Performance Analysis of IEEE MAC Protocol with Different ACK Polices

Size: px
Start display at page:

Download "Performance Analysis of IEEE MAC Protocol with Different ACK Polices"

Transcription

1 Performance Analysis of IEEE MAC Protocol with Different Polices S. Mehta and K.S. Kwak Wireless Communications Research Center, Inha University, Korea Abstract. he wireless personal area network (WPAN is an emerging wireless technology for future short range indoor and outdoor communication applications. he IEEE medium access control (MAC is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. his paper uses analytical model to study the performance analysis of WPAN (IEEE MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC. Keywords: Analytical Modeling, Performance Analysis, MAC Protocol, IEEE Introduction he IEEE standard MAC layer [1] is based on a centralized, connection oriented topology which divides a large network into several smaller ones termed piconets. A piconet consists of a Piconet Network Controller (PNC and DEVs (DEVices. he DEV is designed to be low power and low cost. One DEV is required to perform the role of PNC (Piconet Coordinator, which provides the basic timing for the piconet as well as other piconet management functions, such as power management, Quality of Service (QoS scheduling, security, and so on. he standard also allows for the formation of child piconets and neighbor piconets. he original piconet is called the parent piconet and the child/neighbor piconets are called the dependent piconets. hese piconets differ in the way they associate themselves to the parent piconet. IEEE standard supports multiple power saving modes and multiple acknowledgement ( policies (NO, Imm-, and Dly-,. It is very robust and supports coexistence with the other WLAN technologies such as IEEE In IEEE MAC protocol, although communications are connection based under the control of the PNC, connections and data transfer can be made with peer to peer connections. In IEEE MAC protocol, the channel time is divided into superframes, which each superframe beginning with a beacon. he superframe is composed of the three major parts: the beacon, the optional

2 contention access period (CAP, and the channel time allocation period (P or channel allocation time (. Wireless channel is usually vulnerable to errors. Error control mechanisms should be designed in MAC protocol to provide a cretin level of reliability for the higher network layers. In accordance with that, IEEE defines three types of acknowledgment mechanisms for s: the No-, Imm-, and Dly- mechanisms. For the Imm- and Dly- mechanisms, retransmission is adopted to recover corrupted frames in previous transmissions. For the No- mechanism, is not sent after a reception. In the Imm- mechanism, each frame is individually ed following the reception of the frame. he Dly- mechanism allows the source to send multiple frames without waiting for individual s. Instead, the s of the individual frames are grouped into a single response frame to be sent to the source DEV. In [2] and some other literature proposed implied-acknowledgment (Imp- for bidirectional communication. Implied acknowledgement (Imp- permits a to be used bi-directionally within a limited scope. Implied policy is not allowed in the CAP to avoid ambiguities between a frame that is transmitted in response to a frame with an implied request and a frame that is transmitted independently when the original frame was missed. o reduce the overhead of the IEEE MAC, we combine the frame aggregation concept [3] and Dly- mechanism with different burst sizes, and we define this new mechanism as Dly--AGG. he idea of frame aggregation is to aggregate multiple MAC frames into a single (or approximately single transmission. All these policies have a large impact on the throughput, delay, and channel utilization of the network and required a detailed study to find overall performance of the network. In this paper, we present the performance analysis of IEEE from protocol architecture s point of view. Furthermore, we show the effect of aggregation with Dly-, i.e. Dly--AGG, on the network performance. 2 Related Works o the best of our knowledge, there is little work on the performance or channel analysis of IEEE MAC with respect to different policies, under different parameters. However, a large amount of literature is available on IEEE MAC scheduling, optimization of superframe size, various traffic analyses and so on. Some of the important related works are as follow. In [4] authors, presents the implementation of IEEE module in ns-2 and discuses various experimental scenario results including various scheduling techniques. Specially, to investigate the performance of real-time and best-effort traffic with various super frame lengths and different policies. In [5] authors, presents a novel sharing protocol, called VBR-M that enables the sharing of s belonging to streams with the same group identity. his feature allows the proposed protocol to exploit the statistical characteristics of variable bit rate (VBR streams by giving unused time units to a flow that requires peak rate allocation. And they presents two optimizations to VBR-M, namely VBR-Blind and VBR- okenbus, as well. In [6, 7], the authors proposed an adaptive Dly- scheme for

3 both CP and UDP traffic. he first one is to request the Dly- frame adaptively or change the burst size of Dly- according to the transmitter queue status. he second is a retransmission counter to enable the destination DEV to deliver the MAC data frames to upper layer timely and orderly. While later is more focused on optimization of channel capacity. Both papers laid a good foundation in simulation and analytical works of IEEE MAC protocol. Similarly, in [8] authors, formulate a throughput optimization problem under error channel condition and derive a closed form solution for the optimal throughput. he work presented in [8] is close to our work but their analysis scope is limited only in terms of throughput analysis. While our work span covers the delay, throughput, and channel utilization with different policies under frame aggregation and error channel condition. he paper is outlined as follows. In section 3 we present the performance analysis from protocol architecture s point of view and finally, conclusions and future work are drawn in section 4. 3 Performance Analysis of IEEE MAC Protocol In this section, we present the performance analysis of IEEE MAC to answer several questions like optimization of payload, optimization of policies, effect of aggregation etc., under various parameters. 3.1 Analytical Model We use ground works of Bianchis s model [9] and [8] to present our analysis work. We divide our analysis in two parts; analysis and CAP analysis. able 1 shows the notations that we used for the analytical model. Short Inter Frame Space (SIFS time SIFS Distributed Coordinate Function Inter Frame Space (DIFS DIFS time Minimum Inter Frame Space (MIFS time MIFS CW Minimum back-off window size min ransmission time of the physical preamble pre. ransmission time of the PHY header PHY L MAC overhead in bytes MAC H L size in bytes L Payload size in bytes Data ransmission time of MAC overhead MAC H transmission time ransmission time for the payload Data f he time for a transmission considered failed during CAP CAP he time for a transmission considered successful during CAP s CAP f he time for a transmission considered failed during CA he time for a transmission considered successful during CA s he time-out value waiting for an O h Normalized throughput during a CAP time CAP

4 h Normalized throughput during a time n Burst size in packets burst he throughput is given by able 1. Parameters notations ransmitted Data h = ransmission Cycle Duration (1 We assume a Gaussian wireless channel model. he channel bit error rate (BER, denoted as p e ( < p e < 1, can be calculated via previous frames or some other mechanism. How to obtain p e is way out of the scope of this paper. From [9], a frame with a length L in bits, the probability that the frame is successfully transmitted can be calculated as p s = (1 p L (2 Here, for the simplicity we assume that a data frame is considered to be successfully transmitted if both data frame and are successfully transmitted in different mechanism policies. We use Imm_, No_, D_, and D_AGG_ to denote the immediate acknowledgement, No acknowledgement, delay acknowledgement, and delay acknowledgement with aggregation, respectively. hen we can define p for different mechanisms as follows s p, Imm_=(1 p s ( LData + LMAC H + L Imm *8 e e ( L + L *8 p Data MAC H,No_=(1 p s p,dly_=(1 p s p, Dly_-AGG=(1 p s s e e ( L + L + L *8 Data MAC H Dly e ( L + L + L + L *8 Data MAC H MAC Hs Dly A successful transmission time during a is given by 1 = ( + MIFS Data MAC H pre PHY ( 2* + 2* SIFS Data MAC H pre PHY MAC PHY Imm ( ( + MIFS Data MAC H pre PHY SIFS MAC PHY Dly pre ( K * forno forimm K fordly Data * fordly AGG MAC H MAC HS pre PHY SIFS MAC PHY Dly AGG from (2, (3 and (4 the normalized throughput during a is given by (3 (4 1 Readers are advice to have a look at table 1 while referring equations as we couldn t explain every parameter due to space limitation.

5 h ps, No_ LData*8 for No s ps, Imm_ LData*8 for Imm s = ps, Dly_ KLData*8 for Dly s ps, Dly_ AGGKLData*8 for Dly AGG s o demonstrate the effect of n-dly- and n-dly--agg on bandwidth utilization, we define a metric named maximum effective bandwidth (MEB based on [1], which is a fraction of time the channel is used to successfully transmit data frames versus the total channel time. he maximum effective bandwidth utilization during a /CAP slot is given by (5 MEB LData ps, Dly_ nburst. fordly s = LData ps, Dly_ AGG nburst. for Dly AGG s (6 MEB CAP n 1 LData nψ(1 ψ ps,dly_, nburst. fordly scap = n 1 LData nψ(1 ψ ps, Dly_ AGG nburst. fordly AGG scap During the CAP, we use the analytical model similar with CSMA/CA mechanism of IEEE Also, we study how to optimize the channel throughput using different policies under error channel condition. When the Imm- mechanism is used in CAP, each node adopts CSMA/CA with binary exponential backoff. When NO- mechanism is used, each node will use a fixed backoff window as it has no knowledge whether or not the transmitted data frame is successfully received. If the Dly- mechanism is used, as long as the backoff timer of a node reaches zero, the node will first send a number (K of data frames each separated by an MIFS and a delay-request frame separated by an MIFS, and wait for the. If a burst transmission (of K data frames is considered successful, the sender will reset the backoff window to the initial value; otherwise, the backoff window will be doubled. Dly--AGG follows the same backoff procedure as Dly-. From [9], the failure probability of a transmission during a CAP is given by

6 1 (1 p ps, Imm_ forimm_ pf = 1 (1 p ps, Dly_, fordly_ 1 (1 p ps, Dly _ AGG, for Dly _ AGG For n number of stations, the probability of a transmitted frame collision is given by p ψ (7 1 = 1 (1 n (8 ψ, probability of a station to transmit during a generic slot time is also depends on number of retry limit. hen, the probability of the busy channel is given by pb = 1 (1 ψ n (9 From (8 and (9, the probability of a success transmission occurs in a slot time is given by n 1 nψ(1 ψ ps, No_, forno n 1 nψ(1 ψ ps, Imm _, forimm _ ps = n 1 n ψ(1 ψ ps, Dly_, for Dly_ n 1 nψ(1 ψ ps, Dly_ AGG, fordly_ AGG A successful transmission time during a CAP is given by scap = ( + MIFS Data MAC H pre PHY ( 2* + 2* SIFS Data MAC H pre PHY MAC PHY Imm ( ( + MIFS Data MAC H pre PHY SIFS MAC PHY Dly pre ( * 2* Data MAC H MAC HS pre PHY SIFS MAC PHY Dly AGG CW for No CW for Imm CW+ K for Dly AC K CW + K fordly AGG (1 (11 where CW represents the average back-off time. he average back-off defines the back-off duration for light loaded networks, i.e. when each station has access to the channel after the first back-off attempt and is given by CW. min CW = slot 2 A failure transmission time during a is given by (12

7 f = ( + MIFS Data MAC H pre PHY ( + SIFS Data MAC H pre PHY o ( ( + MIFS Data MAC H pre PHY o SIFS ( * forno forimm K for Dly K for Dly AGG Data MAC H MAC HS pre PHY o SIFS from (1, (11, and (13, the normalized throughput during a CAP is given by h CAP PL S Data*8 (1 p δ + P + ( p P PL S Data*8 (1 p δ + P + ( p P = PKL S Data*8 (1 p δ + P + ( p P PKL S Data*8 (1 p δ + P + ( p P b S s CAP b S f CAP b S s CAP b S f CAP b S s CAP b S f CAP b S s CAP b S f CAP for No for No for Dly for Dly AGG from (1, we can also calculate the average access delay during a /CAP. (13 ( Performance Evaluation For the performance evaluation, we adopt the following parameters from [11] as shown in table 2. Parameters SIFS MIFS Preamble and PLCP Header Values 2.5 usec 1 usec 9 usec CW min 8 Payload Size Policy Data Rate Control Signal Rate 1~5 KB 3 basic +Dly--AGG policies 1~2 Gbps 48 Mbps Analysis able 2. Parameters values Figures 1 and 2 show the normalized throughput for different payload sizes with different polices with and without aggregation, respectively. We assume an ideal channel conditions for these results. Here, we can observe that No- gives the superior results as most of the time is utilized for data transfer. However, No- policy is not suitable for every application and channel condition. he Dly--

8 AGG policy can achieve somewhat close results to No- policy, as it reduces the unnecessary inter-frame time as well as the header size. Figures 1 and 2 give us the normalized value of throughput at different payload sizes but can t answer for optimum payload size. So, we produce the same results with Gaussian wireless channel model with a given BER rate. Different schemes without aggregation Method Different schemes with aggregation method hroughput (Mbps hroughput (Mbps hroughput (No--1 Gbps hroughput (Imm--1 Gbps hroughput (2-Dly--1 Gbps hroughput (4-Dly--2 Gbps hroughput (No--2 Gbps hroughput (Imm--2 Gbps hroughput (2-Dly--2 Gbps hroughput (4-Dly--2 Gbps Data Packet Payload (KB Fig.1. hroughput versus payload size with different policies Different Schemes without aggregation Method (BER=.2 1 hroughput (No--1Gbps hroughput (Imm--1Gbps 9 hroughput (2-Dly--1Gbps hroughput (4-Dly--1Gbps hroughput (No--2Gbps 8 hroughput (Imm--2Gbps hroughput (2-Dly--2Gbps 7 hroughput (4-Dly--2Gbps Data Packet Payload (KB hroughput (Mbps hroughput (Mbps hroughput ( No- 1 Gbps hroughput ( 2-Dly- 1 Gbps hroughput ( 4-Dly- 1 Gbps hroughput ( No- 2 Gbps hroughput ( 2-Dly- 2 Gbps hroughput ( 4-Dly- 2 Gbps Data Packet Payload (KB Fig.2. hroughput versus payload size with different policies Different Schemes with aggregation Method (BER=.2 18 hroughput (No--1Gbps hroughput (2-Dly--1Gbps 16 hroughput (4-Dly--1Gbps hroughput (No--2Gbps 1 hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps Data Packet Payload (KB Fig.3. hroughput versus payload size with different policies Fig.4. hroughput versus payload size with different policies Figures 3 and 4 show the throughput for different payload sizes under a given BER value. It can be seen that an optimal payload size exists for a given BER value. As shown in the mentioned figures the throughput first increases, and then decreases with increasing payload size (even with the aggregation in error prone channels. his is because without the protection of FCS in individual payload frame, a single bit error may corrupt the whole frame which will waste lots of medium time usage and counteract the efficiency produced by an increased payload size. Figure 5 shows the normalized throughput for different BER values with different policies when payload size is set to 1KB. As the BER value increases the throughput decreases. he No- policy with aggregation has larger throughput over large range of BER values than any other policies. o find the effect of n-dly- on bandwidth utilization as well as to find the optimal value of burst size for n-dly- policy, we

9 define the MEB metric in (6. Figures 6 and 7 show the MEB with different burst values under a given BER value. From these figure we can observe that burst size = 4 gives good results in fairly all given payload values. Figure 8 shows the access delay performance for different burst sizes with the aggregation method. Here, we only analyzed n-dly--agg policy to get the upper bound on the delay performance. hroughput Gbps and Payload=1KB No- ( Without Aggregation Imm- 2-Dly- ( Without Aggregation 4-Dly- ( Without Aggregation No- (With Aggregation 2-Dly- ( With Aggregation 4-Dly- ( With Aggregation MEB Without aggregation method (BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps MEB BER Fig.5. hroughput versus BER value with different policies With aggregation method (BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps Burst Size n Delay (usec Burst Size n Fig.6. MEB versus burst size (Data Rate=1Gbps, BER=, n-dly- Payload = 1KB Payload = 2KB Payload = 3KB Payload = 4KB Payload = 5KB Burst Size n Fig.7. MEB versus burst size CAP Analysis Fig.8. Access delay versus burst size Figures 9 and 1 show the normalized throughput over different payload sizes with different policies. Here, we assume no competition between active nodes, as our main focus is to get maximum normalized throughput for each payload size. Figures 11 and 12 show the normalized throughput for different payload sizes with different policies under a given BER value. For each policies, with the increase of the payload size, the throughput first increases, then decreases after the maximal point. his can be explained as follows. In CAP, the time to transmit the payload is only a small portion of the total time used. herefore, when the payload size increases, the transmission efficiency can be increase, but the error probability also increases. he increase of the curves in figures 11 and 12 is because the effect of increased transmission efficiency is more significant than the effect of increased frame error

10 probability, and the decrease of the curves is due to dominant effect of increased frame error probability when payload size further increases. From the above mentioned figures we can find out the optimum payload size value for a given BER value. Here, it is worth to note that normalized throughput performance depends on the number of active stations and backoff window size during a CAP time. Figure 13 shows the normalized throughput for different BER values when payload size is set to 1KB. Different schemes without aggregation method (During CAP time 1 hroughput (No--1 Gbps 11 hroughput ( Imm--1 Gbps hroughput (2-Dly--1 Gbps 1 hroughput (4-Dly--1 Gbps hroughput (No-- 2 Gbps 9 hroughput (Imm--2 Gbps hroughput (2-Dly--2 Gbps 8 hroughput (4-Dly--2 Gbps hroughput (Mbps Data Packet Payload (KB Fig.9. hroughput versus payload size hroughput (Mbps Different schemes with aggregation method ( During CAP ime hroughput (No- 1 Gbps hroughput (2-Dly- Gbps hroughput (4-Dly- 1 Gbps hroughput (No- 2 Gbps hroughput (2-Dly- 2 Gbps hroughput (4-Dly- 2 Gbps Data Packet Payload (KB Fig.1. hroughput versus payload size Different Schemes without aggregation method (During CAP time, BER=.2 7 hroughput (No--1Gbps hroughput (Imm--1Gbps hroughput (2-Dly--1Gbps 6 hroughput (4-Dly--1Gbps hroughput (No--2Gbps hroughput (Imm--2Gbps 5 hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps hroughput (Mbps 3 hroughput (Mbps Different Schemes with aggregation method (During CAP time, BER= hroughput (No--1Gbps hroughput (2-Dly--1Gbps hroughput (4-Dly--1Gbps hroughput (No--2Gbps hroughput (2-Dly--2Gbps hroughput (4-Dly--2Gbps 1 Data Packet Payload (KB Fig.11. hroughput versus payload size Data Packet Payload (KB Fig.12. hroughput versus payload size

11 hroughput Gbps and Payload = 1 KB ( During CAP ime No- ( Without Aggregation Imm- 2-Dly- ( Without Aggregation 4-Dly- ( Without Aggregation No- (With Aggregation 2-Dly- ( With Aggregation 4-Dly- ( With Aggregation MEB Without aggregation method (During CAP BER=.2.2 Payload = 1KB- 1Gbps.18 Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps.16 Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps BER Burst Size n Fig.13.hroughput versus BER value with different policies Fig.14. MEB versus burst size.25.2 With aggregation method (During CAP, BER=.2 Payload = 1KB- 1Gbps Payload = 2KB- 1Gbps Payload = 3KB- 1Gbps Payload = 4KB- 1Gbps Payload = 5KB- 1Gbps (During CAP, Data Rate = 1Gbps, BER=, n-dly- Payload = 1KB Payload = 2KB Payload = 3KB Payload = 4KB Payload = 5KB 3.5 MEB.15.1 Delay (msec Burst Size n Fig.15. MEB versus burst size Burst Size n Fig.16. Access delay versus burst siz Similar to duration analysis, Figure 14 and 15 shows the MEB for different burst values under a given BER value. Figure 16 shows the access delay performance for different burst sizes under a given BER value. he access delay performance with different policies is very sensitive to backoff window size and number of active nodes. In this paper, we focused only on n-dly--agg policy to get the upper bound on the delay performance. 4 Conclusions and Future Work In this paper, we presented a performance analysis of WPAN (IEEE MAC for wireless sensor networks. We have extensively studied the different policies in and CAP under a given BER value. he optimal payload size as well as optimal burst size can be determined analytically from the presented analysis. For future work, we want to study the impact of backoff window size on channel utilization and access delay. We hope that the results of this paper will help sensor

12 network designers to easily and correctly provision systems based on IEEE MAC technology. References 1. P /D17.:(C/LM Standard for elecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 15.3: Wireless Medium Access Control (MAC and Physical Layer (PHY Specifications for High Rate Wireless Personal Area Networks. Feb Part 15.3: Wireless Medium Access Control (MAC and Physical Layer (PHY Specifications for High Rate Wireless Personal Area Networks. Amendment 1:MAC Sub layer, IEEE Std b, Feb Y. Xiao.: IEEE 82.11n: Enhancements for higher throughput in wireless LANs. IEEE Wireless Communications, December 5. pp K.-W. Chin, D. Lowe.: Simulation study of the IEEE MAC. in: Proc., Australian elecommunications and Network Applications Conference (ANAC, Sydney, Australia, K.W. Chin and D. Lowe.:A Novel IEEE Sharing Protocol for Supporting VBR Streams. in proc. of IEEE ICCCN, H. Chen, Z. Guo, R. Yao, and Y. Li.: Improved Performance with Adaptive Dly- for IEEE WPAN over UWB PHY, IEICE RANS. Fundamentals, VOl-E88-A, No.9, Sep Y. H. seng, E. H. Wu, and G. H. Chen.: Maximum raffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol. in proc. of IEEE VC, Y. Xiao, X. Shen, and H. Jiang.: Optimal Mechanisms of the IEEE MAC for Ultra-Wideband Systems. IEEE JSAC, Vol.24, No.4, April, G. Bianchi.: Performance analysis of the IEEE distributed coordination function. IEEE JSAC, Vol.18, no-3, pp , Mar.. 1. H.Chen, Z. Guo, R. Y. Yao, X. Shen, and Y.Li.: Perfoamnce Analyis of delyed Acknowledgemnet Scheme in UWB-Based High-Rate WPAN. IEEE transaction on vehicular technology, Vol.55, No.2, March IEEE P82.15 Working Group for Wireless Personal Area Networks (WPANs.: Unified and flexible millimeter wave WPAN systems supported by common mode. DOC: IEEE c, July 9.

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

IEEE P Wireless Personal Area Networks

IEEE P Wireless Personal Area Networks Project Title IEEE P802.15 Wireless Personal Area Networks IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) JCS Proposed Changes Date Submitted Source Re: [28 April, 2004] [John C.

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

High Definition Video in IEEE c mm-wave Wireless Personal Area Networks

High Definition Video in IEEE c mm-wave Wireless Personal Area Networks 36th Annual IEEE Conference on Local Computer Networks LCN 2011, Bonn High Definition Video in IEEE 802.15.3c mm-wave Wireless Personal Area Networks Sandra Scott-Hayward and Emiliano Garcia-Palacios Institute

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks

Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering University of Florida Gainesville, Florida,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Performance Analysis of Grouping Strategy for Dense IEEE Networks

Performance Analysis of Grouping Strategy for Dense IEEE Networks Performance Analysis of Grouping Strategy for Dense IEEE 802.11 Networks Lei Zheng *, Lin Cai *, Jianping Pan *, and Minming Ni *+ * University of Victoria, Victoria, BC, Canada + Beijing Jiaotong University,

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

B. I. Wu Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge, MA 02139, USA

B. I. Wu Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge, MA 02139, USA Progress In Electromagnetics Research, PIER 85, 115 131, 2008 SIZE BASED THROUGHPUT OPTIMIZATION OF DLY-ACK OVER THE IEEE 802.15.3 NETWORKS R. F. Lin and Y. Du The Electromagnetics Academy at Zhejiang

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Adaptive Two-Level Frame Aggregation in IEEE n WLAN

Adaptive Two-Level Frame Aggregation in IEEE n WLAN Adaptive Two-Level Frame Aggregation in IEEE 82.11n WLAN Youngsoo Kim, Edwin Monroy, Okhwan Lee, Kyung-Joon Park, and Sunghyun Choi Samsung Advanced Institute of Technology (SAIT), Kiheung, Korea School

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Experimental Study on Co-existence of b with Alien Devices

Experimental Study on Co-existence of b with Alien Devices Experimental Study on Co-existence of 8.b with Alien Devices Javier del Prado and Sunghyun Choi Philips Research Briarcliff USA, Briarcliff Manor, New York Email: {javier.delprado,sunghyun.choi}@philips.com

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis

Saturation Throughput of IEEE e EDCA Based on Mean Value Analysis Saturation Throughput of IEEE 80.11e EDCA Based on Mean Value Analysis Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia 33 Main Mall,

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks

Collision Free Hybrid Slot Protocol for Improving Performance in Wireless Networks International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 11, Number 8 (2018), pp. 1285-1300 International Research Publication House http://www.irphouse.com Collision Free Hybrid

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Error-Sensitive Adaptive Frame Aggregation in n WLANs

Error-Sensitive Adaptive Frame Aggregation in n WLANs Error-Sensitive Adaptive Frame Aggregation in 802.11n WLANs Melody Moh, Teng Moh, and Ken Chan Department of Computer Science San Jose State University San Jose, CA, USA Outline 1. Introduction 2. Background

More information

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks

Adaptive EDCF: Enhanced Service Differentiation for IEEE Wireless Ad-Hoc Networks Adaptive : Enhanced Service Differentiation for IEEE 82.11 Wireless Ad-Hoc Networks Lamia Romdhani, Qiang Ni, and Thierry Turletti INRIA Sophia Antipolis, 24 Route des Lucioles, BP-93, 692 Sophia Antipolis,

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Review on IEEE n Operation Base on MANET Routing Protocols

Review on IEEE n Operation Base on MANET Routing Protocols Review on IEEE 802.11n Operation Base on MANET Routing Protocols Mehdi Effatparvar and Babak Golaminia Abstract An ad hoc network is a dynamically reconfigurable wireless network with no fixed wired infrastructure.

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Bandwidth Allocation for DiffServ based Quality of Service over

Bandwidth Allocation for DiffServ based Quality of Service over Bandwidth Allocation for DiffServ based Quality of Service over 82.11 Martin Heusse, Paul Starzetz, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse,

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals

Adaptive Packetization for Error-Prone Transmission over WLANs with Hidden Terminals Adaptive Packetization for Error-Prone Transmission over 8.11 WLANs with Hidden Terminals Wei Song, Michael N. Krishnan, and Avideh Zakhor Video and Image Processing (VIP) Lab Department of Electrical

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard Chapter 2 Enhanced Back-Off Technique for IEEE 802.15.4 WSN Standard Aditi Vutukuri, Saayan Bhattacharya, Tushar Raj, Sridhar, and Geetha V Abstract IEEE 802.15.4 is the standard for Low-rate Wireless

More information

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved. WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless

More information

Research Article 2017

Research Article 2017 International Journal of Emerging Research in Management &Technology Research Article May 2017 Special Issue of International Conference on Emerging Trends in Science & Engineering (ICETSE 2017) Conference

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Converging Voice, Video and Data in WLAN with QoS Support

Converging Voice, Video and Data in WLAN with QoS Support Research Online ECU Publications Pre. 211 28 Converging Voice, Video and Data in WLAN with QoS Support Hushairi Zen Daryoush Habibi Justin Wyatt Iftekhar Ahmad 1.119/WOCN.28.4542485 This article was originally

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN 802.11 WIRELESS NETWORKS 1 AYINEBYONA ELIAB, 2 JONGSUN PARK AND JUNGMIN SO* Smart Computing Laboratory, Dept. of Computer Engineering,

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Strategies and Guidelines for Improving Wireless Local Area Network Performance

Strategies and Guidelines for Improving Wireless Local Area Network Performance Strategies and Guidelines for Improving Wireless Local Area Network Performance Dr Nurul Sarkar Associate Professor School of Computing and Mathematical Sciences nurul.sarkar@aut.ac.nz 2 Outline of Talk

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT COEXISTENCE MODEL OF ZIGBEE& IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar Abstract IEEE 802.15.4 standard is used for low rate, short distance

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information