Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Size: px
Start display at page:

Download "Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks"

Transcription

1 Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, Department of Electrical and computer Engineering California State University Los Angeles ABSTRACT To design an efficient and effective MAC layer protocol for Mobile Ad-Hoc networks is a challenging task. IEEE MAC protocol, which supports ad hoc network mode, provides a good reference for research work in this area. In the recent years, many researchers have investigated the performance of IEEE on MANET both theoretically and empirically. However, the impact of the mobility on MAC layer design has not been evaluated thoroughly. In our research, we used OPNET simulator to analyze the performance of IEEE MAC protocol under various mobility patterns for different network topologies. The findings revealed interesting correlation between the speed of movement/ the mobility pattern and key network performance parameters including delay and throughput. We also investigated the impact of mobility on fairness issues in media access. The empirical study presented in this paper will be useful to enhance the MAC design of MANET with median or high mobility nodes. Keywords: MANET (Mobile Ad-Hoc Networks), Mobility, (Medium Access Control) MAC, IEEE , OPNET 1. INTRODUCTION Mobile Ad Hoc Networks (MANET) are becoming more and more popular due to its ability to offer convenient, flexible and low cost network service for many nontraditional applications. Unlike the widely used Wi-Fi network which relies on the access point to attach to the existing networking infrastructure, MANET is infrastructure-less, where each node acts as a sender, receiver, and router. While the freedom to deploy a mobile ad hoc network at anytime anywhere is very attractive, to make such network function properly presents a lot of technical challenges. For MAC layer protocols, the wellknown challenges are imposed by hidden and exposed terminal problems, fairness access issues, limited bandwidth, limited power supply, as well as limited transmission range and mobility. IEEE802.11was primarily designed for WLAN, but it also supports ad hoc network mode. The MAC layer protocol in IEEE laid the foundation for many proposed MAC layer protocols for MANET. Therefore, it is worthwhile to evaluate the performance of IEEE on MANET to see how to improve the design. Many existing research [1-3] focused on the effectiveness on handling hidden and exposed terminal problem, and some addressed fairness issues. Mobility, although an important design factor of MANET, its impact on MAC layer performance has not been fully analyzed yet. Most of the current researches that investigated the mobility effect are focused on the network layer since it is a major concern in routing [4-5]. In [6], the authors briefly compared the performance IEEE and other MAC protocols under network scenarios with mobility. However, to develop a full understanding of the mobility effect on MAC layer performance including delay and throughput, fairness, collision probability, a more comprehensive and in-depth study is necessary. The objective of our research is to conduct such study using OPNET [7] to show how mobility impacts the key MAC layer performance parameters. In this paper, we will present our findings of the empirical study using OPNET simulation. Due to the nice property of OPNET, it is possible to set up different network scenarios with different mobility patterns, which allowed us to better study the impact of various factors including speed, transmission range, and moving trajectory. The network parameters that were taken into account in our study includes delay, throughput, collision count, overhead of control traffic, and backoff time. The documented results will be useful to enhance the MAC design of MANET with different mobility. The paper is organized as follows. Section 2 provides a brief overview of IEEE and highlights the important

2 design issues. The empirical study exploring the mobility effect using the OPNET software is presented in section 3. Experimental results are described in this section as well. Finally, we will conclude our findings in Section OVERVIEW OF IEEE MAC PROTOCOL IEEE MAC layer protocol is referred to as Distributed Coordination function DCF which was based on virtual carrier sensing and the physical carrier sensing [8]. IEEE DCF uses RTS/CTS/DATA/ACK when the size of the data frame is large enough; it may just use carrier sense or it may use both methods referred to as CSMA/CA with RTS/CTS as a MAC protocol. The three major issues related to MAC layer protocol over MANET are the ability to handle hidden and exposed terminal problems, the ability to ensure fair access of multiple stations, and the ability to cope with mobility Hidden and Exposed Terminal Problems These two problems have become a major issue in MANET. Hidden terminal problem [3] occurs when two stations are out of the range of each other and trying to send to the same receiver. As a result, the effect significantly decreases the throughput and makes the delay longer. Exposed terminal problem, on the other hand, is when a node is blocked from transmission to the other stations due to the transmission of the adjacent node. This will cause collision and bandwidth waste (less spatial reuse) and will bring up the starvation problem of the unlucky node. IEEE DCF proposed the RTS/CTS handshaking method in order to alleviate the negative impact of these issues on the whole network. In the literature, several schemes have been proposed to solve the hidden and exposed terminal problems using different mechanism. In [9], the authors explored the IEEE MAC protocol with and without using RTS/CTS handshaking method. The total WLAN retransmissions, data traffic sent/received, WLAN Delay factors of the whole network was investigated using both methods. They demonstrated that in the scenarios that the Hidden terminal problem exists, it will be a good idea to use this option as it decreases the delay of the network dramatically. They also mentioned that this handshaking method is not necessary to be used where the hidden nodes are not present due to the overhead that it adds to the network. The mobility factor was investigated when the hidden nodes exist. However, the speed of the nodes and the location of them have not been studied in this paper. MACA [10] on the other hand, did not use the carrier sensing option and instead, it used the RTS/CTS/DATA handshake to reserve and use the channel. Although this protocol was a simple design, the control channel collisions made the scheme not effective in the MAC layer. Moreover, in these papers, they never spoke of the effect of the Mobility of the performance of the whole network Fairness issue Another important factor that should be considered in designing MAC protocols is to make sure that all nodes have fair access to the channel in order to transmit their data. So far most of the single channel MAC schemes rely on the back-off procedure. Upon collision, the mobile nodes will go through the back-off procedure and will try to retransmit after a certain amount of time. Because the backoff time is different for different nodes, some nodes may have more chance to transmit than the others and they are favored in data transmission. This will result in starving problem of the unlucky nodes with long contention window size. Therefore, designing good strategies for back-off procedures and providing fair chances among nodes to access the channel is one of the important aspects in MANET. MACAW [11] for wireless LANs is another single channel schemes which tried to improve the performance of MACA protocol. A five handshake RTS/CTS/DS/DATA/ACK has been used in this protocol which leads to alleviation of the hidden and exposed terminal problem and better fairness among nodes. By using a different back-off approach (MILD), this protocol allowed the nodes to access the channel in a fair manner which is more desirable in ad hoc networks. However, the effect of mobility on fairness issue using this protocol has not been investigated Mobility issue For the infrastructure-based networks, the access point has the major influence on the delivery of the data to the destination. Within a Basic Service Set (BSS), the stations have to share information using the access point and therefore their position towards each other is not that important. Hence, the mobility of nodes does not have a major effect on the MAC layer protocol [9]. For infrastructure-less network as MANET, the mobile nodes are in direct contact with each other. Since they can be sender, receiver and router, mobility has a significant impact on the performance of their data delivery. One may wonder what influence may the mobility of the nodes cause on the performance of the network. Will mobile nodes be treated the same way as they move? Will the efficiency of the transmission stays the same as the mobility varies? How will the delay and overall throughput be affected via different mobility pattern? Can we enhance the network performance using the handshaking RTS/CTS method under high mobility? Most of the questions do not have a solid answer yet. In our research, we will explore the relationship between mobility and all these factors using OPENT simulation. The results presented in this paper will shed

3 some light to answer some of the questions related to the impact of the mobility on MANET networks. 3. EMPIRICAL STUDY USING OPNET 3.1. OPNET Simulator OPNET modeler is one of the powerful simulation software allowing the users to implement different network topologies using a friendly graphic user interface. As lots of research papers in networking field used NS-2 simulator [12], OPNET makes it easier to use as it provides ready-touse components without the need of writing codes to create real time network simulations. It also provides the flexibility for advanced users to create their own network node and link by hard coding. For our research, OPNET is selected since its Wireless Modeler includes a rich library of detailed mobile protocols and application models that can be utilized to create MANET with various mobility patterns MANET and Mobility in OPNET OPNET [1] uses the IEEE MAC protocol with DCF for Mobile Ad-Hoc Networks. RTS/CTS handshaking option is also included in case a user decides to implement it. The software has different objects for MANET networks such as the MANET station, MANET work station, and Mobility configuration options in order to set up the movement of the nodes. In fact, Mobility is one of the most valuable options that are included in the simulator so that the users can easily define the way the stations move. The speed of the stations can also be easily defined for various applications. This option makes it simpler in real time simulations in comparison to the other simulators where the mobility is a difficult task to define and implement. Figure 1 illustrates a MANET scenario with pre-defined node mobility. The statistics that are related to this work are explained briefly as follows: 1) MANET delay: the end to end delay of MANET packets for the whole network (seconds). 2) Throughput: the total number MANET traffic which is received in bits per second by all the MANET receivers. 3) Media Access delay: The global statistic for the total of queuing and contention delays of the data, management, delayed block-ack and Block-ACK frames transmitted by all WLAN MACs in the network (seconds). 4) Back off slots: the number of slots that a stations needs to back off before transmission while contenting for the medium, and the number of slots in the contention window after the successful transmission of the station. 5) Retransmission attempts: the total number of retransmissions by all the WLAN MACs in the whole network until the delivery of the packet or being discarded as a result of reaching the short or long retry limits. We used this factor to study the impact of mobility on the collision counts as well as the effectiveness of RTS/CTS handshake. Fig.1. Mobility of the Mobile Ad-Hoc Networks Simulation environment In our study, two different network topologies were created and analyzed to evaluate the mobility effect on the node s behavior and the network performance. Different settings have been applied to the two topologies based on the needs of the network simulations. In the first topology, the relationship between mobility, transmission range and the overall throughput and delay of the network is investigated. As Figure 2 illustrates, one subnet consists of eight nodes around each other. Another single node is approaching this sub network with a constant speed. To study the impact of mobility among the nodes inside the sub network, different scenarios were created to compare the delay and throughput where the nodes are either static or moving randomly. We also changed the speed of the nodes in different steps to see the influence of this factor on the network. To evaluate the effect of the transmission range, we also varied the transmission range in different scenarios according to the distance and the area that were used in the simulation. In addition, the mobility impact on this network with different traffic loads was also studied. Table 1 shows the setting used for the first topology. Fig.2. First topology where a node is approaching a static network

4 Attribute Transmission power (W) Varies per scenario Data Rate (bps) 11 Mbps Physical Layer Method Direct Sequence Buffer Size (bits) Packet Size (bits) Exponential (1024) Traffic generated per node Varies per scenario Node s Speed Varies per scenario Nodes movement method Defined/Vector trajectory Simulation time (min) 60 Table.1. Topology 1 configurations For the second topology, two similar subnets are created and each consists of 7 nodes. One of the nodes is static and it transmits to the other static node in the second subnet. The other nodes inside the subnet are either static or moving while trying to transmit data to the static station inside their subnet. The two subnets are moving towards each other with a constant speed. The internal nodes are located with different distances from the static receiver in order to study the effect of different movement trajectories on the fairness among nodes. Note that the internal nodes are in the transmission range of each other. That is, each subnet allows their nodes to transmit inside the region of the subnet. The transmission range for the static receiver is higher than the others due to the fact that the receiver will need to transmit to the other static receiver located at the second subnet. In this topology, we not only look into the delay and throughput factors, but also check the fairness among nodes and the effect of RTS/CTS. Table 2 shows the setting we used for the second topology. Attribute Transmission power of the static receiver (W) Mobile Nodes Transmission power (W) Data Rate (bps) 11 Mbps Physical Layer Method Direct Sequence Buffer Size (bits) Packet Size (bits) Varies per scenario Traffic generated per node Varies per scenario Internal Node s Speed (m/s) 0.2 Subnet speed (m/s) 1 Nodes movement method Defined trajectory Simulation time (min) Experimental results Table.2. Topology 2 configurations Impact of mobility on delay and throughput A) The impact of mobility with lower transmission range To evaluate the impact of mobility with lower transmission range, three scenarios were created under the first topology (figure 2). The transmission range and traffic load for these scenarios are the same, while the mobility inside the subnet is different: 1) Scenario 1: inside nodes are static 2) Scenario 2: inside nodes move with speed 0.2m/s 3) Scenario 3: inside nodes move with speed 1m/s For all these scenarios, the single node in approaching the sub-network with a constant speed 0.2m/s. Table 3 shows the configuration of transmission power and traffic load of these scenarios. The Domain which covers an area of square meter allows the nodes to move inside this region. A lower transmission range is defined so that the nodes can sense each other at a maximum of 80 meters distance. That is, the nodes will not be able to sense each other at some parts of the Domain. This will allow us to see the effect of lower transmission region on the networks using the mobility feature. Attribute Transmission power (W) 3E-005 Packet Size (bits) Exponential (1024) External Node s Speed (m/s) 0.2 Traffic generated per node Exponential (0.1) Fig.3. Second topology where the mobile nodes are moving around the static receiver inside the two subnets Table 3: Common parameters

5 Fig.4. Comparison of average Delay and Throughput for static and moving inside nodes with speed 0.2m/s with lower transmission range Figure 4 compares the results for scenario 1(static) and 2 (node moving with low speed 0.2/m). Results show that when the nodes are not moving inside the domain, the network has higher throughput and lower delay. This seems be to due to the fact that when the nodes move around, the transmission range decreases and the connection establishment among nodes becomes weaker. Hence, the overall throughput decreases coming up with higher delay. Figure 5 compares the results for scenarios 2 (low movement speed) and 3 (high movement speed. Results demonstrate a higher delay and lower traffic being received as a result of an increase in the speed of the mobile nodes. Higher speed will make the node to move further from the receiver in a shorter amount of time and therefore, less chance to deliver their data to the destination. Higher delay is due to the fact the nodes are having more problem in delivering their data to the receiver and experiencing a higher back off time and retransmissions of the data. It also contributes to the internal collision or packet loss which prevents the delivery of the data. Fig.5. Comparison of average Delay and Throughput for the networks with low movement speed (0.2m/s) and high movement speed (1 m/s) with low transmission range. B) The impact of mobility with higher transmission range Attribute Transmission power (W) Packet Size (bits) Exponential (1024) Internal Node s Speed (m/s) 1 Traffic generated per node Exponential (0.005) Table 4: Common parameters In this case, we increased the transmission range ( W) so that the range covers the whole area of the movement. We also increased the Traffic generated by each node to see how the mobile stations behave while generating more traffic. Figure 6 shows the comparison results for the two network scenario with static inside nodes and moving inside notes (speed 0.2m/s). It is interesting to see that in this case, the mobility will have a positive impact which leads to a little higher throughput and lower delay for the entire network.

6 Attribute Transmission power (W) Packet Size (bits) Exponential (8192) Internal Node s Speed (m/s) 0.2 Traffic generated per node Exponential (0.0008) Table 5: Common parameters In this scenario, we investigated the effect of mobility on a network with stations generating a relatively larger traffic inside the network. We also increased the packet size per station. Similar to the first topology, results demonstrate a better performance of the network with mobility in comparison to the static one when the transmission ranges covers the movement paths. Fig.6. Comparison of average Delay and Throughput for static and moving inside nodes with speed 0.2m/s with higher transmission range We also found out that increasing the speed of a network with high transmission range will slightly improve the performance of the network in case of throughput and delay. The reason may be due to the fact that all nodes are within the transmission range of each other no matter how they move. Therefore, the random movement pattern of the inside nodes may lead to a more even distribution of the nodes that helps with channel access. C) Impact of group mobility on delay and throughput Starting from this subsection, we will describe our findings on the impact of group mobility pattern. The simulations were created using the second topology as discussed earlier (Figure 3). The two subnets are moving towards each other with a speed of 1 m/s. The internal nodes inside each subnet are moving with the speed of 0.2 m/s. The nodes have different distances to the fixed receiver. In the case where the nodes are moving, they move around the receiver based on their location and distance with regards to the receiver. Besides the delay and throughput factors, the fairness among nodes and the effect of RTS/CST method is investigated in the following section. Fig.7. Comparison of average Delay and Throughput for static and moving inside nodes with speed 0.2m/s for group mobility Impact of mobility on Fairness A) The fairness issue without RTS/CTS

7 To evaluate the fairness of IEEE MAC layer protocol for mobile network, we used the back off slot time which is the number of slots that a stations needs to back off before transmission while contenting for the medium, and the contention window size after the successful transmission of the station as the measurements.. Moreover, the retransmission attempt is a good factor to analyze the delivery efficiency of the packets per node when the stations are moving around the receiver. This factor reflects the impact of both the internal collision and the transmission errors including the loss of acknowledgment or an error occurred in the packet. The effect of the amount of traffic generated by each node on the fairness issues has also been investigated in this part. Node 3 and Node 6 are selected for our results. As mentioned before, the reason for this selection is the distance difference between the nodes and the receiver on their moving paths. Therefore, we can clearly see the effect of the different distances caused by mobility on the fairness among these nodes. hand, the retransmission attempts per node are much more less for the closer node to the receiver (Node 3). This might be due to the internal collision or the error inside the packets resulting in the failure of the delivery of the packets. We repeated the same procedure but changing the amount of traffic generated by each station to a higher level (exponential (0.0008)). We also increase the packet size up to eight times (exponential (8192)). Fig.9. Average Back off slot time and retransmission attempts for the two selected nodes with higher traffic Fig.8. Average Back off slot time and retransmission attempts for the two selected nodes with low traffic load Figures 8 and 9 present our simulation results for CSMA/CA without RTS/CTS. For the low load generated by each station, the two nodes have almost the same back off slot time (as shown in Figure 8) demonstrating that they have the same chance to access the channel. On the other As shown in Figure 9, the results illustrate that the back off slot time has increased dramatically for both nodes and that the difference becomes obvious as the distance to the receiver increases. This can be due to higher collision and more competition for accessing the channel resulting in higher back off s and retransmission attempts for both nodes. The closer the node is to the receiver, the higher chance it has to access the channel while moving around the receiver. B) The fairness issue using RTS/CTS Attribute Transmission power (W) Packet Size (bits) Exponential (1024) Internal Node s Speed (m/s) 0.2

8 Traffic generated per node Exponential (0.1) RTS threshold (bytes) 256 Internal Node s Speed (m/s) 1 Subnet speed (m/s) 1 Table 6: Common parameters In this case, we added the RTS/CTS option to each node to see the efficiency of this method on the network. Low traffic has been used in this scenario. From Figure 10, we can see that the retransmission attempts have been decreased for Node 3, which demonstrated the effectiveness of the handshaking method. Same results occurred for other nodes inside the network showing the good efficiency of the handshaking method. 4. CONCLUSION In this paper, the performance of the Mobile Ad-hoc networks is investigated using the IEEE MAC protocol. We have shown that Mobility can affect the network based on different factors. We studied the effect of varying the speed of the nodes, and their location on the network. We have also studied the fairness and the effect of the RTS/CTS handshaking process on the performance of the nodes inside the network. Our results show that the performance of the network varies as the mobile nodes move inside the network. We illustrated that the performance of the network improves as the traffic increases when a sufficient transmission ranges of nodes is provided. We have also shown that Mobility will cause the nodes to have longer back off times and retransmission attempts in order to deliver their information to the destination. The RTS/CTS handshaking method demonstrated its efficiency on the mobile nodes when the number of collisions becomes more and more. 5. REFERENCES Fig.10. Comparison of the average retransmission attempts for Node 3 using CSMA/CA only (RED); and using CSMA/CA with RTS/CTS (BLUE) C) The network performance using RTS/CTS We also studied the performance of whole network using the RTS/CTS access mechanism. The same configurations were used as the above simulation. Results depict that the delay of the whole network decreases due to the prevention of the collisions and allowing the nodes to have their data delivered in a shorter amount of time. Fig.11. Comparison of average network delay: Red plot without RTS/CTS; Blue plot-- with RTS/CTS [1] K. Xu, M. Gerla, and S. Bae, Effectiveness of RTS/CTS handshake in IEEE based ad hoc networks, Ad Hoc Networks, Elsevier, vol. 1, no. 1, pp , [2] T. S. Ho and K. C. Chen, Performance Analysis of IEEE CSMA/CA Medium AccessControl Protocol, in Proc. IEEE PIMRC 96, pp , [3] Khurana, S.; Kahol, A.; Jayasumana, A.P, Effect of Hidden Terminals on the Performance of IEEE MAC Protocol, LCN 98 proceedings, pp 12-20, [4] Samir R. Das, Robert Castañeda, Jiangtao Yan, Rimli Sengupta, Comparative performance evaluation of routing protocols for mobile, ad hoc networks. In 7th Int. Conf. on Computer Communications and Networks (IC3N), pages , October [5] Das, S.R, Perkins C.E, Royer, E.M., Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks in IEEE Proceedings, pp 3 12, [6] Jagadeesan S, Manoj BS, Murthy CSR. Interleaved carrier sense multiple access: an efficient MAC protocol for ad hoc wireless networks. Proceedings of IEEE ICC 03, May [7] Online Documentation, OPNET Modeler, Date visited: January [8] IEEE Working Group, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, [9] H. Jasani, N. Alaraje, Evaluating the Performance of IEEE Network using RTS/CTS Mechanism, in IEEE EIT 2007 Proceedings. [10] P. Karn, MACA a new channel access method for packet radio, in: Proceedings of the ARRL/CRRL Amateur Radio 9 th Computer Networking Conference September 22, [11] V. Bhargavan, A. Demers, S. Shenker, L. Zhang, MACAW A Media Access protocol for wireless Lans, in: Proceedings of the ACM SIGCOMM, 1994, pp [12] Online Documentation, The Network Simulator - ns-2, Date visited: January 2011.

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Effect of Fragmentation in WLAN Systems with Interference Problems

Effect of Fragmentation in WLAN Systems with Interference Problems Effect of Fragmentation in WLAN Systems with Interference Problems Shakil Akhtar College of Information Technology UAE University s.akhtar@uaeu.ac.ae Abstract Results from simulation model of an 802.11

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Interactions Between TCP and the IEEE MAC Protocol

Interactions Between TCP and the IEEE MAC Protocol Interactions Between TCP and the IEEE 82.11 MAC Protocol Rui Jiang Vikram Gupta Computer Science and Engineering Department University of California, Riverside Chinya V. Ravishankar Abstract The IEEE 82.11x

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Topics 1. Framing Delimiting start/end of frames 2. Error detection and correction Handling errors 3. Retransmissions Handling loss 4. Multiple Access 802.11, classic Ethernet 5.

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*,

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite

Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol Suite Int. J. Communications, Network and System Sciences, 2015, 8, 533-542 Published Online December 2015 in SciRes. http://www.scirp.org/journal/ijcns http://dx.doi.org/10.4236/ijcns.2015.813048 Collision

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks

Turning Hidden Nodes into Helper Nodes in IEEE Wireless LAN Networks Turning Hidden Nodes into Helper Nodes in IEEE 82.11 Wireless LAN Networks Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks?

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Abstract: Does IEEE 802.11 MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Shugong Xu Tarek Saadawi Dept. of Electrical Engineering, City University of New York, City College, New York, NY

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer

A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Original Article A Study on Delay, Throughput and Traffic Measurement for Wi-Fi Connected Stations Based on MAC Sublayer Md. Abbas Ali Khan* 1, Khalid Been Md. Badruzzaman Biplob 2 Rahman 3 and Md. Sadekur

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Mahasweta

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs Vijaya Lekshmi. S.V, E.P.Prakash PG Scholar, Assistant Professor Department of CSE SNS College of Engineering

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information