Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract

Size: px
Start display at page:

Download "Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE. Abstract"

Transcription

1 Performance Enhancement of Multi-Rate IEEE 802. WLANs with Geographically-Scattered Stations Duck-Yong Yang, Tae-Jin Lee, Member, IEEE, Kyunghun Jang, Jin-Bong Chang and Sunghyun Choi, Member, IEEE Abstract In today s IEEE 802. Wireless LANs (WLANs), e.g., the popular IEEE 802.b, stations support multiple transmission rates, and use them adaptively depending on the underlying channel condition via link adaptation. It has been known that when some stations use low transmission rates due to bad channel conditions, the performance of the stations using high rates is heavily degraded, and this phenomenon is often referred to as performance anomaly. In this paper, we model the WLAN incorporating stations with multiple transmission rates in order to demonstrate the performance anomaly analytically. Note that all the previously-proposed models of the IEEE 802. assume a single transmission rate. We also develop possible remedies to improve the performance. Our solution is basically to control the access parameters such as the initial backoff window, the frame size, and the maximum backoff stage, depending on the employed transmission rate. Throughout simulations, we demonstrate that our analytical model is accurate, and the proposed mechanism can indeed provide the remedies to the performance anomaly by increasing the aggregate throughput up to six times. Index Terms CSMA/CA, DCF, Performance Anomaly, Link Adaptation, Backoff Algorithm, Throughput, IEEE 802.a/b/g. Duck-Yong Yang and Tae-Jin Lee are with the School of Information and Communication Engineering, Sungkyunkwan University, Suwon , KOREA. ( {ducky, tjlee}@ece.skku.ac.kr). Kyunghun Jang and Jin-Bong Chang are with i-networking Lab., Samsung Advanced Institute of Technology, Yongin , KOREA. ( {khjang, jinb.chang}@samsung.com). Sunghyun Choi is with the School of Electrical Engineering, Seoul National University, Seoul 5-744, KOREA. ( schoi@snu.ac.kr).

2 2 I. INTRODUCTION Since IEEE 802. standard was originally developed in 997 [], wireless LANs (WLANs) have been more and more accepted gradually, and recently they are being deployed widely in many different environments including campuses, offices, homes, and hot-spots. The number of Access Points (APs) in public hot-spots are expected to exceed 350,000 worldwide in 2007 [2]. The technology now starts being embedded into notebook PCs and PDAs so that no external adapters are required any more. This wide acceptance of WLANs may introduce some side-effects, which have not been conceived as serious problems so far. Today s IEEE 802. stations support multiple transmission rates, which are used for frame transmissions in an adaptive manner depending on the underlying channel condition. For example, the popular IEEE 802.b [3] supports four transmission rates, namely,, 2, 5.5, and Mbps, and the new highspeed 802.a [4] supports eight transmission rates from 6 to 54 Mbps. In nomadic systems such as WLANs without high mobility, the channel condition is often dominated by the distance between the transmitting and receiving stations. In such a case, the farther the distance between two stations, the lower the transmission rate employed typically. For example, in IEEE 802.b WLAN, as a station moves away from its AP, it decreases its transmission rate used for the transmissions to the AP from Mbps to Mbps. A mechanism to select one out of multiple available transmission rates is referred to as link adaptation. Link adaptation algorithms for IEEE 802. WLAN have been studied in [], [9], [5], [6], [0], [7]. Our main interest in this work is not the link adaptation algorithm itself, but the impact of the link adaptation on the overall performance of multi-rate IEEE 802. WLANs with geographically scattered stations. As pointed out in [2], the throughput performance of high-rate stations are heavily affected by low-rate stations, and they suffer from throughput degradation although they are near the AP. This is basically caused by the fact that the 802. Medium Access Control (MAC) provides a fair channel access among contending stations by giving the same channel access opportunities. Then, assuming that the same amount of data is to be transmitted over the wireless channel, the stations with lower rates, i.e., stations far from the AP, tend to grab the wireless channel longer than those with higher rates, i.e., stations near from the AP. Accordingly, the stations do not get their throughput linearly proportional to their transmission rate. This phenomenon is often referred to as performance anomaly of IEEE 802. In this paper, a high-rate (low-rate) station is referred to as a station using relatively higher (lower) transmission rates compared to other stations in the same WLAN.

3 3 showing unexpected performance degradation of the stations using high-rates, or near the AP. Therefore, the overall system performance is dominated by the stations with the lowest rate. This, of course, causes a serious resource leakage problem that needs to be avoided or mitigated. Considering that hot-spot areas with a lot of stations are being deployed at an ever increasing pace, this problem becomes even more important. Although the problem was discovered experimentally and studied via a simple analysis in [2], neither mathematical formulation of the problem nor remedies to improve the performance was considered. The authors of [8] also looked at the performance anomaly problem in the IEEE 802.b WLAN. They also proposed a scheme to handle the problem at the AP by controlling the number of frames to stations with bad link quality. However, it considers only the downlink transmissions. Note that the uplink transmissions cannot be handled by this kind of approach. There has been also an approach to reduce the impact of bad link by the transmission opportunity (TXOP) of IEEE 802.e [27]. In this paper, we formulate the performance anomaly problem using Markov chains and propose possible remedies to improve the performance. IEEE 802. WLAN uses the Distributed Coordination Function (DCF) mechanism to control stations to access the radio resources. Many research on the performance analysis of IEEE 802. Medium Access Control (MAC) have been conducted in [3]-[20] and [23], considering only a single transmission rate. Stations, however, typically use different transmission rates in practice, as studied in this paper. Analysis of IEEE 802. WLAN using Markov chains has been shown to provide rather accurate saturation throughput [3], [4], [5], [20], [23]. Based on the model of [3] and [4], an improved model has been presented in [20] by considering the maximum retransmission count. In [2], [22], and [26], an analytical model for a simple priority scheme providing a differentiated service in IEEE 802. is proposed. They also assume a single transmission rate. Saturation throughput and delay of different priority classes are derived analytically using a Markov chain model. They define three control parameters: initial contention window size, window-increasing factor, and maximum backoff stage. By appropriately selecting control parameters, they show service differentiation can be achieved. We show that one can combat the aforementioned performance anomaly via an appropriate control of MAC parameters. Among those MAC parameters, initial contention window size is shown to be the most effective parameter for the control of stations channel access. We present how much adjustment affects the system performance via both analysis and simulations. Our mechanism can easily be incorporated into existing WLAN systems, and help boosting the radio resource utilization.

4 4 The organization of the paper is as follows. We first present an analytical model to demonstrate the performance anomaly in Section II, and then propose an approach to improve the overall system performance, i.e., how to mitigate the performance anomaly using the initial contention window or size of frames in Section IV. We then illustrate examples and evaluate the performance in Section V. Simulation results are presented in Section V. Finally, we conclude in Section VI. II. MODELING OF SCATTERED STATIONS IN WLANS Let us consider IEEE 802.b WLAN supporting four transmission rates, namely,, 2, 5.5, and Mbps. Markov chain models for saturation throughput and delay of conventional and prioritized services in IEEE 802. have been studied in [3], [4], [20], [2], [22], [23] and [26]. In the pioneering models [4], [20], [2], they have built embedded Markov chains in which a state transition of the backoff counter occurs only when a slot is idle. Ziouva et al. [23] and Xiao [2], [22] improve the models so that the backoff counter stops when the channel is sensed busy. However, under their models, stations can transmit a new frame without entering a backoff stage if the channel is idle after each successful transmission. It is inconsistent with IEEE 802. standard since the IEEE 802. DCF requires a station to enter a backoff stage after each frame transmission irrespective of the channel status as well as the frame transmission success/failure. Based on this observation, Xiao constructs a new model [26], in which a successful transmission is followed by a backoff automatically. In addition, it imposes a frame retransmission limit in order to obtain the frame dropping probability. We note that all the previous models did not consider the link adaptation or multirate transmission which is inherent in today s IEEE 802. WLANs. That is, all stations are assumed to have the same channel quality so that their transmission rates are identical. In order to incorporate the link adaption, we construct a new Markov chain and model the behavior of high-rate and low-rate stations in a Basic Service Set (BSS) 2 of IEEE 802.b, and possibly IEEE 802.a. We assume that there is always another frame waiting for transmission once a frame is successfully transmitted, and it is referred to as saturated condition. To model the IEEE 802.b WLANs consisting of stations with various transmission rates, we group the stations in a BSS according to their transmission rates, i.e.,, 5.5, 2 and Mbps, and assign group ID i =, 2, 3 and 4 to each group of stations, respectively (see Fig. ). Now, we have four groups, i.e., the number of groups, N = 4. With these heterogeneous stations, Fig. 2 shows that the time durations to transmit a frame by a station 2 A BSS is a unit of an IEEE 802. WLAN, which is composed of a single AP and multiple associated stations.

5 5 : Wireless stations group4 group3 group2 group Mbps AP Mbps 2 Mbps 5.5 Mbps 50m 70m 90m 5m Fig.. Example of IEEE 802.b WLAN with geographically-scattered stations. in different groups are different, i.e., the lower the transmission rate, the longer the time to transmit a frame. Let w i,k be the backoff window for a station in group i at backoff stage k. In the conventional DCF mechanism using Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), all the stations in any group i have the same initial (at backoff stage 0) backoff window w i,0, for all i =, 2, 3, and 4. When the channel is idle during DCF interframe space (DIFS), each station selects a random backoff counter among [0, w i,0 ] slots and wait for the corresponding number of slots before attempting to access the wireless medium. The value of the backoff counter is decremented by one whenever a slot is sensed idle. If there are transmissions from other stations during this period, the backoff counter countdown is suspended. Then, when the channel becomes idle again, the station resumes its backoff process after a DIFS idle period. When the backoff counter value reaches zero, the station transmits the pending frame. If the frame collides with another frame in a transmission attempt, the colliding station increases its backoff window to minimize the collision probability, i.e., it increases the backoff stage by one. This increase occurs at every additional collision until the maximum backoff stage is reached. After that, the backoff window size remains constant until the backoff stage becomes equal to the retry limit. If the last transmission attempt in the retry limit phase fails, the frame is dropped. For backoff stage k, the backoff window w i,k becomes if L retry,i > u i, 2 k w i,0, 0 k u i, w i,k = 2 u i w i,0, u i k L retry,i,

6 6 B Backoff P PHY Header M MAC Header Station (Group) B P M Payload 500bytes Station2 (Group) Station3 (Group4) AP P M Payload 500bytes Mbps Ack Mbps Ack B P M Payload 500bytes Mbps Ack Time SIFS DIFS SIFS DIFS SIFS Fig. 2. Example of different transmission times by stations in different groups of IEEE 802.b WLAN; stations and 2 are in group corresponding to the transmission rate of Mbps, while station 3 is in group 4 corresponding to Mbps. if L retry,i u i, w i,k = 2 k w i,0, 0 k L retry,i, where L retry,i and u i denote the retry limit of group i and the maximum backoff stage of a station in group i, respectively. That is, each station selects a random backoff time among [0, w i,k ] slots at backoff stage k. Let U(i, t) be the random process representing the backoff stage of a station in group i, and C(i, t) be the random process representing the value of the backoff counter of a station in group i. A new random process X(i, t) = {U(i, t), C(i, t)} can be defined. Note that C(i, t) at slot time t is a uniform random variable in the range of [0, w i,k ]. Assuming the probability that a transmitted frame collides with another frame in a slot and the probability that the channel is busy in a slot are independent to the backoff mechanism, one can consider X(i, t) as a discrete time Markov chain. The state of the Markov chain is denoted as (i, k, l), i N, 0 k L retry,i, 0 l w i,k, where i, k and l represent group i, backoff stage k, and backoff counter value l, respectively. Let P {i, k, l i, k 0, l 0 } = P {U(i, t + ) = k, C(i, t + ) = l U(i, t) = k 0, C(i, t) = l 0 }. Then, the state transition probabilities of the Markov chain shown in Fig. 3 are obtained as follows:

7 7 $ $ % % &'(&) &'(&) *+ *+ " %! # &'(&) *+ % &'(&)! *+ Fig. 3. The state transition diagram of the stations in group i for the Markov chain model. P {i, k, l i, k, l + } = p b,i, 0 l w i,k 2 () P {i, k, l i, k, l} = p b,i, l w i,k (2) P {i, k, l i, k, 0} = p c,i /w i,k, k L retry,i, 0 l w i,k (3) P {i, 0, l i, k, 0} = ( p c,i )/w i,0, 0 k L retry,i, 0 l w i,0, (4) P {i, 0, l i, L retry,i, 0} = /w i,0, 0 l w i,0 (5) where p b,i and p c,i denote the probability that a station in group i senses the channel busy and the probability that a transmitted frame of a station in group i collides, respectively. The transition probabilities can be found by the followings: () the backoff counter decreases by one when a station senses that the channel is idle during a slot, (2) the backoff counter freezes when a station senses that the channel is busy, (3) a station chooses a backoff delay of the next backoff stage k after an unsuccessful transmission at backoff stage k, (4) a station chooses a backoff counter value using the backoff window of backoff stage 0 if its current frame was successfully transmitted, and it attempts to transmit a new frame 3, and (5) a station reaches the retry limit, and it attempts to transmit a new frame 3 A backoff procedure is always followed once a frame is successfully transmitted, which is often referred to as post backoff.

8 8 regardless of success or failure of the current transmission. Let s define the steady state distribution b i,k,l of the Markov chain for a station in group i, with backoff stage k and backoff counter value l, i.e., b i,k,l = lim t P {U(i, t) = k, C(i, t) = l}. One can derive the following relations regarding the steady state distributions. b i,k,0 = p k c,ib i,0,0, 0 k L retry,i (6) b i,k,l = w i,k l w i,k p b,i b i,k,0, 0 k L retry,i, l w i,k (7) L retry,i k=0 w i,k l=0 b i,k,l =. (8) Eqs.(6) and (7) can be derived from the balance equations in steady state, i.e., the sum of the transition probabilities out of a state times the probability in the state is equal to the sum of the transition probabilities from other states into the state times the probabilities in the states. Then, the stationary probability b i,0,0 can be found from the above equations. L retry,i ( w i,k ) b i,0,0 = p k w i,k l c,i + p b,i w i,k k=0 l= L retry,i ( = p k c,i + w ) i,k. (9) 2 ( p b,i ) k=0 All the stationary distributions b i,k,l can be computed using Eqs. (6) (9). In order to find the distributions, the probabilities p b,i and p c,i have to be known. They can be derived from the distributions b i,k,l as follows: First, the probability that a station in group i transmits a frame during a slot time is given by p t,i = L retry,i k=0 b i,k,0 = pl retry,i+ c,i b i,0,0, (0) p c,i since a station can send a frame when its backoff counter value reaches zero. In addition, the medium is sensed busy when at least one station other than the observing (sensing) station transmits. Therefore, one can further find p b,i as where n i denotes the number of stations in group i. N p b,i = ( p t,i ) n i ( p t,k ) n k, () k= k i On the other hand, a collision occurs when at least one station other than the current transmitting station transmits. Accordingly, p c,i is derived in

9 9 Backoff PHY Protocol Data Unit (PPDU) DIFS DIFS DIFS STA G STA G STA G STA G2 STA G2 STA G2 STA G3 STA G3 STA G3 STA G4 STA G4 STA G4 (a) (b) (c) Fig. 4. Examples of upper 3-heterogeneous collisions: (a) collision among a station in group 3, one in group and one in group 2, (b) collision between a station in group 3 and one in group, (c) collision between a station in group 3 and one in group 2. The collision time spent by a collision in (a), (b) and (c) is dominated by the station with the lowest rate. That is, it is determined by the transmission time of the station in group 3. STA Gi denotes a station in group i. a similar manner as N p c,i = ( p t,i ) n i ( p t,k ) n k. (2) Note that there is a difference between p b,i and p c,i, even though they look the same. In p b,i, the observing station is not transmitting but sensing, and in p c,i, it is transmitting. Using Eqs. (6) (0), () and (2), one can solve p t,i numerically. Let p b denote the probability that the channel is busy in a slot. Then, we have N p b = ( p t,k ) n k. (3) The probability p s,i that a station in group i has successfully transmitted in a slot is given by k= k= k i N p s,i = n i p t,i ( p t,i ) n i ( p t,k ) n k. (4) Then, the probability that the transmission is successful in a slot is N p s = p s,i. (5) i= The probabilities p b and p s are computed from Eqs. (3) and (5) for which p t,i in Eq. (0) is required. The above numerical expressions are based on the analysis for a single transmission rate in [26], and are further extended to consider multi-rate stations. Note also that if the number of stations in a group is given in a probabilistic manner, e.g., the numbers of stations in 4 groups are uniformly distributed, previous models [4], [23], [26] can be easily modified to obtain the saturation throughput. k= k i

10 0 upper 2-heterogeneous collision lower 2-heterogeneous collision Group Group 2 Group 3 Group 4 upper 3-heterogeneous collision upper 4-heterogeneous collision (a) upper 3-heterogeneous collision lower 3-heterogeneous collision Group Group 2 Group 3 Group 4 upper 4-heterogeneous collision (b) Fig. 5. Upper i- and lower i-heterogeneous collisions: (a) lower 2-heterogeneous collisions are included in upper 3- and 4-heterogeneous collisions; (b) lower 3-heterogeneous collisions are included in upper 4-heterogeneous collisions. Our model, however, can capture the behavior of the exact number of stations in each multi-rate group. Next, we need to find the collision probability in a multi-rate environment, which is distinct from the previous studies. When a collision occurs, the collision time is dominated by the longest transmission time (lowest transmission rate) among the transmission time involved in the collision as illustrated in Fig. 4. (It is assumed that all stations transmit the frames with the same size.) Note that the collision caused by the stations in group i, and the collision caused by the stations in group i and those in group j (i j) have different characteristics. To formulate the collision time of multi-rate stations, i.e., that of groups, we refer the former type of collision to as an i-homogeneous collision and the latter to as an i-heterogeneous collision, respectively. An i-heterogeneous collision could be either an upper i- heterogeneous collision or a lower i-heterogeneous collision, which are defined as a collision between the stations in group i and those in group j (j < i, i 2), and a collision between the stations in group i and those in group j (j > i, i 2), respectively. Since the lower i-heterogeneous collisions are included in the upper k-heterogeneous collisions (k > i), we need to consider only the upper i-heterogeneous collisions. For example, when the number of groups N = 4, the 2-heterogeneous collisions consist of the upper 2-heterogeneous collisions (i.e., collisions between group 2 and group ) and the lower 2-heterogeneous

11 collisions (i.e., collisions between group 2 and group 3 or 4). Then, the upper 4-heterogeneous collisions (i.e., collisions between group 4 and group, 2 or 3) and the upper 3-heterogeneous collisions (collisions between group 3 and group or 2) include the lower 2-heterogeneous collisions (see Fig. 5 (a)). Similarly, the upper 4-heterogeneous collisions include the lower 3-heterogeneous collisions (see Fig. 5 (b)). Let p hmcoll,i be the probability of the i-homogeneous collisions and p uhcoll,i be the probability of the upper i-heterogeneous collisions, respectively. Then, the probability p hmcoll,i is given by the probability that at least two stations in group i collide. That is, p hmcoll,i = ( ( ( p t,i ) n i + n i ( p t,i ) ni )) p t,i N ( p t,k ) n k, k= k i n i 2, i N. (6) Now, the probability p uhcoll,i is given by the probability that at least one station in group i and at least one station in group j (where j can be any value smaller than i) collide, i.e., ( ) i p uhcoll,i = ( p t,k ) n k ( ( p t,i ) n i ) p uhcoll,n = N k=i+ k= ( p t,k ) n k, n i, 2 i N, (7) ( ) N ( p t,k ) n k k= ( ( p t,n ) n N ). (8) Then, the probability p coll,i of the i-homogeneous or the upper i-heterogeneous collisions caused by the stations in group i or those in group i and j (j < i, i 2) is given by p coll, = p hmcoll, (9) p coll,i = p hmcoll,i + p uhcoll,i, 2 i N. (20) Now, we can determine the saturation throughput of the stations in group i. The normalized saturation throughput of the stations in group i can be computed as follows: S i = p s,i T P,i T E + T S + T C (2)

12 2 where T P,i = S MSDU,i 8/r i (22) and T E = ( p b ) T slot (23) N T S = p s,i T frame,i (24) T C = i= N p coll,i T coll,i (25) i= T frame,i = T H,i + T P,i + T SIF S + T prop +T ACK,i + T DIF S + T prop (26) T coll,i = T H,i + T P,i + T DIF S + T prop, (27) where S MSDU,i is the size of MAC Service Data Unit (MSDU) or payload of a MAC frame transmitted by the stations in group i in bytes, r i is the transmission rate of the stations in group i, T slot is the duration of a slot time, T frame,i is the average time duration during which the channel is sensed busy by the stations in group i because of a successful transmission, and T coll,i is the average time duration during which the channel is busy by collision, in which the transmission rate of group i is the lowest. And T SIF S is the duration of Short Interframe Space (SIFS), T DIF S is the duration of DIFS, T prop is the propagation delay, T ACK,i is the time spent to transmit an ACK frame by the stations in group i, T H,i is the time spent to transmit the PHY and MAC header by the stations in group i, and T P,i is the time spent to transmit an MSDU by the stations in group i. Assuming that the transmission rate of ACK frames is Mbps in the case of IEEE 802.b, T ACK,i and T H,i are given as follows: T H,i = 92bits/Mbps + 28bytes 8/r i T ACK,i = 92bits/Mbps + 4bytes 8/Mbps. Finally, the aggregate throughput S of the WLAN system is given by N S = (S i r i ). (28) i= III. PROPOSED REMEDIES TO PERFORMANCE ANOMALY When many stations are associated with the AP in a BSS, some stations are far away from the AP. These stations have a bad channel quality and the received signal strength is weak. In such a case, it is

13 3 more efficient to modulate the signal with a lower rate, which is often referred to as the link adaptation. However, if the rate becomes low, it takes more time to transmit the same amount of data. Therefore, lowrate stations can degrade the performance of the BSS significantly as stated above. We focus on WLANs where many stations are scattered, and propose methods that can improve the aggregate throughput of the network without adding any new type of management frames. To reduce the performance degradation by low-rate stations, we propose to control some MAC parameters of IEEE Since each station can know the current data rate which is determined by its own link adaptation algorithm, the amount of performance degradation by performance anomaly can be found from Eqs. (2) (28). It is influenced by such factors as the number of the stations in each group, the traffic load of each station, interference and noise in the channel. Since we have the equations associated with the performance degradation, it is possible to observe how the adjustment of the MAC parameters can ameliorate the performance degradation. We propose several mechanisms, and evaluate their effect. The parameters and control mechanisms that we consider are as follows: ) different initial backoff window size (w i,0 ) for different group i. 2) different frame size (S MSDU,i ) for different group i. 3) different maximum backoff stage (u i ) for different group i. 4) combination of ) and 2). The rationale to select the above parameters is as follows. The initial backoff window size (w i,0 ) determines the channel access probability by a station since a station is allowed to access the channel by the parameter in a probabilistic manner. The frame size (S MSDU,i ) determines the channel access time by a station since a station can occupy the channel during a frame transmission once the access is allowed. Similarly, the maximum backoff stage (u i ) affects performance by deciding how many times of channel access chances are permitted on collisions. Among them, the initial backoff window size and the frame size directly control channel access probability and time, and they are believed to be the most dominant performance factors. First, we consider a mechanism in which each group uses its own initial backoff window size. CSMA/CA tends to give all stations fairness from the viewpoint of the channel access probability. However, each group has a different transmission time for the same payload size. In order to improve this unfairness, the opportunity that the stations in a low-rate group access the wireless channel must be reduced. So we propose that the stations in low-rate groups have larger initial backoff window size than those in

14 4 high-rate groups. It was presented in [4] that the initial backoff window size affects the performance of a station significantly. Controlling the initial backoff windows can have another advantage. As the number of stations increases, the collision probability also increases. In such a case, increasing the initial backoff window of low-rate stations can reduce the collision probability as well [4]. Second, we note that the wireless medium is occupied longer when the frames of the low-rate stations are transmitted than those of high-rate stations are. In addition, every station can transmit frames of different size. This is not fair from the viewpoint of channel occupation time, and it also causes the performance degradation. To minimize this effect, the frame size of the low-rate stations could be reduced. In order to do so, the fragmentation threshold parameter can be controlled. We, however, evaluate this mechanism using fixed frame size, i.e., payload size, for the sake of convenience. Note that how to reduce the frame size of low-rate stations needs to be treated with care since there is a close relation between system utilization and frame size. That is, reducing the frame size might decrease the transmission efficiency of IEEE 802. MAC as will be demonstrated later. Next, we consider a mechanism allowing differentiated maximum backoff stages for different groups. The more stations there are, the more important the maximum backoff stage becomes due to increasing collisions. When a collision occurs, the frame is retransmitted with an increased backoff stage. If the maximum backoff stage is allowed to grow up, the maximum backoff window may become larger than 024, the default value. The maximum backoff stage u i can specify the size of the backoff window, e.g., when u i = 0 and initial backoff window w i,0, the maximum backoff window is limited to 32 even if many collisions occur due to many contending stations. If a station has a small backoff window, it is likely to select a small backoff counter value. Therefore, the maximum backoff window can affect the probability that stations access the medium. In order to differentiate the maximum backoff window, one can use smaller maximum backoff stage u i for high-rate stations or larger one for low-rate stations. Although the maximum backoff stage of low-rate stations is increased above the default value (u i 5, w i,0 ), it is expected to influence the performance insignificantly because the probability of successive collisions is very low. Instead, when there are a few high-rate stations and many low-rate stations coexist, a smaller maximum backoff stage for high-rate stations are expected to help increasing resource utilization. We, therefore, propose to reduce the maximum backoff stage of high-rate stations. Note that if there are many high-rate stations, this mechanism may not be effective. Finally, we consider a combination of two control mechanisms to reduce the performance anomaly, i.e., differentiated initial backoff windows and frame sizes for high-rate and low-rate stations. This integrated

15 5 control mechanism can minimize the chances and durations of hogging the wireless medium by low-rate stations, and compensates the performance degradation experienced by high-rate stations. Note that we should not kill out low-rate stations completely to increase the overall network performance. The value of the parameters used for our mechanism can be determined adaptively as required by the stations. For example, in the case of a few high-rate stations with real-time traffic, the initial backoff window of the low-rate stations can be adjusted to at most 64. When the channel is idle for a long time, low-rate stations can set their parameters to the default value, e.g., w i,0 and u i = 5. In the next section, we present the effect of the proposed mechanisms, e.g., w i,0 and 28 for i = and 4, respectively. In order to implement our mechanism, we consider a single BSS and further assume that all the stations in a BSS do not have hidden terminals so that stations can hear one another. Then, the following method can be possibly considered. All stations can monitor frame exchanges between other stations by observing the signal field in the PHY header of every frame, since the field contains the rate information. Note that the PHY header is always modulated using the most reliable Mbps rate irrespective of the rate used for the payload, and hence observe the signal field of each frame should be feasible. Each station then estimate how much amount of the channel time each group use. Based on this information, each station except the stations with the highest rate can decide how much they need to concede by controlling the MAC parameters. For example, when stations of Mbps consumes a large amount of channel, they can change their initial contention window size from 32 to 256. As a result, stations of 2, 5.5 or Mbps achieve more opportunities to access the channel. This method may incur some overhead to measure channel time of other stations, and control the parameters accordingly. However, it should not be a big overhead since 802. stations continue to sense the channel and receive any incoming frames due to the CSMA/CA operation. IV. PERFORMANCE EVALUATION In order to evaluate the performance, we consider a network topology composed of two stations in group ( Mbps) and varying number of stations in group 4 ( Mbps) as shown in Fig. 6. The number of stations in group 4 ranges from 2 to 4. The stations in group and those in group 4 can transmit data at rate r = and r 4 = Mbps, respectively. We note that the throughput of the system with CSMA/CA decreases as the number of stations increases because the probability of collision becomes larger [3][4]. When there are many stations, it is likely that more than one stations select the same

16 6 3 Station in high-rate group Station in low-rate group 4 AP Fig. 6. A network topology for performance evaluation. TABLE I PARAMETERS USED IN THE PERFORMANCE EVALUATION. Parameters Value Unit T H,i 92bits/Mbps bits/r i [sec] T ACK,i 92bits/Mbps + 4 8bits/Mbps [sec] r i, 5.5, 2, for i=,2,3,4 [Mbps] T SIF S 0 [µsec] T DIF S 50 [µsec] T slot 20 [µsec] T prop [µsec] backoff value. The parameters of IEEE 802.b used in the performance evaluation are summarized in Table I. Control response (ACK) frames in IEEE 802. should be transmitted at the highest rate in the BSS basic rate set that is less than or equal to the rate of the immediately previous frame in the frame exchange sequence [3]. We assume that ACK frames are transmitted at the rate of Mbps assuming that Mbps is the only rate in the BSS basic rate set. We also assume the long PHY Layer Convergence Procedure (PLCP) preamble (see Fig.7) [24]. If one wants to use the short PLCP preamble, one can change parameters in Table II. In order to have a better understanding on how the CSMA/CA protocol behaves and how the backoff procedure affects the system performance, we assume that the network is overloaded, i.e., each station has infinite number of frames to transmit. This corresponds to a saturated condition. We first look into improving the aggregate throughput through the differentiated initial backoff window. The highest-rate (i.e., Mbps) stations use the default initial backoff window, e.g., w,0, but low-

17 7 TABLE II PARAMETERS FOR SHORT PLCP PREAMBLE OPTION OF IEEE 802.B. Parameters Value Unit T H,i T ACK,i 72bits/Mbps + 48bits/2Mbps bits/r i [sec] 72bits/Mbps + 48bits/2Mbps + 4 8bits/2Mbps [sec] Long PLCP Mbps DBPSK, 2, 5.5 or Mbps Sync 28(bits) SFD 6 Signal 8 Service 8 Length 6 CRC 6 PSDU(MPDU) Variable PLCP frame PLCP Preamble PLCP Header PSDU (MAC frame) Short PLCP Sync 56(bits) SFD 6 Signal 8 Service 8 Length 6 CRC 6 PSDU(MPDU) Variable Mbps DBPSK 2Mbps DQPSK 2, 5.5 or Mbps Fig. 7. PLCP frame in IEEE 802.b. rate stations use larger initial backoff windows, e.g., w 4,0 52. Fig. 8 shows the total saturation throughput of the stations in group (S r from Eq. (2)) as well as that of the stations in group 4 (S 4 r 4 from Eq. (2)) as the initial backoff window for group 4, w 4,0 varies. The payload size of all stations is 2304 bytes, which corresponds to the maximum payload size of a MAC frame without using the security option in IEEE When the initial backoff windows are the same for both groups, i.e., w i,0, i =, 4, and there are two stations in group and six stations in group 4, the throughputs of groups and 4 are around 0.4 Mbps and 0.8 Mbps, respectively. It exhibits the exact behavior of the performance anomaly. Therefore, the saturation throughput of each station in group becomes only 0.2 Mbps although the stations in group have the good channel quality and use the transmission rate of Mbps. This analytical result is consistent with the simulation result in [2]. Moreover, the throughput decreases even more as the number of stations in group 4 increases. However, as we increase the initial backoff window of the stations in group 4 from w 4,0 to 64, 28, 256, and 52, while keeping the maximum backoff window size at 024, the performance anomaly phenomenon starts diminishing as shown in Fig. 8. Therefore, when w,0 and w 4,0 = 52 and the

18 8 Throughput [bps] 6 x Group 4, w 4,0 Group 4, w 4,0 = 64 Group 4, w 4,0 = 28 Group 4, w 4,0 = 256 Group 4, w 4,0 = Number of stations Fig. 8. Saturation throughput of each group with different initial backoff window w i,0 for different groups (n = 2, n 4 = 2 4). 5.5 x w i,0, 32 w i,0, 64 w i,0,28 w i,0,256 w i,0,52 4 Total throughput [bps] Number of stations Fig. 9. Total saturation throughput with different initial backoff window w i,0 for different groups. (n = 2, n 4 = 2 4). number of stations in group 4 is four (n = 2, n 4 = 4), the performance of group grows dramatically from 0.8 Mbps to 4 Mbps. The performance of group 4, of course, is a little sacrificed to around 0.5 Mbps. The overall performance gain, i.e., total throughput, is observed in Fig. 9. When there is no control over the performance anomaly, the aggregate saturation throughputs of both group and 4 are around.5 Mbps or below. As the different initial backoff windows are used for different groups, one can achieve the total throughput of up to 5.3 Mbps, which is more than three-fold improvement in link utilization. As the number of stations increases, the throughput is shown to decrease since the number of low-rate stations increases while that of high-rate stations is fixed thus resulting in more collisions. Next, we observe the impact of frame size. While we fix the size of the payload, i.e., MSDU for the high-rate stations, to S MSDU, = 2304 bytes, the maximum payload size, we vary the payload size of low-

19 9 Throughput [bps] 2.5 x Group, S MSDU, = 2304 Group 4, S MSDU,4 = 2304 Group, S MSDU, = 2304 Group 4, S MSDU,4 = 2000 Group, S MSDU, = 2304 Group 4, S MSDU,4 = 500 Group, S MSDU, = 2304 Group 4, S MSDU,4 = 000 Group, S MSDU, = 2304 Group 4, S MSDU,4 = Number of stations Fig. 0. Saturation throughput of each group with different frame size S MSDU,i for different groups (n = 2, n 4 = 2 4) x 06 S MSDU,i = 2304,2304 S MSDU,i = 2304,2000 S MSDU,i = 2304,500 S MSDU,i = 2304,000 S MSDU,i = 2304, 500 Total throughput [bps] Number of stations Fig.. Total saturation throughput with different frame size S MSDU,i for different groups (n = 2, n 4 = 2 4). rate stations from S MSDU,4 = 2304 to 500 bytes. In order to observe the impact of frame size, the same initial backoff windows for both groups are used, i.e., w,0 = w 4,0. We can see that the throughput of high-rate stations slightly increases as the size of the frames for the low-rate stations decreases as shown in Fig. 0. The total throughput is slightly increased from.2 Mbps to 2 Mbps when the number of low-rate stations is four, i.e., n 4 = 4 (see Fig. ). Therefore, the throughput gain is not significant when we reduce the size of the frames for the far or low-rate stations. In addition, we have investigated the effect of the maximum backoff stage. The maximum backoff stage of high-rate stations varies from u = 5 to 0 while that of low-rate stations is fixed at u 4 = 5. The default initial backoff window is 32 for both groups, i.e., w,0 = w 4,0. Fig. 2 depicts throughputs of group and group 4, respectively. Fig. 3 shows that the aggregate throughput is slightly increased

20 20 0 x Throughput [bps] Group, u = 5 Group 4, u 4 = 5 Group, u = 3 Group 4, u 4 = 5 Group, u = 2 Group 4, u 4 = 5 Group, u = Group 4, u 4 = 5 Group, u = 0 Group 4, u 4 = Number of stations Fig. 2. Saturation throughput of each group with different maximum backoff stage u i for different groups (n = 2, n 4 = 2 4)..7 x u i = 5, 5 u i = 5, 3 u i = 5, 2 u i = 5, u i = 5, 0 Total throughput [bps] Number of stations Fig. 3. Total saturation throughput with different maximum backoff stage u i for different groups (n = 2, n 4 = 2 4). by differentiating the maximum backoff stage. We observe that different maximum backoff stages for different groups have very little impact on differentiating high-rate groups from low-rate groups. The reason is that the nominal backoff stage tends to stay at lower value than 5, the default value of the maximum backoff stage, with high probability. For example, when two high-rate stations and 4 low-rate stations have the parameters of u = 0, w,0 and u 4 = 5, w 4,0, respectively, high-rate stations have the stationary distribution of b,k,0 = , 0.00, , and for k = 0,, 2, and 3, and b 4,k,0 = 0.056, 0.005, 0.006, and for k = 0,, 2, and 3. In the case of both differentiated backoff windows and differentiated frame sizes, the impact on improving performance is shown to be the greatest. In Fig 4, the dramatic performance improvement is observed as a larger initial backoff window and a smaller frame size for the low-rate stations are used.

21 2 Throughput [bps] 7 x Group, S MSDU, = 2304, w,0 Group 4, S MSDU,4 = 2304, w 4,0 Group, S MSDU, = 2304, w,0 Group 4, S MSDU,4 = 2000, w 4,0 = 64 Group, S MSDU, = 2304, w,0 Group 4, S MSDU,4 = 500, w 4,0 = 28 Group, S MSDU, = 2304, w,0 Group 4, S MSDU,4 = 000, w 4,0 = 256 Group, S MSDU, = 2304, w,0 Group 4, S MSDU,4 = 500, w 4,0 = Number of stations Fig. 4. Saturation throughput of each group with different initial backoff window w i,0 and frame size S MSDU,i for different groups (n = 2, n 4 = 2 4). 7 x S MSDU,i = 2304,2304, w i,0, 32 S MSDU,i = 2304,2000, w i,0, 64 S MSDU,i = 2304,500, w i,0,28 S MSDU,i = 2304,000, w i,0,256 S MSDU,i = 2304, 500, w i,0,52 Total throughput [bps] Number of stations Fig. 5. Total saturation throughput with different initial backoff window w i,0 and frame size S MSDU,i for different groups (n = 2, n 4 = 2 4). When the MAC payload size S MSDU,4 = 500 bytes and the initial backoff window w 4,0 = 52 for lowrate stations (S MSDU, = 2304 bytes and w,0 for high-rate stations), the performance of high-rate stations is recovered from far less than Mbps to more than 6 Mbps (when n = 2, n 2 = 4), which is a noticeable performance gain as shown in Fig. 5. It exhibits about six-fold link utilization increase achieved by the proposed integrated control mechanism. V. SIMULATION RESULTS In order to validate our analytical model, we conduct simulations, and compared analytical results with those from simulations using OPNET 0.0A [25]. Then, we have additionally simulated under non-

22 22 TABLE III PARAMETERS USED IN THE SIMULATION. Parameters Value Unit PHY header size 24 [bytes] MAC header + FCS size 28 [bytes] MSDU (payload) size [bytes] ACK size 4 + PHY header size [bytes] RTS threshold 3000 [bytes] Fragmentation threshold 2346 [bytes] Maximum backoff window size 024 [slots] Retry limit 7 saturated traffic conditions in order to investigate practical operating conditions since our analytical model assumes the saturated traffic condition. The same network configuration as the one in the analytical performance evaluation is used for simulations. The values of the parameters used for our simulation of an IEEE 802.b WLAN are summarized in Table III, in which FCS represents Frame Check Sequence based on CRC-32. In our simulation and analysis model, RTS threshold is set to 3000 bytes while the maximum payload size is 2304 bytes (resulting in the MAC frame size of 2332 bytes) so that RTS/CTS exchange is never used and the retry limit L retry,i is set to 7 which is the default value of the short retry limit. The use of RTS/CTS frames can reduce the collision time [4], and may improve the network performance when hidden terminals exist. We, however, do not consider the RTS/CTS mechanism because the effect of our remedies to performance degradation is expected to be similar. It is assumed that there is no fragmentation. In our simulations, the mechanism controlling the initial backoff window among our remedies to improve resource utilization is considered since the mechanism is simple and shows reasonable performance gain. Fig. 6 shows that the proposed analytical model is accurate. That is, the simulation results closely follows the analytic results. We also observe that when no control is applied, our analytical throughput matches with that of [2], e.g., when the number of stations equals to 6 (two high-rate stations and four low-rate stations), the throughput of group (high-rate stations), is about 0.4 Mbps and that of group 4 (low-rate stations) is about 0.8 Mbps. It exhibits that the throughput of each station in group is 0.2 Mbps (0.4 Mbps/2 stations) and that in group 4 is 0.2 Mbps (0.8 Mbps/4 stations).

23 23 Throughput [bps] 6 x Group 4, w 4,0 Group 4, w 4,0 = 64 Group 4, w 4,0 = 28 Group 4, w 4,0 = 256 Group 4, w 4,0 = Number of stations Fig. 6. Saturation throughput of each group: analysis (dotted line with symbols) and simulation results (solid line) (n = 2, n 4 = 2 4). Station in high-rate group Station in low-rate group Mbps 5.5 Mbps 2 Mbps Mbps 2 AP Fig. 7. BSS with one station moving away from the AP and four stationary stations. Next, we simulate the environment where there are five stations composed of one moving station and four stationary high-rate stations near the AP (see Fig. 7). As station 5 moves away from the AP, i.e., the data rate of the station is decreased by the link adaptation, the throughputs of the high-rate stations are decreased significantly. Figs. 8 and 9 show the simulation results of the throughput performance for each group and aggregate throughput, respectively. Group represents four stationary high-rate stations transmitting at Mbps and group 2 represents the single station (i.e., station 5) moving away from the AP for notational convenience. When every station transmits frames at Mbps, we can achieve the maximum throughput. When there is no control over the performance anomaly (w,0 = w 2,0 ), the total saturation throughput of the high-rate group decreases dramatically as station 5 moves away from the AP (by adapting the transmission rate from to Mbps). If our proposed mechanism using differentiated w i,0 is used, we can reduce the performance anomaly effect. That is, we could increase the throughput of four high-rate stations from 2.2 Mbps to 6.4 Mbps when the low-rate station s transmission rate is Mbps

24 24 8 x Throughput (bps) Group 2, w 2,0 Group 2, w 2,0 = 64 Group 2, w 2,0 = 28 Group 2, w 2,0 = 256 Group 2, w 2,0 = Data rate of low rate group (Mbps) Fig. 8. (group ) in a BSS. Saturation throughput of each group when there are one moving low-rate station (group 2) and four stationary high-rate stations 7.5 x Total throughput (bps) W i,0, 32 W i,0, 64 W i,0, 28 W i,0, 256 W i,0, Data rate of low rate group (Mbps) Fig. 9. (group ) in a BSS. Total saturation throughput of stations when there are one moving low-rate station (group 2) and four stationary high-rate stations in our simulation. When the rate of station is 5.5 Mbps, the throughput of high-rate stations increase from 4.9 Mbps to 7 Mbps. In addition to the simulations under the saturated condition, we simulate the proposed mechanism in unsaturated environments. The network consists of one low-rate ( Mbps) station and four high-rate ( Mbps) stations as shown in Fig. 7. We assume that all stations have the same traffic load and it varies from low load to high load. Therefore, each station has the same traffic load varying from 0.5 Mbps to 4 Mbps, and the payload size is 2304 bytes as used above. Note that group 2 represents the low-rate station ( Mbps) for notational convenience. Our proposed mechanism, which controls the initial backoff window, is still able to reduce the performance anomaly effect very well.

25 25 7 x Throughput (bps) Group 2, w 2,0 Group 2, w 2,0 = 64 Group 2, w 2,0 = 28 Group 2, w 2,0 = 256 Group 2, w 2,0 = Traffic load of each node (Mbps) Fig. 20. Non-saturation throughput of each group as the traffic load of each station increases from 0.5 Mbps to 4 Mbps x 06 w i,0, 32 w i,0, 64 w i,0, 28 w i,0, 256 w i,0, 52 Total throughput (bps) Traffic load of each node (Mbps) Fig. 2. Total non-saturation throughput as the traffic load of each station increases from 0.5 Mbps to 4 Mbps. Fig. 20 shows the throughput of each group as the traffic load of each station increases. The traffic load of 4 Mbps per station is close to the saturated condition. Fig. 2 shows the aggregate throughput of five stations. When traffic load is low, i.e., an unsaturated condition, the aggregate throughput is low. As the load increases, our mechanism improves throughput considerably while the legacy mechanism shows very little increment. When the legacy uncontrolled mechanism is used, the total throughput increases from 2.5 Mbps to 2.7 Mbps. However, when our control mechanism is employed, it increases from 2.5 Mbps to 6.4 Mbps in our non-saturated traffic simulation. Finally, we conduct the performance evaluation and comparison between IEEE 802.b with our remedy and IEEE 802.e with TXOP [28]. IEEE 802.e is proposed to provide Quality of Service (QoS) and enhance legacy IEEE 802., and is being finalized. In an attempt to increase channel

26 26 5 Group4, w 4,0 =52 to Group, w,0 =32 Group4, w 4,0 =256 to Group, w,0 =32 Group4, w 4,0 =28 to Group, w,0 =32 Group4, w 4,0 =64 to Group, w,0 =32 Group4, w 4,0 =32 to Group, w,0 =32 Group4, TXOP4 to Group, TXOP4 Group4, TXOP40 to Group, TXOP40 0 Throughput Ratio Number of low rate stations Fig. 22. Throughput ratio of IEEE 802.b with our remedy and that of IEEE 802.e with TXOP (n = 0, n 4 = 0). utilization it allows frame burst in a TXOP. Note that while legacy stations have to wait for a backoff interval as well as DIFS to transmit a frame, IEEE 802.e stations have to wait for only SIFS (<DIFS) to transmit a frame within a TXOP. In the simulations, ten Mbps high-rate stations (group ) and a varying number of Mbps low-rate stations (group4) are employed under the saturation condition. The number of the low-rate stations ranges from to 0. The size of MSDU is fixed to 024 bytes for both high-rate and low-rate stations. The throughput ratio between a low-rate station and a high-rate station is shown in Fig. 22, where TXOP4 (TXOP40) represents the performance of IEEE 802.e with the TXOP of 4 msec (40 msec). As shown in the curve with the circle legend, the legacy IEEE 802.b DCF without our remedy exhibits performance anomaly, i.e., the per-station throughput values of group and group 4 are the same (i.e., ratio=). Fig. 22 shows that the throughput differentiation between high-rate and low-rate groups with our proposed mechanism can be better than that with TXOP. More specifically, our mechanism can provide a variety of the throughput ratio from to 4 as the window size varies. On the other hand, IEEE 802.e with TXOP yields the throughput ratio of 8 9. Moreover, low-rate stations may have to fragment MSDUs in a TXOP unnecessarily in the case of small TXOPs. Although back-to-back transmission of multiple transmissions in a TXOP of IEEE 802.e reduces transmission overheads, our remedy can achieve flexible throughput sharing between the low-rate and the high-rate groups, thus resulting in higher aggregate throughput improvement. From this observation, our proposed mechanisms which control the IEEE 802. DCF parameters can also be combined with the TXOP mechanism of IEEE 802.e to further enhance the performance.

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

EBA: An Enhancement of IEEE DCF via Distributed Reservation

EBA: An Enhancement of IEEE DCF via Distributed Reservation EBA: An Enhancement of IEEE 802.11 DCF via Distributed Reservation Jaehyuk Choi, Joon Yoo, Sunghyun Choi, Member, IEEE, and Chongkwon Kim, Member, IEEE Abstract The IEEE 802.11 standard for Wireless Local

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Performance Anomaly of b

Performance Anomaly of b Performance Anomaly of 8.11b Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse, rousseau, gberger, duda}@imag.fr Abstract We analyze

More information

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013

More information

Performance Study of IEEE DCF and IEEE e EDCA

Performance Study of IEEE DCF and IEEE e EDCA 4 erformance Study of IEEE 802. DCF and IEEE 802.e EDCA Giuseppe Bianchi a, Sunghyun Choi b and Ilenia Tinnirello c 4. Introduction One of the key factors for the wide acceptance and deployment of IEEE

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Adaptive Two-Level Frame Aggregation in IEEE n WLAN

Adaptive Two-Level Frame Aggregation in IEEE n WLAN Adaptive Two-Level Frame Aggregation in IEEE 82.11n WLAN Youngsoo Kim, Edwin Monroy, Okhwan Lee, Kyung-Joon Park, and Sunghyun Choi Samsung Advanced Institute of Technology (SAIT), Kiheung, Korea School

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Modeling and Analysis of TCP Dynamics over IEEE WLAN

Modeling and Analysis of TCP Dynamics over IEEE WLAN Modeling and Analysis of TCP Dynamics over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi School of Electrical Engineering and INMC Seoul National University, Seoul, Korea Email: jgyu@mwnl.snu.ac.r and schoi@snu.ac.r

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

An Efficient Multipolling Mechanism for IEEE Wireless LANs

An Efficient Multipolling Mechanism for IEEE Wireless LANs An Efficient Multipolling Mechanism for IEEE 802.11 Wireless LANs Shou-Chih Lo Guanling Lee Wen-Tsuen Chen Department of Computer Science, National Tsing Hua University, Taiwan Department of Computer Science

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Measuring Transmission Opportunities in Links

Measuring Transmission Opportunities in Links 1516 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Measuring Transmission Opportunities in 802.11 Links Domenico Giustiniano, David Malone, Douglas J. Leith, and Konstantina Papagiannaki,

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Group-Based Medium Access for Next-Generation Wireless LANs

Group-Based Medium Access for Next-Generation Wireless LANs Group-Based Medium Access for Next-Generation Wireless LANs Zakhia Abichar, J. Morris Chang, and Daji Qiao Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 50011 E-mail: {abicharz,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

High-Throughput and Enhanced-QoS Technologies in Wireless LAN

High-Throughput and Enhanced-QoS Technologies in Wireless LAN High-Throughput and Enhanced-QoS Technologies in Wireless LAN Sunghyun Choi, Ph.D., Assistant Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National University

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Bandwidth Allocation for DiffServ based Quality of Service over

Bandwidth Allocation for DiffServ based Quality of Service over Bandwidth Allocation for DiffServ based Quality of Service over 82.11 Martin Heusse, Paul Starzetz, Franck Rousseau, Gilles Berger-Sabbatel, Andrzej Duda LSR-IMAG Laboratory Grenoble, France email: {heusse,

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs

A Scheme for Enhancing TCP Fairness and Throughput in IEEE WLANs A Scheme for Enhancing TCP Fairness and Throughput in IEEE 802.11 WLANs Eun-Jong Lee 1, Hyung-Taig Lim 1, Seung-Joon Seok 2, and Chul-Hee Kang 1 1 Department of Electronics Engineering, Korea University

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

On the Performance Characteristics of WLANs: Revisited

On the Performance Characteristics of WLANs: Revisited On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS

DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN WIRELESS NETWORKS DIMINISHING MAC OVERHEAD BY USE OF PERIODIC AND COOPERATIVE ACK SCHEMES IN 802.11 WIRELESS NETWORKS 1 AYINEBYONA ELIAB, 2 JONGSUN PARK AND JUNGMIN SO* Smart Computing Laboratory, Dept. of Computer Engineering,

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

A Cooperative MAC Protocol for Wireless Local Area Networks

A Cooperative MAC Protocol for Wireless Local Area Networks A Cooperative MAC Protocol for Wireless Local Area Networks Pei Liu, Zhifeng Tao and Shivendra Panwar The Department of Electrical and Computer Engineering, Polytechnic University 6 MetroTech Center, Brooklyn,

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Performance Analysis of IEEE e EDCA with QoS Enhancements through TXOP based Frameconcatenation

Performance Analysis of IEEE e EDCA with QoS Enhancements through TXOP based Frameconcatenation Performance Analysis of IEEE 802.11e EDCA with QoS Enhancements through TXOP based Frameconcatenation and Block-acknowledgement Abstract Pradyot Kanti Hazra, Associate Professor, Asok De, Professor Department

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

Throughput Enhancement of IEEE WLAN for Multimedia Communications.

Throughput Enhancement of IEEE WLAN for Multimedia Communications. Enhancement of IEEE 82.11 WLAN for Multimedia Communications. T.M Nazmul Huda Blekinge Institute of Technology (BTH) Karlskrona, Sweden tmnazmulhuda@yahoo.ca Abstract: This paper mainly focuses on the

More information