Collisions & Virtual collisions in IEEE networks

Size: px
Start display at page:

Download "Collisions & Virtual collisions in IEEE networks"

Transcription

1 Collisions & Virtual collisions in IEEE networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE [1] networks. The carrier-sensing mechanisms (either Physical Carrier-Sensing or Virtual Carrier-Sensing) are designed to address hidden-terminal-induced packet collisions. However, we find that such collisions and "virtual collisions" still exist. Virtual collisions happen where a transmitter has to backoff and retransmit a packet even if its packet can be received correctly. The problem persists no matter how large the CS is. In this project, we describe two example symptoms caused by collisions and "virtual collisions": throughput unfairness and routing instability. Then we investigate a new design to overcome hidden-terminal-induced collisions. Through analysis and simulations, we evaluate its performance of the new design and show that the above two symptoms are successfully removed. Although the new design requires a relatively large CS to avoid collisions, a good tradeoff between throughput and collisions can be achieved by relaxing the range requirement. 1 Problem of Carrier-Sensing in IEEE It is well known that Hidden-terminal problem exists in random-access wireless networks. In Figure 1, (i.e., Transmitter2) cannot sense the transmission from T1 to R1 (i.e., Receiver 1), so it goes ahead and send a packet to R2. But it collides with T1 s transmission at R1, making R1 suffer from Hidden-terminal problem. T1 PCS R1 R2 IR: Interference PCS: Physical Carrier Sensing : Virtual Carrier Sensing 1 2 Basic Mode -R1 <IR; T1- <PCS Figure 1. Hidden-terminal problem Link contention Graph (Link: a Transmitter-Receiver pair) In the following, we use the term link to refer to a transmitter-receiver pair. For example, link 1 is the pair (T1, R1). There are some other terms in the green box of

2 Figure 1. IR is Interference : if a node is within the IR of either the transmitter or receiver in a link, it will cause interference to the link if they transmissions overlap. A node within the PCS of a transmitter can physically sense (not necessarily decode) the transmitted signal, and therefore is refrained from transmitting. A node within the of a transmitter (or receiver) can decode the RTS (or CTS) packet, and therefore is refrained from transmitting in the following data transmission interval specified in the RTS/CTS packets. RTS/CTS handshake was proposed to address this problem [2]. RTS and CTS clear the area around the transmitter and receiver, such that the two-way DATA-ACK exchange is not collided. In Figure 2, the problem in Figure 1 is solved. T1 R1 R2 RTS/CTS mode -R1 <IR; >IR Figure 2. Use RTS/CTS to address the problem However, using RTS/CTS cannot eliminate collisions introduced by hidden terminals. Consider Figure 3, collisions and virtual collisions happen when a receiver can sense busy channel but the transmitter cannot. For example, let s say link 1 starts first, so R2 and R3 receive RTS or CTS, and will keep quiet during this transmission on link 1. But and T3 do not know the transmission and may send a RTS to R2/R3. For link 3, T3 s packet is collided by T1 s packet, so this transmission fails. For link 2, R2 cannot reply to with a CTS because the CTS would collide with T1 s packet at R1. (since s RTS may not undergo a real collision, we call this a virtual collision.) For both link 2 and 3, the transmitters need to backoff and try again. However, and T3 can not sense link 1 and thus do not know when to send RTS (this is a failure of carrier-sensing). As a result, their transmissions will fail with high probability if link 1 is busy 1. In the rest of the report, if not specially noted, we use collisions to refer to hiddenterminal-induced collisions and virtual collisions. 1 There are in fact two kinds of collisions in IEEE networks. (1) Interfering links are within CS of each other, but multiple nodes happen to start transmission at the same time slot. This will not cause much trouble, since the collisions can be resolved quickly in the subsequent retransmissions. (2) A transmitter cannot sense the ongoing transmission on another interfering link. Collisions of this type are serious since the carrier-sensing mechanism has failed. The project focuses on the latter.

3 Collision Virtual Collision T3 R3 T1 R1 R2 RTS/CTS Mode >IR Figure 3. RTS/CTS do not eliminate collisions There are further problems in this topology. T1 knows Link 3 (T1 can receive the CTS from R3), but T3 does not know Link 1, resulting in collisions. This is Information asymmetry, which will cause link 3 to get a much lower throughput than link 1, if both links are saturated. How to solve the problem? A naïve approach is to increase the carrier-sensing range (in Figure 3, increase the ) to cover and T3, so that they can sense link 1. However, it is always possible that the receiver can sense busy channel but the transmitter cannot (i.e., the receiver is within the range but the transmitter is not). So using large CS alone does not help. Packets arriving at R2 R2 T1 R1 Packet T1->R1 Preamble, length MAC Data PCS Preamble, length MAC Data (->R2) Packet ->R2 Basic Mode Packets on Link 2 are often lost, for any PCS. If T1-R2 <PCS, R2 can miss the packet ->R2 Figure 4. Similar situation in Basic Mode Similar situation exists in "Basic Mode, if the receiver cannot restart to receive a stronger packet. Consider the scenario in Figure 4. Let s say T1 s packet arrives first at R2. In the Physical header, there is a preamble (indicating this is an IEEE packet) and a length field (indicating the duration of the following packet). Then R2 synchronizes with this packet and tries to decode it. Since the checksum is at the end of the packet, R2 does not know whether it is corrupted or not before finishing receiving the packet. In

4 the process, a packet from arrives. This packet is missed by R2 since it has synchronized with the earlier packet. Then will not receive ACK from R2, and it must backoff and try again. Since cannot sense link 1 (similar to Figure 3), the probability of failure is high. 2 Related Problems (Symptoms) The hidden-terminal-induced collisions are the root of many performance problems, which we call symptoms, to differentiate them from the underlying collision problem itself. Reference [3] identified at least two of them: Throughput Unfairness and Routing Instability. Our simulations were conducted in NS2 [4]. An network s data rate is set at 11Mbps, and it runs in Basic Mode. Two-ray ground propagation model [5] is adopted with the path loss exponent α =4. The SIR required for correct reception is 1dB. The carrier-sensing range is 55m. The Ad-hoc On-Demand Distance Vector (AODV) routing protocol [6] are used. All data sources use a fixed packet size 146 Bytes. TCP 1 TCP Throughput (Mbps) TCP 1 TCP 2 Throughput (Mbps) Time (s) Figure 5. Throughput Unfairness Time (s) Figure 6. Routing Instability 2.1 Throughput Unfairness Similar to [3], we consider a chain topology as in Figure 5. The 6 nodes in a straight line are equally spaced by 14 meters. TCP 1 is from node 1 to 3, and TCP 2 is from node 6 to 4. TCP 1 starts earlier at 3. sec, and TCP 2 starts at 1. sec. Note that node 1 is hidden from node 5, causing node 5 s DATA packet to be lost at node 4. Likewise, node 2 is hidden from node 6, causing node 6 s DATA packet to be lost at node 5. Because TCP 1 starts earlier and causes lots of collisions to TCP 2, TCP 2 virtually got no chance to obtain any throughput (Figure 5). We think the severe unfairness here is magnified by the fact that a TCP flow, at its starting phase, has disadvantages. First it needs to send SYN packet to establish connection. If SYN is lost, it has to retry. Also, after establishing the connection, its congestion window is so small that fast retransmission is impossible

5 due to the lack of 3 duplicate ACKs. So once a packet is lost, it resets the congestion window to one and waits for a timeout (which is usually in the order of 5ms). 2.2 Routing Instability Re-routing instability is triggered by excessive packet collisions, which is mistook by the routing protocol (such as AODV and DSR) for route unavailability. When the route is regarded as broken, a re-routing process is initiated, and no traffic can get through before a route is found. In Figure 6, there are 12 nodes in a straight line spaced by 14m. A UDP flow is sent by node 1 to node 12. There is self-interference in this flow: Node 5 is hidden from node 1, causing the packets of node 1 to be repetitively lost at node 2. Likewise, nodes 2, 3, 4, 5, face the same problems. The collisions trigger re-routing, which explains the gaps in the throughput curve (Figure 6). Since the route is not really broken, re-routing is not necessary. 3 New Design Before presenting the new design, first we give some definitions. Each link i has an "Interference ": IR = f( d ), where f(.) is an increasing function. IR = f( d ) links i, j are "interfering" if X X < IR or IR, where X { T, R}, X { T, R }. i i i j j j i i j i j i Note: (1). f(.) is an increasing function: when d i increases, the received power at the receiver decreases (we have assumed constant and the same transmission power for all the transmitters). To ensure a certain SIR (Signal-to-Interference Ratio), other transmitters must be farther from the receiver (i.e., IR increases). In Section 2, we have adopted two-ray ground propagation model with path loss exponent α =4, and the SIR required for correct reception is 1dB. It can be derived that IR=f(d)=1.78d. (2) Also, since there is always two-way traffic (RTS-CTS, DATA-ACK) in 82.11, so both the transmitter and receiver should be protected. This is how interfering links are defined. The new design consists of two parts. We now describe it for Basic Mode and RTS/CTS Mode, respectively. 3.1 Basic Mode (no RTS/CTS) 1. Requirement: Transmitter must sense the interfering link(s). The figure below shows the worst case scenario where the distance between the two transmitters in two interfering links reaches the imum.

6 PCS > { T T }, interfering links i, j { T T } = 2d + IR i j So, PCS > 2d + IR i j T1 R1 R2 d IR d 2. Receiver Requirement: Receiver assumes no role in Carrier-Sensing, (since the Requirement has ensured that the transmitter can sense any interfering links.) a. Restart : If a stronger packet arrives later, the receiver switches to receiving the packet. (This is to avoid the wrong behavior in Figure 4.) b. In any case, return ACK upon correctly receiving a DATA packet 3.2 RTS/CTS Mode The following requirements are very similar to the Basic Mode. 1. Requirement: transmitter must receive the RTS or CTS from interfering link(s). That is, > {min( Ti Tj, Ti Rj )}, interfering links i, j so, > d + IR Figure 7 shows a worst case scenario (between link 1 and link 2), a detailed proof of this requirement is in [7]. 2. Receiver Requirement: Receiver assumes no role in Carrier-Sensing a. Restart : If a stronger packet arrives later, the receiver switches to receiving the packet. b. In any case, return CTS/ACK upon correctly receiving a RTS/DATA packet (to avoid the situation in Figure 3) R2 T1 R1 d IR d R3 RTS/CTS mode If >d+ir, then R1-R3 >IR T3 Figure 7. The new design for RTS/CTS mode To get a concrete idea, Figure 7 illustrates how the new design works. Link 1 and link 2 are interfering with each other. Thanks to the Requirement, can hear the CTS

7 from R1, and T1 can hear the CTS from R2, so the transmitters can sense the interfering links and avoid overlapping transmissions. T3 cannot sense link 1 and can transmit at the same time with link 1. Because T3-R1 > IR + d, and T3-R3 < d, we have R3- R1 >IR. Continue the proof and it is easy to see link 1 and link 2 are not interfering. Upon receiving the RTS from T3, R3 sends a CTS to T3 (Receiver Requirement) and DATA-ACK exchange is started. In summary, for any scenario, no collisions will happen. 3.3 Performance evaluation To evaluate the performance of the new design, we revisit the symptoms in Section 2. We run the same simulations, but after meeting the two requirements in the new design (PCS = 55m > 2d + IR = 2*14m *14m, so it satisfies the Requirement). Figure 8 and Figure 9 give the results: both unfairness problem and routing instability have been removed. More importantly, by eliminating the underlying causes of these symptoms, collisions and virtual collisions, the new design will be able to remove any other symptoms caused by collisions. Throughput (Mbps) TCP 1 TCP Time (s) Figure 8. Removing Unfairness Throught (Mbps) Before After Time (s) Figure 9. Removing Routing Instability 4 Throughput-Collision Tradeoff Our primary objective up to now has been to remove collisions in networks. In general, there is a fundamental tradeoff between collisions and throughput. If some degree of collisions is allowed to exist, the throughput unfairness, routing instability, and other related symptoms may resurface somewhat. On the other hand, the overall network throughput may increase due to the smaller CS. To study this tradeoff, we simulate a random topology with 4*4=16 APs (i.e., 16 cells). The size of each cell is 175m*175m, and d = 175/ 2 m 123.8m. 64 clients are randomly placed with a uniform distribution. Each client is associated with the nearest AP and sends a saturated flow to the AP. Two settings are simulated: the curve IEEE shows the results if the standard protocol is used; the curve Meeting Receiver Requirement shows the results if the Receiver Requirement is the new design is met.

8 Note that the Requirement is not satisfied except when PCS = 47m. Figure 1 shows the total throughput and MAC-layer collision probability as a function of PCS, as well as the tradeoff between the throughput and collision probability. Collision Probability Collision Probability After meeting "Receiver Requirement" IEEE PCS (m) (a) Collision Probability vs. PCS Total Throughput (Mbps) Total Throughput After meeting "Receiver Requirement" IEEE PCS (m ) (b) Total throughput vs. PCS After meeting "Receiver Requirement" IEEE Collision Probability Total Throughput (Mbps) (c) Throughput-Collision Tradeoff in both settings Figure 1. Throughput-Collision Tradeoff There are three key observations from Figure 1: As expected, when PCS decreases, throughput decreases and collisions increase, in both curves. In other words, the tradeoff always exists. Although we begin with removing collisions, in practice one can relax the requirement of PCS to achieve a good tradeoff. With the same PCS setting, the Meeting Receiver Requirement curve always has a higher throughput and a lower collision probability than the IEEE curve with the same PCS. In other words, meeting Receiver Requirement improved the tradeoff. There is also a minor observation. Note that the floor collision probability in the new design (when PCS=47m in the blue curve) is about 7%. These MAC-layer collisions are due to the fact that backoff timers of different nodes may still choose the same random

9 number in a Contention Window. However, they do not belong to hidden-terminalinduced collisions (the focus of the project), and will not cause the symptoms discussed before. This is because when such a collision happens, it is likely to be resolved quickly in the retransmissions after new random backoff counters are chosen. 5 Related works Reference [8] provided an analysis on hidden-terminal-induced collisions in networks. There, it was argued that when the PCS range is larger than d plus IR, collisions can be avoided and RTS/CTS is no longer needed. This is true if data transmission is one-way. In 82.11, however, the two-way handshake (RTS-CTS-DATA- ACK) has complicated the issue. We have shown that both Requirement (different from the one mentioned above) and Receiver Requirement need to be met to avoid such collisions. Reference [9] studied false blockings and proposed a scheme to reduce them. A receiver is said to be blocked if a collision or virtual collision illustrated in Figure 3 happens. In Figure 3, R2 and R3 are blocked. A false blocking happens when a node near or T3 keeps silent after hearing an RTS, but the RTS actually suffers from a collision or virtual collision and therefore no DATA transmission follows. It was pointed out that false blockings lead to RTS/CTS congestion, which reduces the capacity of the network. A scheme called RTS validation was proposed in to reduce the false blockings. [9] focuses on the network capacity issue when false blockings happen, and the proposed RTS validation does not aim to removing hidden-terminal-induced collisions. Therefore the symptoms discussed in Section 2 may persist. Our study, on the other hand, focuses on eliminating the collisions themselves. If such collisions are avoided, false blocking will not occur since an RTS will be followed by DATA transmission with high probability (see Figure 7 for example. We note it is with high probability but not always since RTS can still be collided if two transmitters happen to transmit at the same time slot). 6 Conclusion In conclusion, we have identified the fundamental reason why hidden-terminal-induced collisions still exist in network; and provided a new design (including Requirement and Receiver Requirement a set of sufficient conditions) to remove such collisions. By fixing the root, the new design removes the symptoms described in [3], and is expected to also remove other symptoms caused by such collisions. Also, by relaxing the Requirement, a good tradeoff between throughput and collisions can be achieved. There are open problems in the new design. For example, we have assumed that f(.) is an increasing function (Interference increases with the link length), and is the same

10 for all the links. In an irregular propagation environment (e.g., there are walls, doors between transmitters and receivers), the assumptions do not hold. In this case, what matters is the channel gain between any pair of nodes, instead of distance. How to adapt the design to this situation is interesting for further investigation. Reference [1] IEEE Standards Department, IEEE Standard for Wireless LAN, Medium Access Control (MAC) and Physical Layer (PHY) Specifications, [2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A media access protocol for wireless LANs, Proceedings of the ACM SIGCOMM Conference, volume 24, pages , Oct [3] Xu, S.; Saadawi, T., Does the IEEE MAC protocol work well in multihop wireless ad hoc networks? Communications Magazine, IEEE, Volume: 39, Issue: 6, June 21, Pages: [4] "The Network Simulator - ns2", [5] T. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall, New Jersey, 22. [6] C. E. Perkins, E. M. Royer, Ad-hoc On-Demand Distance Vector Routing, Proc. 2 nd IEEE workshop on Mobile Computing Systems and Applications, Feb 1999, pp [7] L. Jiang, S. C. Liew, Hidden-node Removal and its Application in Cellular WiFi Networks, Submitted to IEEE transaction on Vehicular Technology. [8] K. Xu, M. Gerla, S. Bae, How Effective is the IEEE RTS/CTS Handshake in Ad Hoc Networks?, IEEE GLOBECOM '2, Vol. 1, pp , Nov. 22. [9] Saikat Ray, Jeffrey B. Carruthers, and David Starobinski, "RTS/CTS-induced congestion in ad-hoc wireless LANs," in IEEE Wireless Communication and Networking Conference, March 23, pp

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Hidden Problems with the Hidden Node Problem

Hidden Problems with the Hidden Node Problem Hidden Problems with the Hidden Node Problem Hidden Node Problem A B C Hidden node Outside the TX range of sender but within the range of receiver. C is hidden node! Throughput is decreased. Larger data

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

Innovative Channel Release Schemes for Mobile ad hoc Networks

Innovative Channel Release Schemes for Mobile ad hoc Networks Innovative Channel Release Schemes for Mobile ad hoc Networks N. Nakamura,D.Chakraborty, A. Chayabejara, G. Kitagata, T. Suganuma, G. Chakraborty* and N. Shiratori Research Institute of Electrical Communication,

More information

Effectiveness of DSDV Protocol Under Hidden Node Environment

Effectiveness of DSDV Protocol Under Hidden Node Environment Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

An Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5,

An Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5, Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi Networks* An Chan and Soung Chang

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks On the Impact of Noise Sensitivity on Performance in 82.11 Based Ad Hoc Networks Saman Desilva Computer Science Department The Univ. of Texas at San Antonio, San Antonio, TX 78249 Email: sdesilva@cs.utsa.edu

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

Interactions Between TCP and the IEEE MAC Protocol

Interactions Between TCP and the IEEE MAC Protocol Interactions Between TCP and the IEEE 82.11 MAC Protocol Rui Jiang Vikram Gupta Computer Science and Engineering Department University of California, Riverside Chinya V. Ravishankar Abstract The IEEE 82.11x

More information

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Homework #4. Due: December 2, 4PM. CWND (#pkts) Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,

More information

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks Turning Hidden Nodes into Helper Nodes in IEEE 82.11 Wireless LAN Networks Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks 34 International Journal of Information Processing Systems, Vol.2, No.1, March 2006 Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks?

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Abstract: Does IEEE 802.11 MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Shugong Xu Tarek Saadawi Dept. of Electrical Engineering, City University of New York, City College, New York, NY

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C.

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C. Published in IET Communications Received on 14th April 2008 Revised on 20th March 2009 Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks P.C.

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Improving IEEE RTS/CTS Handshake in Wireless. Ad Hoc Networks Considering Large Interference Range

Improving IEEE RTS/CTS Handshake in Wireless. Ad Hoc Networks Considering Large Interference Range Improving IEEE 82.11 RTS/CTS Handshake in Wireless Ad Hoc Networks Considering Large Interference Range Tzu-Chieh Tsai Department of Computer Science National Chengchi University ttsai@cs.nccu.edu.tw Abstract

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks : An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks Shu Du Yanjun Sun David B. Johnson Systems and Applications R&D Center, Texas Instruments, Dallas, TX, USA Department of Computer

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks Hongqiang Zhai and Yuguang Fang Department of Electrical & Computer Engineering University of Florida, Gainesville,

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Wireless Network and Mobility

Wireless Network and Mobility Wireless Network and Mobility Dept. of Computer Science, University of Rochester 2008-11-17 CSC 257/457 - Fall 2008 1 Wireless Networks and Mobility Wireless networking in the data link layer Short range:

More information

Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks using Signal Strength based Link Management

Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks using Signal Strength based Link Management Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks using Signal Strength based Link Management Fabius Klemm 1χ, Srikanth V. Krishnamurthy 2, and Satish K. Tripathi 2 1 Department of

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information