Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs
|
|
- Virginia Lambert
- 5 years ago
- Views:
Transcription
1 Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab
2 Outline Introduction and Related Work System Model The Double-Loop Receiver-Initiated MAC Scheme Performance Analysis (Brief) Numerical Results Summary and Discussions 2
3 Introduction and Related Work 3
4 Data Dissemination Service Main characteristics: 1) Data traffic is generated by a content server in the Internet and destined to a group of nomadic nodes roaming in the network region; 2) Can tolerate some delay Example 1: Traffic information downloading Example 2: Entertainment content distribution Example 3: Commercial advertising (e.g., a flyer from Food Basics) Question: How to deliver the service? 4
5 Available Network Infrastructures Wireline networks e.g., home Wireless local area networks (WLANs) e.g., home/work Cellular network e.g., anywhere with $ cost Any others (@ anywhere with less/no $ cost)? 5
6 Roadside WLAN (RS-WLAN) Idea: Use what we have rather than deploy new infrastructures (e.g., RSUs)! FON (a company operating five million hotspots in the world) London, England (picture from Google Maps) Hotspots are privately owned, but mutually shared (i.e., free) among Foneros 6
7 Research Issues How to improve the data delivery rate to nomadic nodes walking/ driving/passing(by other means) through the coverage area of an RS-WLAN? How to design an efficient medium access control (MAC) scheme? Related Work Drive-thru Internet Direct transmission from the AP (like RSU) Cooperation Exploits spatial/temporal diversity among local users Delay tolerant cooperation (DTCoop) Exploits the delay tolerance Transmitter-initiated cooperative MAC 1) Achieves channel diversity; 2) Overhead of RTS/CTS message transmission Receiver-initiated MAC 1) Reduces MAC overhead by suppressing RTS message transmission; 2) Without channel diversity 7
8 System Model 8
9 Cooperative Data Dissemination (1/2) Resource management within each RS-WLAN Bandwidth: a) A superframe structure; b) Each dedicated phase is assigned to one nomadic node, while different dedicated phases are shared among nomadic nodes (because of the delay tolerance) Buffer space: a) Storage local nodes; b) Non-storage local nodes Energy: Participation in cooperation (e.g., laptops) 9
10 Cooperative Data Dissemination (2/2) Delay tolerant cooperation (DTCoop) Step 1) Packet pre-downloading Step 2) Packet scheduling Benefits 1) Relieves the limitation on wireline bandwidth 2) Spatial diversity: Enlarges the coverage area of an RS-WLAN 3) Temporal diversity: Improves the packet transmission rate Limited Bandwidth Focus of this talk: How to design an efficient MAC scheme to realize DTCoop? 10
11 Assumptions (1/2) Packet pre-downloading is completed before the arrival of a nomadic node (e.g., on-demand pre-downloading based on cellular networks or stochastic pre-downloading based on historic mobility information) Pedestrian nomadic node Large wireline bandwidth Single-hop (all connected) RS-WLAN There are M possible wireless transmission rates. The signal-tonoise ratio (SNR) threshold of the mth rate is 11
12 Assumptions (2/2) The traffic of the data dissemination service is partitioned into packets with equal size The packet transmission rate from local node i to the visiting nomadic node (including the transmission of the ACK message and packet relaying overhead) Storage local node Time of first-hop packet transmission (information available to all local nodes) T P (m) is the packet transmission time at the mth transmission rate Non-storage local node T SIFS, T HR, and T ACK are the time durations of short interframe space (SIFS), helping request message, and ACK message, respectively 12
13 The Double-Loop Receiver-Initiated MAC (DRMAC) Scheme 13
14 Concept and Overview (1/2) Time Correlation of a Wireless Channel Example: A Rayleigh fading 5 GHz frequency 1.2 m/s mobility speed => maximum Doppler frequency = 20 Hz Channel coherence time Packet transmission time Channel coherence time = 1 / maximum Doppler frequency 14
15 Concept and Overview (2/2) The outer-loop MAC is performed at a low frequency to determine the contention group (CG) membership for spatial diversity Only the CG members can participate in channel contention The inner-loop MAC is performed at a high frequency to select the transmitter node for temporal diversity The ACK message is used as a receiver-initiated contention invitation to reduce MAC overhead 15
16 The Outer-Loop MAC Each local node i estimates its instantaneous packet transmission rate ( ) to the nomadic node based on the signal-to-noise ratio (SNR) of each ACK message it received Based on the historic estimations, the average packet transmission rate ( ) is calculated by each local node and reported to the AP A group of N C local nodes (including the AP) with the highest average transmission rates are selected as the CG members The AP broadcasts a CG notification message to notify all local nodes about the CG membership and a descending order in terms of the average transmission rate 16
17 The Inner-Loop MAC (1/5) Contention by Invitation (i.e., Not Invited => Not Contend) Each ACK message from the nomadic node carries the rate index of the previous transmission (m Tx ) The rate of the previous transmission (R Tx ) can be calculated based on the receiver address field of the ACK message (corresponding to the ID of the previous transmitter node, i Tx ) and the value of m Tx If a CG member has a higher rate than (R Tx ), it is invited and will join the channel contention 17
18 The Inner-Loop MAC (2/5) Contention by Invitation (Cont d) The invited CG member sends a short burst after the previous ACK message, as a contention request A deterministic backoff begins with the kth potential (invited) CG member backoffs for (k - 1) slots before its transmission kth potential CG member wins the contention 18
19 The Inner-Loop MAC (3/5) Contention by Invitation (Cont d) The group of all potential invited CG members Previous transmitter node Rate of previous transmission Group of CG members The potential invited CG members are sorted according to a descending order of the one-step higher transmission rate 19
20 The Inner-Loop MAC (4/5) CG attachment At the beginning of a new dedicated phase, the value of m Tx indicated in the previous ACK message becomes out-of-date Each dedicated phase begins with a dedicated phase assignment message broadcasted by the CG member with the highest average transmission rate to the nomadic node 20
21 The Inner-Loop MAC (5/5) CG attachment (Cont d) Deterministic backoff and rate notification The nth CG member will start transmission immediately if no other transmissions are detected for a duration of T SIFS and (N C - n) slots Nomadic Node SIFS RR SIFS Beginning of Deterministic Backoff DA: dedicated phase assignment HR: helping request RN: rate notification RR: receiving request ACK (N C -1) slots 1st CG Member n th CG Member DA Beginning of Dedicated Phase RN SIFS Deferred Backoff T O L S (n-2) slots RN SIFS T O L S Deferred Transmission (N C -n) slots HR Data SIFS Traffic Source of the n th CG Member T O L S nth CG member wins the rate notification T O L S T O L S T O L S T O L S SIFS Data SIFS 21
22 Performance Analysis (Brief) 22
23 Key: Finite-State Markov Chain based Channel Model Time duration One-step higher transition probability One-step lower transition probability Probability of transmission rate m Maximum Doppler frequency Average SNR Probability of no rate change 23
24 How the Channel Model is Used? Duration of contention-by-invitation Use the one-step transition probabilities, given the current transmission rate of CG members Duration of CG attachment Iterative calculation based on the success/failure of transmitting each dedicated phase assignment message (like coin flipping, but with one-step memory) 24
25 Numerical Results 25
26 System Parameters Parameter Speed of Nomadic Node Value 1.5 m/s Pathloss Exponent 3 Radius of RS-WLAN Neighbour Discovery Range Rayleigh Fading Model Length of Packet 25 m 50 m Jake s Simulator 1000 bytes Circular topology: Local nodes are evenly distributed on two circles with radius r/2 and 3r/4, respectively. The two circles include the same number of local nodes, and half of the local nodes can provide packet storage capabilities 26
27 Performance Evaluation of the DRMAC Scheme The effect of N C on the proposed MAC scheme, without MAC overhead The effect of N C on the proposed MAC scheme, including MAC overhead 27
28 Performance Comparison among Different MAC Schemes Receiver-initiated MAC: CTS/data/ACK. Modified by inviting the storage local node with the highest average transmission rate to the nomadic node Transmitter-initiated cooperative MAC: RTS/CTS/data(direct transmission or relay transmission)/ack IEEE MAC: RTS/CTS/data/ACK Direct transmission 28
29 Performance Comparison among Different MAC Schemes (Cont d) The effect of movement speed on different MAC schemes 12 local nodes, (π/8, 0) The effect of movement speed on different MAC schemes 20 local nodes, (π/16, 3π/4) 29
30 Summary and Discussions 30
31 Main Contributions Achieve the cooperative diversity gain based on a receiverinitiated MAC Scheme Utilize the time correlation of a wireless channel to reduce the signalling overhead A novel analytical model is established using a finite-state Markov chain based channel model to characterize the time correlation 31
32 Discussions Extension to Vehicular Nomadic Nodes Issues on wireless channel: 1) High mobility => Difficult to obtain accurate channel state information; 2) Predictable mobility => Predictable channel? Issues on packet pre-downloading: 1) Less predictable mobility than train or bus; 2) More predictable mobility than pedestrian 32
33 Thank you! 33
Cooperative Data Dissemination via Roadside WLANs
Cooperative Data Dissemination via Roadside WLANs 1 Hao Liang and Weihua Zhuang Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1 Email: {h8liang,
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationPROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION
PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 ISSN
1646 Buffer Management for Efficient Data Dissemination in Vehicular Network Sowmya E K, Manoj Challa, K Sundeep Kumar Abstract- As there is a tremendous increase in the demand for the data dissemination
More informationDTCoop: Delay Tolerant Cooperative Communications in DTN/WLAN Integrated Networks
DTCoop: Delay Tolerant Cooperative Communications in DTN/WLAN Integrated Networks Hao Liang and Weihua Zhuang Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario,
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationComputer Networks. Wireless LANs
Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationCARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationHOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS
HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS THE WI-FI COMMUNICATION PROCESS MECHANICS MECHANICS: HOW WI-FI COMMUNICATION WORKS WHAT WE LL BE COVERING Brief Discourse on Frame Types Discovery of Wi-Fi
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationIEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA
RARA: Rate Adaptation Using Rate-adaptive adaptive Acknowledgment for IEEE 802.11 WLANs IEEE Consumer Communications & Networking Conference (CCNC) 2008, Las Vegas, USA 정하경 Hakyung Jung School of Computer
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More information3.1. Introduction to WLAN IEEE
3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to
More informationCo-existence of WiFi and ZigBee
Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1 Coexistence
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationLink Layer II: MACA and MACAW
Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCenter for Networked Computing
Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationWLAN Performance Aspects
Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationOptional Point Coordination Function (PCF)
Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function
More informationSample Solution to Problem Set 3
College of Computer & Information Science Fall 2007 Northeastern University Handout 6 CSG250: Wireless Networks 25 October 2007 Sample Solution to Problem Set 3 (The problem numbers from the text are the
More informationMeasurements in the wireless
Contents Measurements in the wireless Lecture slides for S-38.3183 6.4.2006 Mika Ilvesmäki Motivation Wireless environment spesifics Wireless trace collection Wireless measurement methods Mobility measurements
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationRouting Performance Analysis in Delay Tolerant Networks
Routing Performance Analysis in Delay Tolerant Networks Presenter: Hao Liang Main References: [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application
More informationShared Access Networks Wireless. 1/27/14 CS mywireless 1
Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationInteractions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University Broadnets 2006 San Jose, October 4, 2006 Very Wide Range of
More informationOn exploiting spatial reuse in wireless ad hoc networks
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationIntroduction to IEEE
Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationEnergy-Efficient Clustering/Routing for. Cooperative MIMO Operation in Sensor Networks
Energy-Efficient Clustering/Routing for 1 Cooperative MIMO Operation in Sensor Networks Mohammad Z. Siam and Marwan Krunz Department of Electrical and Computer Engineering Ossama Younis Applied Research,
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationAppendix A Pseudocode of the wlan_mac Process Model in OPNET
Appendix A Pseudocode of the wlan_mac Process Model in OPNET static void wlan_frame_transmit () { char msg_string [120]; char msg_string1 [120]; WlanT_Hld_List_Elem* hld_ptr; const WlanT_Data_Header_Fields*
More informationOn Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction
More informationChapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network
Chapter 6 Wireless and Mobile Networks Computer Networking: Top Down pproach 5 th edition. Jim Kurose, Keith Ross ddison-wesley, pril 009. Chapter 6: Wireless and Mobile Networks ackground: # wireless
More informationApplication-Oriented Multimedia Streaming over Wireless Multihop Networks
Application-Oriented Multimedia Streaming over Wireless Multihop Networks Luan, Hao (Tom) BBCR Lab, ECE Department University of Waterloo May 11, 2009 1 / 21 Multimedia Streaming Display of audio-visual
More informationIEEE WLANs (WiFi) Part II/III System Overview and MAC Layer
IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed
More informationM06:Wireless and Mobile Networks. Corinna Schmitt
M06:Wireless and Mobile Networks Corinna Schmitt corinna.schmitt@unibas.ch Acknowledgement 2016 M06 2 Background q # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)!
More informationModeling of Partially Overlapping Wireless Personal Area Networks
Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationMd. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne University, Australia
Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC with and without Retransmissions Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross ( 6th ed.); 7.1 7.3, Kurose and Ross (7th ed.) 1 Questions How do you use wireless network technology in
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationA Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer
Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationInternet of Things (IoT): Wide-area IoT protocols*
Internet of Things (IoT): Wide-area IoT protocols* *Long-range IoT radio access technologies (RATs) Tampere University of Technology, Tampere, Finland Vitaly Petrov: vitaly.petrov@tut.fi People-centric
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More information