Real-Time Traffic in Ad-hoc Sensor Networks

Size: px
Start display at page:

Download "Real-Time Traffic in Ad-hoc Sensor Networks"

Transcription

1 Real-Time Traffic in Ad-hoc Sensor Networks Luciano Bononi Computer Science Department University of Bologna 4127 Bologna, Italy Lorenzo Donatiello Computer Science Department University of Bologna 4127 Bologna, Italy Marco Furini DSSCQ Department University of Modena and Reggio Emilia 421 Reggio Emilia, Italy Abstract The usage of sensors is emerging in the nowadays scenario where safety related applications are more and more used. These applications have timing constraints that need to be met by the control system. Thus, guaranteeing timeliness properties is considered a key challenge for research on wireless sensor networks. Among the different components that need to address this problem, we focus on the communication subsystem and, in particular, on the MAC protocols that handles transmissions. To provide timeliness behavior, the employed MAC protocol has to provide a time-bounded service. The contribution of this paper is to investigate the performance of two wireless MAC protocols that can be employed in wireless sensor networks: IEEE 82.11e and. The former is part of the well know IEEE standard, whereas the latter has characteristics that well fit the requirements of wireless sensor networks. Results show that two protocols have similar performances for networks with limited devices and/or traffic, whereas when devices and/or traffic increases, has to be preferred. I. INTRODUCTION Sensor networks are used in many areas, from defence and surveillance to health or intelligent homes, and applications based on wireless sensor networks are emerging nowadays [1], [2], [3]. Examples include safety related applications (e.g., fire monitoring), environment observation (e.g., highway traffic monitoring), health control (e.g., medical care), and weather forecast (e.g., flooding control). Many of these sensor-based applications have timing constraints that require a sensor to: i) sense a physical phenomenon (e.g., temperature), ii) process the sensed value, and iii) communicate with other sensors, in a bounded and guaranteed time. The importance of timing constraints in wireless sensor networks is growing, and guaranteeing a timeliness behavior is considered a key challenge for research on wireless sensor networks [4]. The respect of the application timing constraints needs to be addressed by the whole system that handles the application: from wireless networking protocols to operating systems, from middleware services to data management, from programming models to theoretical analysis [5]. Looking at the communication sub-system, the network should guarantee an upper bound to the worst-case transmission time in order to support sensor-based applications that have timing constraints [6]. In fact, communication in a timely fashion is fundamental to correctly support real-time applications. Since timely communication is typically supported at the Medium Access Control (MAC) layer, the employed MAC protocol has to provide a time-bounded service [7]. Many new MAC protocols are currently being proposed and tested for wireless sensor networks, but most of them focus on energy efficiency, and not on timing constraints [8]. Therefore, MAC protocols with timing features are desirable. One can think of using real-time MAC protocols designed for ad-hoc networks, but although wireless sensor network and ad-hoc networks have several common characteristics, there are few important differences: in ad-hoc networks, nodes cooperatively organize themselves into a communicating radio network, moving and adapting to changes in the environment, whereas in sensor networks sensors slightly move or do not move at all. However, this does not mean that wireless sensor networks have fixed topology; in fact, changes may occur because of the changing nature of the wireless link and the death of sensors due to technical problems or battery exhaustion. Another important difference is that communication among nodes in ad-hoc networks might be done in a multi-hop way, each node being a router for other nodes communications, whereas in sensor networks the communication among nodes is likely to be done in multi-hop transmissions, as the node s embedded radio interface might be not powerful enough for the signal to reach the destination in one hop; therefore intermediate nodes are used to relay messages. In the literature, different wireless MAC protocols have been proposed to deal with real-time transmission. For instance, IEEE 82.11e is an amendment of the well-know IEEE and aims at supporting real-time transmissions in a wireless environment; TBMAC [9] provides a delay bounded service using CDMA technology to avoid transmission collisions: the delay bounded service is provided requiring all the mobile hosts to have a common clock and the system needs to be aware of the exact geographic position of each mobile host; TPT (Token Passing Tree) [1] supports real-time applications in ad-hoc networks in which terminals have low mobility (e.g., indoor scenario); [11] have similar characteristics, but provides a better service than TPT. The contribution of this paper is to investigate the performance of two wireless MAC protocols that can be employed in wireless sensor networks: IEEE 82.11e and. The former has been chosen as it is part of a widely diffused standard, whereas the other has been chosen as its characteristics well fit with requirements of wireless sensor networks (e.g.,

2 multi-hop transmissions, low mobility of devices, and possible sudden variation of the network topology due to devices that stop working). Through a simulation study we analyze the goodput and the MAC delay; the goodput represents the number of bits per second that a source is able to deliver to the destination, whereas the MAC delay is the time that elapses between the arrival of a packet (of data) at the head position of the output queue and the arrival at its destination. Results reveal practical design suggestions: for networks with limited devices or with limited traffic the two protocols achieve similar results, whereas for networks with a considerable number (> 2) of stations or traffic, should be preferred. The remainder of this paper is organized as follows. In section II we briefly overview IEEE 82.11e and ; Section III presents the evaluation of the two protocols and their comparison. Conclusions are drawn in section IV. II. BACKGROUND In this section we briefly overview the characteristics of IEEE 82.11e and of. A. IEEE 82.11e IEEE 82.11e is an approved amendment to the IEEE standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. It has been designed to support delay-sensitive applications. This version introduces the concept of traffic categories with the Enhanced Distribution Coordination Function (EDCF). Each station has eight traffic categories (i.e., every packet to transmit has its own priority). Using EDCF, stations try to send data after detecting the medium is idle and after waiting a period of time defined by the corresponding traffic category called the Arbitration Interframe Space (AIFS). A higher-priority traffic category will have a shorter AIFS than a lower-priority traffic category. To avoid collisions, a station waits for a random number of time slots (known as a contention window) before attempting to transmit data. If another station transmits before the countdown has ended, the station waits for the next idle period. The length of the contention window is defined with CWmin and CWmax. EDCF also defines the maximum time a station can transmit once it accesses the network (with the parameter TXOP). A detailed description of IEEE 82.11e can be found at Here, we highlight that this protocol provides probabilistic (and not absolute) timing guarantees to the applications. B. [11] is a distributed real-time MAC protocol that supports real-time and generic applications in ad-hoc networks. is designed to be used in scenarios where devices have limited mobility in a limited space (e.g., indoor scenario). operates in slotted networks, provides two types of service (delay bounded and best-effort), and allows concurrent access transmissions by using CDMA technology to avoid collisions. Each node is required to have two different output queues: one for the real-time and one for the non realtime traffic (the former has higher transmission priority than the latter). Briefly, the protocol organizes all the devices as a virtual ring and uses an access mechanism to control transmissions and to integrate real-time and non real-time traffic. The access mechanism is based on a control signal that travels into the virtual ring. Every time this signal visits a station, it gives transmission authorizations. A station can always transmit as long as it has transmission authorizations. The number of such authorizations is defined by the call admission procedure and may vary from station to station. The transmission is done using CDMA and transmitter-based spreading codes. Once a packet is transmitted, it travels from its source to its destination hop by hop. The control signal travels into the network but can be seized by a station that has real-time traffic to transmit and still have transmission authorizations since the previous visit of the control signal. When released (if captured) or when passed (if not captured) the control signal provides new transmission authorizations to the visited station. The access mechanism provides a time-bounded service (i.e., an upper bound to the network access time) and is proved to be fair (i.e., stations have the same opportunity to access the network). Since the protocol operates in a wireless environment, is provided with a mechanism that manages the dynamic variations and failures of the virtual ring. Briefly, the mechanism works as follows: when the control signal visits a station, this one can become an ingress station with a certain probability. An ingress station stops all the transmissions in the network and listens to the wireless channel for a predefined period of time in order to discover new stations that want to join the existing network. If no stations are asking to join the network, the ingress station informs all the other stations that transmissions are no longer stopped; conversely, if new stations want to join the network, the ingress station is in charge of re-building the virtual ring embedding the new requesting stations. After building the virtual ring, transmissions are allowed. This mechanism does not compromise timing guarantees, as the upper bound also include the time to manage dynamic variation of the network topology. A detailed description of can be found in [11]. Here, we highlight that the protocol provides absolute timing guarantees to the applications. III. EVALUATION In this section we investigate the performance of IEEE 82.11e and of. As previously mentioned, these protocols have been chosen as the former is an amendment of

3 the widely used IEEE 82.11, whereas the latter is a protocol that supports real-time applications in ad-hoc networks where nodes have limited mobility in a limited space without requiring additional node information like the exact geographic position, and it allows multi-hop transmissions (characteristics that well fit the requirements of wireless sensor networks). The goal of this investigation is to study the goodput and the MAC delay while varying the number of stations present in the network and the amount of real-time traffic to transmit. We recall here that with goodput we refer to the number of bits per second that a station is able to deliver to their destination (considering only data bits and not header bits), and with MAC delay we refer to the time that elapses between the arrival of a packet at the head of the transmission queue (i.e., the packet is the first one that will be transmitted by the station) and the arrival to its destination station. For simulation we use the discrete event simulation environment OMNeT++, which is free of charge for teaching and research use [12]. The simulation settings for IEEE 82.11e are the following: Channel data rate of 11 Mbps; Packet length of 124 bits; Network slot length of 2µs; Non real-time traffic rate is unlimited (always traffic to transmit); Real-time traffic has priority 7 (i.e., highest priority); Non real-time traffic has priority (i.e., lowest priority); AIFSN and TXOP are equal to 3 and (for non realtime traffic), and to 2 and 1.54 milliseconds (for realtime traffic). Note that these are the default values for the channel access; CWmin and CWmax are equal to 31 and 123, respectively. Note that these values depends on the physical layer, and that we consider the DSSS physical layer specifications. The simulation settings for are the following: Channel data rate of 11 Mbps; The number of slots circulating into the virtual ring is equal to the number of stations; Network slot length of 53 bytes; Probability of becoming an ingress station when receiving the control signal is equal to 4%; The number of real-time authorizations for every round of the control signal round is equal to 5; The number of non real-time authorizations for every round of the control signal is equal to 5; Applications have always non real-time traffic to transmit (non real-time traffic data rate is unlimited). As in most of the work on the subject, the simulation results are reported assuming the network to be error-free during transmission. A. Goodput Figure 1 shows the real-time traffic goodput of the network while varying the number of stations in the network, and while Goodput (kbps) IEEE 82.11e Fig. 1. Real-time traffic goodput achieved when every station of the network Goodput (kbps) IEEE 82.11e Fig. 2. Real-time traffic goodput achieved in a network of 25 stations where every station has unlimited non real-time traffic to transmit. (95% confidence interval) considering each station of the network to generate real-time traffic with a data rate equal to 45 Kbps. It can be observed that is able to handle all the real-time traffic generated by stations, whereas IEEE 82.11e does not when the number of stations in the network goes beyond 2. Figure 2 presents a similar investigation, but here the realtime traffic goodput of the network is measured while varying the real-time traffic in a network of 25 nodes. It is not surprisingly to observe that is able to handle all the generated real-time traffic, whereas IEEE 82.11e is not. This means that when using IEEE 82.11e, nodes will see their real-time output queue to grow. Results of both investigations show that IEEE 82.11e and achieve comparable real-time goodput when the network traffic load is low (either due to small network or to limited real-time traffic data rate). When the network traffic load increases, IEEE 82.11e is not able to handle the realtime traffic, whereas is. In addition to the real-time traffic goodput, it is interesting to observe the goodput of the non real-time traffic, as the network

4 Goodput (kbps) IEEE 82.11e Fig. 3. Non real-time traffic goodput achieved when every station of the network has unlimited non real-time traffic and 45 kbps of real-time traffic to transmit. likely supports both real-time and non real-time applications. Again the non real-time goodput is measured while varying both the number of stations in the network and the real-time traffic data rate. Figure 3 shows the non real-time traffic goodput of the network while varying the number of stations in the network, and while considering each station of the network to generate real-time traffic with a data rate equal to 45 Kbps. For both protocols, the goodput decreases while increasing the number of stations in the network. However, IEEE 82.11e achieves very low goodput, whereas has much higher goodput. This behavior shows that the mechanism that controls the transmission in IEEE 82.11e leaves no room for the non real-time traffic when the real-time traffic to handle is considerable. Therefore IEEE 82.11e is not fair in handling real-time and non real-time traffic. Conversely, results show that the mechanism that controls transmission in ensures a fair access to the network by both the real-time and the non real-time traffic. Results are confirmed with a simulation that computes the non real-time traffic goodput of the network while varying the real-time traffic in a network of 25 nodes. B. Mac Delay Figure 4 shows the real-time MAC delay while varying the number of stations in the network, and while considering each station of the network to generate real-time traffic with a data rate equal to 45 Kbps. IEEE 82.11e provides a much lower delay than WRT- Ring. Hence, it supports applications with stringent real-time constraints. However, it is to note the IEEE 82.11e does not support multi-hop transmissions and therefore it requires all the nodes to see each other within the network (transmissions are single hop source-destination only). This explains the lower MAC delay. Conversely, in a packet needs to perform multi-hop transmissions to reach its destination. Since wireless sensor networks require multi-hop transmissions, we build a benchmark scenario where the multi-hop feature is built 2 18 IEEE 82.11e 16 IEEE 82.11e MH Fig. 4. Real-time MAC delay achieved when every station of the network 1 9 IEEE 82.11e IEEE 82.11e MH Fig. 5. Real-time MAC delay: achieved in a network of 25 stations where every station of the network has unlimited non real-time traffic to transmit. upon the IEEE 82.11e protocol (i.e., the network nodes are considered as composing a virtual ring). Figure 4 also presents a series (label IEEE 82.11e MH), which represents results of IEEE 82.11e when simulating multi-hop transmissions. It can be observed that when the number of stations goes beyond 3, IEEE 82.11e provides higher MAC delays than. Figure 5 shows the real-time MAC delay while varying the real-time traffic present in a network of 25 nodes. The MAC delay is steady for, whereas it increases for IEEE 82.11e MH while increasing the real-time traffic load. Results confirm that IEEE 82.11e is effective in supporting real-time traffic when transmissions are done in single hop; conversely, when transmissions are done in multi-hop the MAC delay increases a lot and has to be preferred. Figure 6 shows the non real-time MAC delay while varying the number of stations in the network, and while considering each station of the network to generation real-time traffic with a data rate equal to 45 Kbps. The MAC delay of is lower than the one experienced while using IEEE 82.11e. Similar results are obtained while varying the real-time traffic present in a network of 25

5 IEEE 82.11e Fig. 6. Non real-time MAC delay achieved when every station of the network IEEE 82.11e Fig. 7. Non real-time MAC delay achieved in a network of 25 nodes where achieved when every station of the network has unlimited non real-time traffic to transmit. nodes (see Figure 7). C. Summary of Results Results obtained while analyzing the goodput and the MAC delay experienced by IEEE 81.11e and by under different network conditions show that both protocols can be employed in wireless sensor networks if the number of devices is limited and/or the real-time traffic is limited too. In particular, for a number of devices below 2 and with a global network real-time traffic below 1 Mbps both protocols can support the traffic generated by the real-time applications. What differs in this scenario is the performance of the non real-time traffic, which is better handled by. For network with a higher number of stations (> 2) and/or higher real-time network traffic (> 1Mbps), achieves better performances in terms of goodput. Results obtained while analyzing the MAC delay showed that IEEE 82.11e could support applications with real-time requirements tighter than, providing that all the devices of the network are within the range of communication (i.e., single hop transmission). Conversely, in generic wireless sensor networks conditions where multi-hop transmissions are required, achieves lower MAC delay. IV. CONCLUSIONS This paper focused on the support of applications with timing constraints in wireless sensor networks. In particular, it presented an investigation of the performances of two MAC protocols that can be employed to manage real-time traffic: IEEE 82.11e and. The investigation revealed that supports both real-time and non real-time traffic in a fair way, whereas IEEE 82.11e penalizes the non real-time traffic in favor of the real-time traffic. The investigation also showed that IEEE 82.11e might have problems in supporting real-time applications if the real-time traffic load goes beyond a certain threshold. To summarize, results showed that in wireless sensor networks with limited devices and/or real-time traffic both protocols can be employed, whereas when devices and/or traffic increases, has to be preferred. ACKNOWLEDGMENT This work has been partially supported by Italian MIUR funds (project PRIN-26 NADIR: Design and analysis of distributed, and QoS-aware protocols and algorithms for Wireless Mesh Networks). Authors would like to thank Luca Cibelli and Angelo Trotta for their work on the simulator. REFERENCES [1] S. Y. Lin Ruizhong, Wang Zhim, Wireless sensor networks solutions for real time monitoring of nuclear power plant, in Fifth World Congress on Intelligent Control and Automation, 24., vol. 4, June 24, pp [2] I. K. I.F. Akyildiz, Wireless sensor and actor networks: research challenges, Ad Hoc Networks, vol. 2, no. 4, pp , 24. [3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, vol. 38, pp , 22. [4] T. Watteyne, I. Augé-Blum, and S. Ubéda, Dual-mode real-time mac protocol for wireless sensor networks: a validation/simulation approach, in InterSense 6: Proceedings of the first international conference on Integrated internet ad hoc and sensor networks. New York, NY, USA: ACM, 26, p. 2. [5] T. Facchinett and G. Buttazzo, Integrated wireless communication protocol for ad-hoc mobile networks, in International Workshop on Real-Time Networks (RTN), Catania, Italy, June 24, pp [6] J. A. Stankovic, Research challenges for wireless sensor networks, SIGBED Rev., vol. 1, no. 2, pp. 9 12, 24. [7] K. C. Chen, Medium access control of wireless lans for mobile computing, IEEE Network, vol. 8, no. 5, pp. 5 63, [8] E. Egea-Lopez, J. Vales-Alonso, A. S. Martinez-Sala, J. Garcia-Haro, P. Pavon-Marino, and M. V. B. Delgado, A wireless sensor networks mac protocol for real-time applications, Personal Ubiquitous Comput., vol. 12, no. 2, pp , 28. [9] R. Cunningham and V. Cahill, Time bounded medium access control for ad hoc networks, in Proceedings of ACM Principles of Mobile Computing, 22. [1] R. Jianqiang, J. Shengming, and H. Dajiang, A token passing tree MAC scheme for wireless ad hoc networks to support real-time traffic, in NETWORKING : Proceedings of the IFIP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks. London, UK: Springer-Verlag, 2, pp [11] L. Donatiello and M. Furini, Ad hoc networks: A protocol for supporting QoS applications, in Proceedings of the IEEE International Parallel and Distributed Processing Symposium. IEEE Computer Society, 23. [12] Omnet++ discrete event simulation system,

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Quality of Service (QoS) Settings on AP541N Access Point

Quality of Service (QoS) Settings on AP541N Access Point Quality of Service (QoS) Settings on AP541N Access Point Objective Quality of Service (QoS) is a technique used to achieve better performance for a computer network and is also used to enhance the quality

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation QoS Support for Time-Constrained Multimedia Communications in IEEE 8. WLANs: A Performance Evaluation José Villalón Francisco Micó Pedro Cuenca Luis Orozco-Barbosa Department of Computer Engineering, Universidad

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Table of Contents 1 WLAN QoS Configuration 1-1

Table of Contents 1 WLAN QoS Configuration 1-1 Table of Contents 1 WLAN QoS Configuration 1-1 WLAN QoS Overview 1-1 Terminology 1-1 WMM Protocol Overview 1-2 Protocols and Standards 1-4 WMM Configuration 1-4 Configuration Prerequisites 1-4 Configuring

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Chapter 1 PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Gianluigi Ferrari, Paolo Medagliani, Marco Martalò Wireless Ad-hoc and Sensor Networks (WASN) Laboratory Department of Information

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

TRANSMISSION OF MULTIPLE EMERGENCY INFORMATION WITH THE COORDINATION OF NEIGHBORING ROUTERS IN WIRELESS SENSOR NETWORKS

TRANSMISSION OF MULTIPLE EMERGENCY INFORMATION WITH THE COORDINATION OF NEIGHBORING ROUTERS IN WIRELESS SENSOR NETWORKS DOI: 10.21917/ijct.2013.0117 TRANSMISSION OF MULTIPLE EMERGENCY INFORMATION WITH THE COORDINATION OF NEIGHBORING ROUTERS IN WIRELESS SENSOR NETWORKS Mary Cherian 1 and Rashmi G 2 1, 2 Department of Computer

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study

A new Traffic Separation Mechanism (TSm) in Wireless e Networks: A simulation study A new Traffic Separation Mechanism (TSm) in Wireless 802.11e Networks: A simulation study Ricardo Moraes 1, Francisco Vasques 1, Paulo Portugal 1, José Alberto Fonseca 2 1 Faculdade de Engenharia Universidade

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

A Survey on Real-Time MAC Protocols in Wireless Sensor Networks

A Survey on Real-Time MAC Protocols in Wireless Sensor Networks Communications and Network, 2010, 2, 104-112 doi:10.4236/cn.2010.22017 Published Online May 2010 (http://www.scirp.org/journal/cn) A Survey on Real-Time MAC Protocols in Wireless Sensor Networks Abstract

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

On Admission of VoIP Calls Over Wireless Mesh Network

On Admission of VoIP Calls Over Wireless Mesh Network On Admission of VoIP Calls Over Wireless Mesh Network Hung-yu Wei Department of Electrical Engineering National Taiwan University Taipei, Taiwan {hywei}@ntu.edu.tw Kyungtae Kim, Anand Kashyap and Samrat

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment , pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Gabriel Lazar, Virgil Dobrota, Member, IEEE, Tudor Blaga, Member, IEEE 1 Agenda I. Introduction II. Reliable Multimedia

More information

A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic

A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic A Token Passing Tree MAC Scheme for Wireless Ad Hoc Networks to Support Real-Time Traffic Rao Jianqiang 1, Jiang Shengming 2,andHeDajiang 1 1 Department of Electrical Engineering, National University of

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment

Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment , pp.42-46 http://dx.doi.org/10.14257/astl.2015.94.10 Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment Rae Hyeon Kim, Jeong Gon Kim 1 Department of Electronic Engineering Korea

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

On QoS Mapping in TDMA Based Wireless Sensor Networks

On QoS Mapping in TDMA Based Wireless Sensor Networks On QoS Mapping in TDMA Based Wireless Sensor Networks Wassim Masri and Zoubir Mammeri IRIT Paul Sabatier University Toulouse, France {Wassim.Masri, Zoubir.Mammeri}@irit.fr Abstract Recently, there have

More information

Samsung Smart WLAN Solution

Samsung Smart WLAN Solution Whitepaper Samsung Smart WLAN Solution Smart Capacity & Security for Smarter Mobility Voice Optimization Introduction In our modern world, enterprises are in constant need to provide their employees with

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks

Dynamic Traffic Prioritization and TXOP Allocation in e Based Multihop Wireless Networks IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012 33 Dynamic Traffic Prioritization and TXOP Allocation in 802.11e Based Multihop Wireless Networks Dongho

More information

A Study of Open Middleware for Wireless Sensor Networks

A Study of Open Middleware for Wireless Sensor Networks , pp.105-109 http://dx.doi.org/10.14257/astl.2014.60.26 A Study of Open Middleware for Wireless Sensor Networks Chen-Nam 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering Jeju National University Jeju-Si

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks

Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks 12th Annual Symposium of the IEEE/CVT, Nov. 3, 2005, Enschede, the Netherlands 1 Low Energy Priority Oriented Adaptive Control with QoS Guarantee for Wireless Networks T. D. Lagkas, G. I. Papadimitriou,

More information