Impact of IEEE n Operation on IEEE Operation

Size: px
Start display at page:

Download "Impact of IEEE n Operation on IEEE Operation"

Transcription

1 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE n Operation on IEEE Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini University of Wisconsin - Milwaukee Milwaukee, WI {brpjr,wxie,thangar2,mukul,hosseini}@uwm.edu YBashir Johnson Controls Inc. Milwaukee, WI yusuf.bashir@jci.com Abstract Wireless communication among sensor devices, enabled by IEEE protocol, is increasingly replacing the existing wired technology in a wide range of monitoring and control applications. IEEE networks typically operate in 2.4GHz ISM band, which is used by popular IEEE (WiFi) networks as well. An overlap between the channels used by IEEE and IEEE networks may adversely impact the operation of IEEE since it is a low power protocol using a small channel width compared to the transmitted power levels and channel width used by IEEE Avoiding channel overlap between IEEE and IEEE networks will become difficult once proposed IEEE n technology becomes popular. This is because an IEEE n network may use two 20MHz wide channels for its operation, rather than a single 20MHz channel as is the case with other IEEE PHY layers. In this paper, we evaluate, via test bed experiments, the impact of IEEE n operation on IEEE performance when there is an overlap between the channels used by IEEE and IEEE n networks. 1. Introduction Wireless communication among sensor devices, enabled by IEEE protocol [1], is increasingly replacing the existing wired technology in a wide range of monitoring and control applications [2], [3]. IEEE networks typically operate in 2.4GHz ISM band, which is used by popular IEEE (WiFi) networks [4] as well. An overlap between the channels used by IEEE and IEEE networks may adversely impact their operation. This is especially true for IEEE since it is a low power protocol using a small channel width compared to the transmitted power levels and channel width used by IEEE Hence, IEEE networks avoid using channels that overlap with the channels used by IEEE networks. The IEEE divides the 80MHz wide 2.4GHz band into 5MHz wide channels with an IEEE network operating over a 20MHz wide range henceforth referred to as the control channel. The 2.4GHz band can support upto three non-overlapping control channels, centered at IEEE channels 1, 6 and 11, in the same location. Thus, IEEE networks, centered at IEEE channels 1, 6 and 11 in 2.4GHz range, are popular. IEEE also defines a number of 3MHz wide channels in the 2.4GHz band. There are several IEEE channels (namely channels 15, 20, 25, 26) that do not overlap with the IEEE networks centered at IEEE channels 1, 6 and 11. To avoid interference from IEEE networks, IEEE networks typically operate in one of such WiFi-free channels. Such clear separation between the frequency ranges used by IEEE and IEEE networks may not be possible once proposed IEEE n networks become popular. IEEE n has several new features such as the use of multiple input and output streams(mimo) and channel bonding that would allow the data rates up to 450 Mbps to be achieved. In particular, channel bonding refers to the use of a 20MHz wide extension channel in addition to the control channel used by IEEE networks. The extension channel would be used if the existing traffic load on an IEEE n network cannot be carried within the control channel. At high traffic loads, an IEEE n network would use a total bandwidth of 40MHz when operating in 2.4GHz band. Clearly, two or more IEEE n networks operating in the same location as an IEEE network would leave no IEEE channel free from IEEE n interference /09 $ IEEE DOI /WAINA

2 In this paper, we perform test bed experiments to evaluate the impact of IEEE n operation on the performance of an IEEE network when the IEEE channel overlaps with the control or extension channel used in IEEE n network. The rest of the paper is organised as follows. Operation of IEEE and IEEE MAC protocols is described in Section 2. Section 3 describes the experimental setup. The results of the experiments are described in Section 4. Finally, Section 5 concludes the paper. 2. Overview of IEEE and IEEE MAC Operation 2.1. IEEE Operation IEEE [1] provides physical (PHY) and medium access control (MAC) layer functionality in low power and low data rate wireless sensor networks (WSN). IEEE PHY layer can operate in 868MHz, 915MHz and 2.4GHz bands. In this paper, we focus on the popular 2.4GHz range operation of IEEE PHY layer, where the information is sent 4 bits, or a symbol, at a time and the maximum data rate is 250kbps. IEEE MAC operation has two modes - beacon-enabled and beaconless. The beacon-enabled mode allows splitting of time into multiple active durations with a cluster 1 having exclusive access to the transmission channel during its active duration. The coordinator broadcasts a beacon to inform other nodes in the cluster about the beginning of the cluster s active duration. The cluster nodes compete for channel access during their active period using a slotted CSMA/CA algorithm [5]. In the beaconless operation, there is no division of time into active durations and a node competes for channel access with other nodes in its radio range using an unslotted CSMA/CA algorithm. In this paper, we focus on the beaconless operation of IEEE MAC layer. As per the unslotted CSMA/CA algorithm, the source node begins a transmission attempt with a CSMA wait for a random number of backoff periods (=20 symbols) between 0 and 2 BE 1. Here, BE refers to a variable called the backoff exponent that is initially set to the value of macminbe parameter. After the CSMA wait, the source node determines if the channel is available for transmission. This clear channel assessment (CCA) is performed over a time duration of 8 symbols. If the CCA fails (i.e. the 1. consisting of a coordinator and its associated nodes channel is found to be busy), the node increments BE and repeats the procedure. If the CCA fails even after macmaxcsmabackoffs CSMA waits, a channel access failure is declared and any further attempt to transmit the packet is abandoned. If the CCA succeeds, the source node performs an RX-to-TX turnaround 2 and transmits the packet. On receiving the packet, the destination node performs an RX-to-TX turnaround and sends the acknowledgement (ACK) if required by the source. No CSMA wait is performed for ACK transmission. However, the transmitted packet or its ACK may suffer a collision. In this case, the source node waits for the macackwaitduration for the ACK to arrive and then proceeds with next attempt to transmit the packet. The source node can make upto macmaxframeretries further attempts to transmit the packet and receive the ACK. The failure to receive an ACK even after macmaxframeretries +1 attempts causes the IEEE MAC layer to accept failure in sending the packet IEEE Operation IEEE provides options for several different modes of operation involving both contention-based and contention free operation. We describe the popular distributed coordination function (DCF) [4], [6] mode operation. Like IEEE , IEEE DCF operation is also based on the CSMA/CA algorithm. A source node that needs to transmit a packet monitors the channel status. If the channel is observed to be idle for a Distributed Inter Frame Space (DIFS) time interval, the source node immediately transmits the packet. Otherwise, the source node continues to monitor the channel status. When the channel is observed to be idle for DIFS duration, the source node selects a random CSMA wait duration. The CSMA wait duration is selected in a uniformly random fashion from the range (0,W) backoff slots, where W refers to the contention window initially set to a value CW min. A node transmits the packet when its CSMA wait is over. However, the CSMA wait does not include the time durations when the channel is busy. During the CSMA wait, whenever the node senses the channel to be busy, it freezes the count-down timer for the CSMA wait. The count-down timer is started again only when the node observes the channel to be idle for DIFS duration. Different IEEE PHY layers 2. The IEEE nodes are typically half-duplex in nature, i.e. they can not perform both the transmit (TX) and receive (RX) operations at the same time. The IEEE specification [1] requires the RX-to-TX or TX-to-RX turnaround time to be 12 symbols or less. 329

3 have different criteria to judge whether the channel is idle or not. Proposed IEEE n PHY would consider the channel to be busy if the energy detected on the channel exceeds a threshold. On receiving a packet, the destination node waits for a Short Inter Frame Spacing(SIFS) interval and then transmits an ACK back to the source node. If the ACK does not reach the source node, the source node doubles up the contention window W upto a certain maximum value. The packet is abandoned if the source node fails to receive an ACK even after a certain maximum number of retransmissions. (a) Top View 3. Experimental Setup and Scenarios In this section, we describe the experimental setup and different scenarios that were considered to evaluate the impact of IEEE n networks on IEEE operation. These experiments were performed on a test bed of commercial IEEE and IEEE hardware. The test bed consisted of 15 IEEE nodes sending packet to their common coordinator using beaconless mode operation and two IEEE n nodes acting as a client/server pair. The dimensions of the test bed as well as the location of each node are shown in Figure 1. The IEEE n access point and cards followed the Draft 2.0 version of the proposed standard. The IEEE n cards used OFDM, 64-QAM with coding rate of 5/6 as the coding scheme and the PHY rate was fixed at 270Mbps. The traffic between the IEEE n client and server machines was generated using the iperf utility [7], which is an open source software used to generate UDP and TCP traffic loads. Each experiment begins with the iperf client sending a UDP stream to the iperf server over the IEEE n network. Each IEEE n packet was 63 KB long and the transmitted power level was 17 dbm. The IEEE n traffic loads used in the experiments were 1, 2, 5, 10, 15, 20, 30, 40, 50 and 60 Mbps. The IEEE nodes start sending packets to their coordinator 10 minutes after the start of an experiment. Thus, for first 10 minutes of the experiment, only IEEE n traffic is present and in next 15 minutes, both IEEE n and IEEE traffic streams are present. During the experiment, all 15 IEEE nodes send 112 byte long packets to their common coordinator at the rate of one packet per second as per the Poisson distribution for 15 minutes. The transmitted power level for IEEE nodes was 10 dbm. Both IEEE and IEEE n operation required each packet to be acknowledged by the receiver. (b) Front View Figure 1. The Test Bed In each experiment, the IEEE network was formed on a 3 MHz wide channel centered at 2425 MHz while the frequency range used by IEEE n network varied as described later. In each experiment, we note down the average loss rate observed by each IEEE nodes as well as the average latency for successful packets as observed by each node. Here, the latency refers to the amount of time IEEE MAC layer takes to report the fate of a packet (success/failure) to the higher layer. The reported results are average loss rate and latency values across all 15 IEEE nodes. The corresponding 95% confidence intervals were always observed to be within a small range around the average values Experimental Scenarios Keeping the channel used by IEEE fixed, we experimented with two different placements of IEEE n network in the 2.4 GHz band as shown in Figure 2: 1) Scenario 1: In this scenario, the IEEE n control channel is centered at IEEE channel 1 and the extension channel overlaps with the channel used by the IEEE network. 2) Scenario 2: In this scenario, the IEEE n control channel is centered at IEEE channel 4, i.e. the IEEE channel is right in 330

4 (a) Scenario 1 (a) Average Loss Rate for IEEE Nodes (b) Scenario 2 Figure 2. The Frequency Range Occupied By IEEE and IEEE n Networks the middle of IEEE n control channel. No extension channel is used. For each scenario, we experimented with different IEEE n traffic loads (1, 2, 5, 10, 15, 20, 30, 40, 50, 60 Mbps). Each experiment was repeated 10 times. In each repetition, we calculated the average loss rate and average latency (for successful packets) across all 15 IEEE nodes. Then, we calculated the overall average and the confidence intervals for the loss rate and latency across 10 repetitions. The confidence intervals were always observed to be within a small range around the average values. 4. Experimental Results 4.1. The Impact of IEEE Traffic on IEEE n Traffic In this section, we present the effect of IEEE traffic load on IEEE n networks in different scenarios dicussed above. As mentioned earlier, in each experiment, IEEE n traffic runs unopposed for first 10 minutes and then for next 15 minutes both IEEE n and IEEE traffic are present. (b) Average Packet Latency for Successful Packets for IEEE Nodes Figure 3. The Impact of IEEE n Traffic on IEEE Performance as IEEE n Traffic Load Incrases: Scenario 1 Experiments In scenario 1, there is a pronounced drop in IEEE n traffic load once the IEEE traffic starts. The IEEE channel lies in the middle of the extension channel used by IEEE n traffic. The use of two channels (control and extension) allows traffic load up to 60Mbps to be achieved on IEEE n traffic. However, the start of IEEE traffic causes the IEEE n traffic load to drop significantly in case of higher traffic loads (30 to 60Mbps). At high traffic loads, there is significant competition between IEEE n and IEEE traffic for access to the transmission channel. This competition causes IEEE n traffic load to drop significantly. At lower traffic loads (20 Mbps and lower), there is not much competition between IEEE n and IEEE traffic for access to the extension channel. In fact, the extension channel may not even be used by IEEE n traffic at such low loads. Hence, the presence of IEEE traffic does not have any significant impact on IEEE n traffic loads. In scenario 2,the IEEE n network uses just 331

5 (a) Average Loss Rate for IEEE Nodes (b) Average Packet Latency for Successful Packets for IEEE Nodes Figure 4. The Impact of IEEE n Traffic on IEEE Performance as IEEE n Traffic Load Incrases: Scenario 2 Experiments the control channel and hence we were not able to achieve traffic loads higher than about 40 Mbps. In this scenario, the IEEE channel lies right in the middle of the IEEE n channel and hence there is a significant drop in IEEE n traffic load (for traffic loads higher than 20 Mbps) once the IEEE nodes start contending for the channel access The Impact of IEEE n Traffic on IEEE Traffic In this section, we present the testbed results regarding the impact of IEEE n network operation on the performance of IEEE nodes. The impact is measured in terms of the increase in average loss rate and the average latency (for successful packets) for IEEE nodes caused by the competition from IEEE n traffic. In other words, we report the difference between the average loss rate /latency when IEEE n traffic is present and when it is not present. Figures 3 and 4 show this impact on IEEE performance as the traffic load on IEEE n network increases. In scenario 1, the extension channel used by IEEE n traffic overlaps with the IEEE channel. As Figure 3 shows, the impact of IEEE n traffic on IEEE performance becomes more severe as the traffic load on the IEEE n network increases. It is observed that the loss rate of IEEE nodes increases by around 30% and the latency for successful packets increases by around 160ms in presence of moderate IEEE n traffic load of 60 Mbps (Figure 3). Such increase in the loss rate and latency values may be unacceptable in many WSN applications. In scenario 2, the control channel used by IEEE n traffic overlaps with the IEEE channel. Figure 4 shows the impact on IEEE performance in scenario 2 as the IEEE n traffic load increases. Clearly, the impact is much more severe in scenario 2 than in scenario 1. The IEEE n traffic causes much severe increase in IEEE loss rate in scenario 2 than in scenario 1. With 60Mbps IEEE n traffic, the IEEE loss rate increases by 80% and the latency for successful packets increases by 180 ms whereas the corresponding increase in case of scenario 1 was about 30% and 160 ms respectively. This is because the IEEE n traffic uses the control channel much more extensively than the extension channel. 5. Conclusion In this paper, we presented testbed results regarding the impact of IEEE n traffic on the performance of an IEEE network. We evaluated two different scenarios: 1) IEEE channel overlapping with IEEE n extension channel, 2) IEEE channel overlapping with IEEE n control channel. In each scenario, we observed that the loss rate and the latency for successful packets for IEEE nodes traffic increase substantially with increase in the IEEE n traffic load. Specifically, we observed that: 1) Overlap with the IEEE n extension channel can cause IEEE packet latency to suffer serious deterioration. The increase in packet latency may make successful packet delivery useless in many WSN applications. The impact on the IEEE loss rate, although substantial, is not as severe as in case of an overlap with the IEEE n control channel. The deterioration in IEEE performance worsens with increase in the IEEE n traffic load. The exact impact depends on the actual 332

6 usage of the extension channel in carrying IEEE n traffic. 2) Overlap with the IEEE n control channel causes severe deterioration in both the loss rate and the packet latency for IEEE traffic. This impact is much more serious than the impact due to overlap with the IEEE n extension channel. The impact worsens with increase in the IEEE n traffic load. We also presented a qualitative account of the impact of IEEE operation on IEEE n performance. In future, we intend to perform a systematic study of the impact of IEEE operation on IEEE performance. References [1] Part 15.4: Wireless MAC and PHY layer specifications for low-rate wireless personal area networks, IEEE Std , [2] M. Dohler, T. Watteyne, T. Winter, and D. Barthel, Urban WSNs Routing Requirements in Low Power and Lossy Networks, IETF, Internet-Draft draft-ietfroll-urban-routing-reqs-02, Oct. 2008, work in progress. [3] Routing over low power and lossy networks. [Online]. Available: html [4] Part 11: Wireless lan medium access control and physical layer specifications, IEEE Std (Revision of IEEE Std ), [5] L. Kleinrock and F. Tobagi, Packet switching in radio channels: Part 1 - carrier sense multiple-access modes and their throughput-delay characteristics, IEEE Trans. on Communications, vol. 23, no. 12, pp , December [6] G. Bianchi, Performance analysis of the IEEE distributed coordination function, IEEE JSAC, vol. 18, no. 3, pp , March [7] NLANR/DAST, Iperf. [Online]. Available: sourceforge.net/projects/iperf 333

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Dynamic Reconfiguration in Beaconless IEEE Networks Under Varying Traffic Loads

Dynamic Reconfiguration in Beaconless IEEE Networks Under Varying Traffic Loads Dynamic Reconfiguration in Beaconless IEEE 82..4 Networks Under Varying Traffic Loads D Rohm, M Goyal, W Xie, B Polepalli, H Hosseini University of Wisconsin - Milwaukee Milwaukee, WI 321 USA {dmgibson,mukul,wxie,brpjr,hosseini}@uwm.edu

More information

Experimental Validation of a Coexistence Model of IEEE and IEEE b/g Networks

Experimental Validation of a Coexistence Model of IEEE and IEEE b/g Networks Experimental Validation of a Coexistence Model of IEEE 802.15.4 and IEEE 802.11b/g Networks Wei Yuan, Xiangyu Wang, Jean-Paul M. G. Linnartz and Ignas G. M. M. Niemegeers Philips Research, High Tech Campus

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Evaluating the Impact of Signal to Noise Ratio on IEEE PHY-Level Packet Loss Rate

Evaluating the Impact of Signal to Noise Ratio on IEEE PHY-Level Packet Loss Rate 21 13th International Conference on Network-Based Information Systems Evaluating the Impact of Signal to Noise Ratio on IEEE 82.15.4 PHY-Level Packet Loss Rate MGoyal, S Prakash,WXie,YBashir, H Hosseini

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT COEXISTENCE MODEL OF ZIGBEE& IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar Abstract IEEE 802.15.4 standard is used for low rate, short distance

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Adaptive CCA for IEEE wireless sensor networks to mitigate interference. Yuan, Wei; Linnartz, J.P.M.G.; Niemegeers, I.G.M.M.

Adaptive CCA for IEEE wireless sensor networks to mitigate interference. Yuan, Wei; Linnartz, J.P.M.G.; Niemegeers, I.G.M.M. Adaptive CCA for IEEE 82.15.4 wireless sensor networks to mitigate interference. Yuan, Wei; Linnartz, J.P.M.G.; Niemegeers, I.G.M.M. Published in: Proceedings of the 21 IEEE Wireless Communications and

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT ZIGBEE& 802.11b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT Meenu Balodhi 1, Vishwanath Bijalwan 2, Banit Negi 3 Abstract 802.15.4 standard is used for low rate, short distance wireless communication.

More information

Lecture 17: Wireless Networking"

Lecture 17: Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details

Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks Giuseppe Anastasi Dept. of Information Engineering University of Pisa, Italy E-mail: giuseppe.anastasi@iet.unipi.it

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Energy Efficient Clear Channel Assessment for LR-WPAN

Energy Efficient Clear Channel Assessment for LR-WPAN www.ijcsi.org 387 Energy Efficient Clear Channel Assessment for LR-WPAN Praveen Kaushik 1, Nilesh kumar R. Patel 2, Jyoti Singhai 3 1 Department of CSE, MANIT Bhopal, M.P., India 2 Department of CSE, MANIT

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 OVERVIEW For accessing computer networks and its services without cables, wireless communications is a fast-growing technology which gives certain advantages over wired network

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information