (λ j i,0, λj i,1,, λj i,m max ), i, j I, (3) where I is the set of all client STAs and m max is the maximum MCS, e.g., 7 for IEEE n with a single spatial stream. To build a link map, AP sends a request frame after the PTX identification using reference MCS, i.e., m ref. 6 Initially, the request frame is broadcast as shown in Fig. 4(c) since L(PTX, i) is empty for i. At an STA, if the signal strength of the request frame is stronger enough than the frame from PTX, the STA can receive the request frame, calculate the link margin according to the method in Section II-A, and report it via a report frame. If AP receives the report frame before the report timeout, AP estimates link margins for other MCSs and populates the link map. Since the signal power changes due to multi-path fading and the STA s mobility, link map is adapted, depending on the channel condition, as follows. Let the time when AP sends the latest request to STA i during the reception from PTX j be τ j i. AP records the signal power of PTX j at that time as S j (τ j i ), and the signal power of the corresponding 2 Since AP starts transmission during reception in this case, its self interference after only analog cancellation can saturate its automatic gain control (AGC). To prevent this, STR-enabled AP needs to conservatively set the AGC in advance so that the self interference power is within the dynamic range of its analog-to-digital converter (ADC). 5 Strictly speaking, in this case, AP s transmission is not secondary transmission since it precedes the UL transmission. 6 The required SINR of reference MCS should be low so that more STAs can receive the request frame. However, it need not to be lower than the required SIR for second frame capture, which is about 10 db.

4 report frame from STA i as S i (τ j i ). AP also keeps track of subsequent received signal power from all its client STAs, and calculates S i,srx = S i S i (τ j i ) and S j,ptx = S j S j (τ j i ), (4) where S i and S j are the recently measured signal power from STAs i and j, respectively. Then link map is updated as follows: 1) If AP i senses a primary transmission from j and the signal power satisfies S i,srx + S j,ptx thres, it unicasts the request to STA i as shown in Fig. 4(d) to update L(j, i), where thres is the update threshold on the db scale and is set to 5 db for the simulations. 2) If the value is less than the update threshold, AP i updates λ j i,m as λj i,m λj i,m + S i,srx without unicasting the request. The reason why only S i,srx is used for the link margin update in the second case is that if S i changes by S i,srx, S AP i also changes by S i,srx assuming channel reciprocity and no transmit power control at STA i. S j,ptx, on the other hand, cannot be utilized to estimate I j i, since the channel between AP and STA j and the channel between STA i and STA j are not always correlated. C. Secondary Transmission After populating the link map, AP initiates, based on the link map, secondary transmissions based on link map. Various scheduling and rate selection algorithms can be adopted for secondary transmission depending on the purpose, e.g., throughput maximization or achieving fairness, In this work, we present a simple scheduling and rate selection algorithm for reliable secondary transmission, while trying to achieve high throughput gain at the same time. Specifically, MASTaR schedules secondary transmission to an STA the link of which is the strongest with the interference from the current PTX. For a given PTX j, AP finds the best SRX w.r.t. the PTX, i.e., i = argmax i I,i j λ j i,m ref. (5) Used for the secondary transmission is the highest order of MCS satisfying λ j i,m 0. AP then aggregates multiple MAC protocol data units (MPDUs) destined to i so that the aggregated MPDU (A-MPDU) can be transmitted within the remaining duration of the primary transmission. Next, AP sends the A-MPDU with bit padding to make the secondary transmission end within the SIFS time from when the primary transmission ends. This makes the from AP to PTX be transmitted earlier than the from SRX to AP, thus enabling the first frame capture of the frame at PTX. Finally, if PTX can receive AP s with the simultaneous SRX s transmission after PTX s data transmission, i.e., λ i j 0 for data rate, AP sets ACK policy of the A- MPDU to Normal ACK, so that, as shown in Fig 4(e), both transmissions of the responding primary and secondary transmissions overlap. Otherwise, AP sets ACK policy of the A-MPDU to Block ACK, indicating an explicit mechanism TABLE 1: Simulation parameters. Parameter Description Packet size 1460-byte payload MPDU CW size CWmin = 15, CWmax = 1023 A-MPDU bound bytes, 10 ms Pathloss model TGax pathloss model [17] Fading model Jakes model (Doppler velocity= 0.1 m/s) Antenna gain 0 dbi (AP), 8.2 dbi (STA) 7 Transmit power 20 dbm (AP), 15 dbm (STA) CCA threshold 82 dbm Rate adaptation Minstrel using n MCSs as shown in Fig. 4(f). If AP is not responded to by from SRX, or the from SRX indicates that most MPDUs are not successfully received, AP unicasts the request to the SRX at the next primary transmission from the PTX to update the link map. It should be noted that, in MASTaR, STR happens when a STA wins the channel, thus starting a UL transmission. If, on the other hand, AP wins the channel, STR is not possible. Therefore, if AP uses a longer contention window (CW) than do the STAs, the probability that a STA wins the channel increases and as a result more STR opportunities are acquired. The effect of CW size on AP is studied in the following section. IV. PERFORMANCE EVALUATION In this section, we present the performance evaluation results via ns-3 simulation. For reliable simulation results, we elaborately implement STR and second frame capture capabilities in the simulator. The simulation consider a single cell environment with randomly distributed STAs within 10 m of the AP. DL and UL throughput was measured for 1 second by varying the number of STAs (N), the ratio of DL traffic source rate to total traffic source rate (DL traffic ratio), how much AP cancels SI, i.e., SIC performance (SIC), and AP s minimum size of CW (CWmin). Except for the simulation with various DL traffic ratios, each STA has both DL/UL fullybacklogged UDP traffic. Because AP cannot force STAs to use or not to use RTS, we carry out simulations for the following two scenarios: (i) no RTS scenario where STAs do not use RTS and (ii) an RTS scenario where STAs uses RTS for A- MPDU. All results are averaged out for 100 iterations and the detailed simulation parameters are described in Table 1. A. Comparison Protocols We compare MASTaR with the following three protocols: 1) HD: Current half duplex-based MAC protocol. 2) BusyTone: Transmitting busy tone during secondary transmission for hidden terminal resolution as proposed in [2]. 3) RTS/FCTS: Three-way handshake before primary transmission as proposed in [10]. Since it is based on STAs RTS transmission, this is compared only in the RTS scenario. 7 We consider hand-grip loss of mobile STAs as studied in [15].

5 (a) No RTS scenario (b) RTS scenario Fig. 5. Performance depending on N : DL traffic ratio = 0.5, SIC = 110 db, and AP s CWmin = 15. (a) No RTS scenario (b) RTS scenario Fig. 6. Performance depending on DL traffic ratio: N = 5, SIC = 110 db, AP s CWmin = 15, and source rate = 20 Mb/s per STA. (a) No RTS scenario (b) RTS scenario Fig. 7. Performance depending on SIC: N = 5, DL traffic ratio = 0.5, and AP s CWmin = 15. B. Results with Varying Number of STAs (Fig. 5) In WLANs, collisions can occur either when a hidden terminal cannot sense an ongoing transmission or when backoff counters of more than one STA reach zero simultaneously. We call the former collision a hidden collision and the latter a contention collision. Without using RTS, as shown in Fig. 5(a), throughput rapidly decreases as N increases because of the rise in both hidden and contention collisions increase. BusyTone slightly improves throughput, but it does not fully resolve hidden collisions because AP cannot transmit busy tone before identifying PTX. In addition, more UL transmissions fail in the BusyTone protocol owing to residual SI, i.e., SI after SIC. Since the rate adaptation algorithm works, accordingly, STAs are more likely to use a robust data rate, i.e., low data rate, thus occupying the medium for longer during each transmission attempt. This results in lower DL throughput of BusyTone. Despite residual SI and additional MAC overhead, on the other hand, MASTaR achieves much higher throughput in DL thanks to the secondary transmissions. MASTaR also yields more transmission opportunities to STAs because AP resets its backoff counter after secondary transmission. Therefore, using MASTaR also slightly enhances UL throughput. In the other results shown below, MASTaR achieves, for the same reason, much higher throughput than other protocols. Using RTS, the overall throughput increases and becomes less dependent on N since hidden collisions are resolved by CTS, as shown in Fig. 5(b). Still, lower total throughput is achieved with larger N because each STA has fewer transmission opportunities. Thus the rate adaptation algorithm works less optimally. Meanwhile, RTS/FCTS enhances DL throughput by simultaneous transmissions after exchanging one RTS and two consecutive FCTS frames. Since RTS/FCTS does not consider the interference between PTX and SRX, however, secondary transmission fails frequently due to the strong interference between PTX and SRX. Owing to the failures, as well as the additional overhead of three-way handshaking for every UL transmission, RTS/FCTS achieves lower throughput gain than MASTaR. C. Results with Varying DL Traffic Ratio (Fig. 6) Figure 6 shows the aggregate throughput depending on DL traffic ratio. In this case, the source rate is 20 Mb/s per STA, and the number of STAs is five. Therefore, the total source rate is fixed at 100 Mb/s and each link s source rate is given

6 Fig. 8. Performance depending on AP s CWmin: N = 5, DL traffic ratio = 0.5, and SIC = 110 db. by the product of the traffic ratio and the total source rate, e.g., 20 Mb/s and 80 Mb/s for DL and UL, respectively when DL traffic ratio is 20%. For HD and BusyTone, as shown in both Figs. 6 (a) and (b), the ratio of the achieved DL throughput to the total throughput is much smaller, except for when DL traffic ratio = 20%, than the ratio of DL source rate to the total source rate. This is because AP cannot win the channel as often as it needs to if multiple STAs with UL traffic coexist. On the other hand, MASTaR delivers DL traffic more successfully thanks to the secondary transmission during uplink channel access. The portion of MASTaR s DL throughput, therefore, increases proportionally with the given DL traffic ratio. It is also worth mentioning that the throughput gain of MASTaR over HD stands out when DL traffic ratio is equal or greater than 50%, that is, when DL traffic is more congested than UL traffic. D. Results with Varying SIC Performance (Fig. 7) If SIC performance is low, primary UL transmissions fail due to the strong residual SI. When SIC = 80 db, for instance, the residual SI power is about 60 dbm, which is comparable with the received power of the intended signals. The failures cause retransmissions and make the rate adaptation algorithm choose low MCS for UL transmission. Therefore, UL throughput of the STR protocols, i.e., BusyTone, RTS/FCTS, and MASTaR, is worse than that of HD if SIC is low, as shown in Fig. 7. As SIC increases, UL throughput of STR protocols increases, and becomes greater than HD s UL throughput when SIC = 110 db. On the other hand, DL throughput of MAS- TaR depends less on the SIC level. The results demonstrate that if SIC of about 100 db or more is possible, significant performance enhancement for both UL and DL is possible in WLANs with a properly designed MAC protocol. E. Results with Varying CW Size of AP (Fig. 8) Figure 8 shows that the MASTaR s performance further increases if AP uses a larger CW size when N = 5 with fully backlogged traffic. Throughput increases not only in UL by more UL channel access, but also in DL thanks to effective channel utilization with more secondary transmissions. When the channel is heavily occupied by STAs, therefore, AP can adjust its CWmin depending on the the viability of secondary transmissions. For example, if the average link margin in the link map is high, then larger CWmin can be used. V. CONCLUDING REMARKS This paper has introduced MASTaR, a novel MAC protocol for IEEE WLAN. Since MASTaR was designed based on the existing functions of the current standards, it is both standard compliant and backward compatible. The evaluation results from ns-3 simulation under the various conditions confirmed that the proposed protocol was able to achieve up to 1.75 higher throughput when STAs did not use RTS, and up to 1.5 higher throughput when STAs used RTS. The results underscored the notion that a noteworthy performance enhancement may be expected in WLAN with the APs simultaneously transmitting and receiving. Our future work will include transmit power control and adaptive carrier sensing considering multi-cell environments. We also plan to carry out trace-based simulation using the SIC trace obtained from full duplex testbed. ACKNOWLEDGMENT This work was supported by ICT R&D program of MSIP/IITP.B ,Multiple Access Technique with Ultra-Low Latency and High Efficiency for Tactile Internet Services in IoT Environments REFERENCES [1] IEEE ac-2013, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz, IEEE std., Dec [2] M. Jain et al., Practical, real-time, full duplex wireless, in Proc. ACM MobiCom, Sep [3] E. Aryafar, M. A. Khojastepour, K. Sundaresan, S. Rangarajan, and M. Chiang, MIDU: Enabling MIMO full duplex, in Proc. ACM MobiCom, Aug [4] D. Bharadia, E. McMilin, and S. Katti, Full duplex radios, in Proc. ACM SIGCOMM, Aug [5] M. Chung, M. Sim, J. Kim, D.-K. Kim, and C.-B. Chae, Prototyping real-time full duplex radios, IEEE Commun. Mag., vol. 53, no. 9, pp , Sep [6] Z. Zhang, K. Long, A. V. Vasilakos, and L. Hanzo, Full-duplex wireless communications: Challenges, solutions and future research directions, in Proc. Asilomar, Nov [7] J. Y. Kim et al., Janus: A novel MAC protocol for full duplex radio, Stanford University, Tech. Rep., [8] M. Duarte et al., Design and characterization of a full-duplex multiantenna system for WiFi networks, IEEE Trans. Veh. Technol., vol. 63, no. 3, pp , Mar [9] X. Xie and X. Zhang, Concise paper: Semi-synchronous channel access for full duplex wireless networks, in Proc. IEEE ICNP, Oct [10] W. Cheng, X. Zhang, and H. Zhang, RTS/FCTS mechanism based fullduplex MAC protocol for wireless networks, in Proc. IEEE GLOBE- COM, Dec [11] A. Tang and X. Wang, A-Duplex: Medium access control for efficient coexistence between full duplex and half duplex communications, IEEE Trans. Wireless Commun., vol. 14, no. 10, pp , [12] S. Goyal, P. Liu, O. Gurbuz, E. Erkip, and S. Panwar, A distributed MAC protocol for full duplex radio, in Proc. Asilomar, Nov [13] W. Zhou, K. Srinivasan, and P. Sinha, RCTC: Rapid concurrent transmission coordination in full DuplexWireless networks, in Proc. IEEE ICNP, Oct [14] J. Lee et al., An experimental study on the capture effect in a networks, in Proc. ACM WiNTECH, Sep [15] S. Yoo, Y. Shin, S. Kim, and S. Choi, Toward realistic WiFi simulation with smartphone Physics, in Proc. IEEE WoWMoM, June [16] S. Yoo et al., ProCCA: Protective clear channel assessment in IEEE WLANs, IEEE Commun. Lett., vol. PP, no. 99, [17] IEEE P802.11, TGax Simulation Scenarios, July 2015.

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

THE exposed terminal problem [1] has been one of the

THE exposed terminal problem [1] has been one of the 1 FACT: Fine-Grained Adaptation of Carrier Sense Threshold in IEEE 82.11 WLANs Seongwon Kim, Student Member, IEEE, Seungmin Yoo, Student Member, IEEE, Jaehong Yi, Student Member, IEEE, Youngwook Son, Student

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 7, JULY 2015 3601 Power-Controlled Medium Access Control Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, Member, IEEE, and Ashutosh

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

An Energy Efficient MAC for Wireless Full Duplex Networks

An Energy Efficient MAC for Wireless Full Duplex Networks An Energy Efficient MAC for Wireless Full Duplex Networks Ryo Murakami, Makoto Kobayashi, Shunsuke Saruwatari and Takashi Watanabe Graduate School of Information Science and Technology, Osaka University,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

In-frame Querying to Utilize Full Duplex Communication in IEEE ax

In-frame Querying to Utilize Full Duplex Communication in IEEE ax In-frame Querying to Utilize Full Duplex Communication in IEEE 802.11ax Gunhee Lee Pohang, Republic of Korea Email: zogondragon@postech.ac.kr Hyeongtae Ahn anten@postech.ac.kr Cheeha Kim chkim@postech.ac.kr

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Adaptive Two-Level Frame Aggregation in IEEE n WLAN

Adaptive Two-Level Frame Aggregation in IEEE n WLAN Adaptive Two-Level Frame Aggregation in IEEE 82.11n WLAN Youngsoo Kim, Edwin Monroy, Okhwan Lee, Kyung-Joon Park, and Sunghyun Choi Samsung Advanced Institute of Technology (SAIT), Kiheung, Korea School

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Cisco Cooperative Project. Coexistence of WiFi and LAA: Detection Thresholds. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen

Cisco Cooperative Project. Coexistence of WiFi and LAA: Detection Thresholds. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Cisco Cooperative Project Coexistence of WiFi and LAA: Detection Thresholds Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Nov. 12, 2015 Outline Problem Review Performance of Delay A problem in

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

DCF/USDMA: Enhanced DCF for Uplink SDMA Transmissions in WLANs

DCF/USDMA: Enhanced DCF for Uplink SDMA Transmissions in WLANs DCF/USDMA: Enhanced DCF for Uplink SDMA Transmissions in WLANs Ruizhi Liao, Boris Bellalta and Miquel Oliver NeTS Research Group Department of Information and Communication Technologies Universitat Pompeu

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

LiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink

LiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink LiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink Sharan Naribole, Shuqing Chen, Ethan Heng and Edward Knightly Naribole Visible Light Communication System (VLC) Dual-purposing

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Day 1: Wi-Fi Technology Overview

Day 1: Wi-Fi Technology Overview Duration: 5days Hands on: Wireshark based real-life Wi-Fi packet trace analysis Demos : Alethea Wicheck multi-sta emulator for understanding performance of Wi-Fi APs and to study impact of multiple clients

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

MC-CDMA Based IEEE Wireless LAN

MC-CDMA Based IEEE Wireless LAN MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN 802.11 WIRELESS NETWORKS 1 AYINEBYONA ELIAB, 2 JONGSUN PARK AND JUNGMIN SO* Smart Computing Laboratory, Dept. of Computer Engineering,

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance Analysis of a Full Duplex MAC Protocol with Binary Exponential Backoff

Performance Analysis of a Full Duplex MAC Protocol with Binary Exponential Backoff ICNS 08 : The Fourteenth International Conference on Networking and Services Performance Analysis of a Full Duplex MAC Protocol with Binary Exponential Backoff Sammy Chan Department of Electronic Engineering

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange

An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange An energy-efficient MAC protocol for infrastructure WLAN based on modified PCF/ DCF access schemes using a bidirectional data packet exchange Raúl Palacios, Fabrizio Granelli University of Trento Trento,

More information

Energy Efficiency of an Enhanced DCF Access Method using Bidirectional Communications for Infrastructure-based IEEE WLANs

Energy Efficiency of an Enhanced DCF Access Method using Bidirectional Communications for Infrastructure-based IEEE WLANs 3 IEEE 8th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Energy Efficiency of an Enhanced Access Method using Bidirectional Communications for

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Robust and Energy Efficient MAC/PHY Strategies of Wi-Fi Sunghyun Choi, Ph.D., FIEEE

Robust and Energy Efficient MAC/PHY Strategies of Wi-Fi Sunghyun Choi, Ph.D., FIEEE Robust and Energy Efficient MAC/PHY Strategies of Wi-Fi Sunghyun Choi, Ph.D., FIEEE Multimedia & Wireless Networking Lab. Seoul National University, Korea http://www.mwnl.snu.ac.kr Introduction Wi-Fi has

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information