Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol

Size: px
Start display at page:

Download "Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol"

Transcription

1 Idle-Slot ecycling in a Collision-Free eal-time MAC Protocol Ming Zhang Ying Jian Liang Zhang Shigang Chen Department of Computer & Information Science & Engineering University of Florida {mzhang, yjian, lzhang, sgchen}@cise.ufl.edu Abstract In wireless sensor networs (WSNs), timeliness is one of the most challenging problems for critical applications. Caccamo et al. designed a collision-free real-time MAC protocol for sensor networs by adopting the cellular structure in traditional telecommunication networs. They assumed that sensors are organized into many rigid hexagon cells and a router node is at the center of each cell to transmit inter-cell pacets. By exploiting FDMA and TDMA, transmission collisions are avoided and real-time guarantees are provided. However, we observe that for inter-cell communication, idles caused by the TDMA-based scheduling will degrade the throughput and delay performance of the entire networ, especially for some real applications in which data flows have traffic- partiality characteristics. In the worst case, five sixths of inter-cell bandwidth will be wasted. In this paper, we propose four idle- recycling algorithms to improve channel utilization. Simulation results show that our proposed algorithms can greatly increase networ throughput and decrease pacet transmission delay, while the collision-free and real-time qualities of Caccamo s protocol are still retained. I. INTODUCTION In recent years, wireless sensor networs (WSNs) have been identified as a promising technology for a wide variety of applications [1], such as environment monitoring and military surveillance, etc. Due to the tight interaction with physical environment, these applications are expected to have implicit/explicit real-time requirements [2]. One promising collision-free real-time MAC protocol is proposed by Caccamo et al. in [3]. The protocol adopts the cellular structure in traditional telecommunication networs [4], and it assumes a rigid deployment structure with a node (called router) at the center of each hexagon cell. Using FDMA (Frequency Division Multiple Access), different communication channels are assigned to neighboring cells; seven channels are needed for the whole networ. Since each cell is assigned a channel that is different from its six adjacent cells, all cells can transmit simultaneously without conflicts. Time is also divided into periodical intra-cell s and intercell s. During an intra-cell, sensors inside each cell use the same local channel to transmit pacets. Traffic across Acnowledgement: This wor was supported in part by the US National Science Foundation under grant CNS and by the University of Florida through the esearch Opportunity Fund Award under project no F E A A D B C B C Fig. 1. CH.3 CH.7 CH.6 CH.1 CH.5 CH.3 CH.4 Inter-cell communication In A at time 0 Collision-Free eal-time MAC Protocol[3] D cells is relayed by the routers at the center of each cell. A router is a more capable node equipped with both a transmitter and a receiver, such that it can send a pacet (in the local channel) and receive a pacet (in a neighbor s channel) simultaneously. The inter-cell communication of the whole networ is synchronized by a TDMA (Time Division Multiple Access) scheduling policy, in which all routers simultaneously transmit in the same for each inter-cell time. There are six s (A-F), and they are chosen one by one in consecutive inter-cell time s. For example, as illustrated in Fig. 1, at time 0, all routers transmit in A. Under this protocol, it is guaranteed that no collision will occur in intra-cell and inter-cell communication, and a hard bound for pacet forwarding time can be given. However, we may observe that the inter-cell s are equally and periodically assigned to the six s, while for many applications, it is very liely that during a certain period of time, the local traffic only goes along a few s. We call this characteristic as traffic- partiality. It is easy to see that for data flows with traffic- partiality, a lot of inter-cell s will be idle. In the worst case, five sixths of inter-cell bandwidth will be wasted. Previously, there are two types of TDMA idle s reuse. The first type is on spacial time reuse, which tries to assign the same time to maximal number of geographically separated nodes so that interference is minimized and system /08/$ IEEE. 1 This full text paper was peer reviewed at the of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2008 proceedings.

2 throughput is improved [5], [6], [7]. The other type, which is similar to the problem that we are solving here, is focused on reusing idle time s that are caused by unbaclogged flows [8], [9], [10]. However the existing solutions are designed for some specific TDMA systems and cannot be directly applied to the cellular structured networs studied in this paper. In this paper, we propose four algorithms (-IS, MU- IS, I-IS, ID-IS) to reuse the inter-cell idle-s. When a time becomes idle, the four algorithms employ different strategies to select a to send (receive) a pacet, by which the idle- is expected to be reused. In -IS, as the simplest way, the is randomly selected. In MU- IS, historical transmission information is exploited, and the of the most recent successful transmission is piced. By piggybacing buffer status in pacets, I-IS and ID-IS mae use of future traffic information of neighboring routers to better choose the recycling. Our proposed algorithms are able to greatly improve networ throughput and reduce pacet transmission delay. ID-IS can also allocate the extra bandwidth (gained by idle- recycling) among flows fairly. For all the algorithms, the collision-free and real-time qualities of the original protocol are still retained. We evaluate the proposed algorithms through simulations. The rest of the paper is organized as follows: The problem is defined in Section II. In Section III, four opportunistic idle- recycling algorithms are presented and compared in details. In Section IV, the effectiveness of the proposed algorithms is evaluated through simulations. Finally, we conclude the paper in Section V. II. POBLEM DEFINITION As we have mentioned, in a cellular structured sensor networ with the original protocol given in [3], a considerable amount of inter-cell time s can be idle and a large portion of bandwidth is wasted. We try to solve this problem by designing algorithms to properly reuse the idle-s during inter-cell communication. In this section we tae a closer observation on the occurrences of idle-s and the feasibility of idle- reuse. We also introduce the major concerns that must be addressed when designing idle- reuse algorithms. To simplify description, in the following sections of this paper, if not explicitly specified, the terms time and idle- always denote inter-cell time and inter-cell idle-. The traffic- partiality characteristic is very common for sensor networs, where most data pacets are forwarded from data sources to one or several BSs (base stations). The occurrence of idle-s is a direct result of this traffic- partiality characteristic. For example, suppose that a BS is located to the A of a router, most traffic relayed by would be heading to A. Thus during the time s that are assigned to the other five s, will not receive nor send any pacets. This is obviously a waste of channel capacity, as during these idles and its neighboring routers indeed can eep sending Fig. 2. Fairness in Idle-Slot ecycling and receiving pacets along A. There are two types of idle-s for a router. If during a time a router does not have any pacets to send to the pre-assigned x, wecallitasasending idle of. Similarly, if during a time there is no any pacets from pre-assigned x to, we call it as a receiving idle- of. For two neighboring routers to reuse an idle-, the sending idle- of the sender and the receiving idle- of the receiver must be matched together, by which we mean that the sender must choose to use the idle- to transmit pacets to the receiver, and the receiver must also choose to use the idle- to receive pacets from the sender. It is worth noting that due to the cellular structure and the seven distinct channels, idle- reuse will not cause transmission collisions. For example, as displayed in Fig. 2, even mistaenly reuses its sending idle- to send a pacet to in A, the transmission between and will not be interrupted because and use the same channel while uses a different one. To effectively and decently reuse idle-s, we need to answer the following three questions: (1) Do routers need to exchange idle- information? (2) How do routers maximize the probability of successful idle- reuse? (3) How do routers reuse these idle-s fairly? For question (1), it depends on how effectively we want to reuse the idle-s. By exchanging idle- information among neighboring routers, it is expected that better performance can be achieved. We can piggybac idle- information in data and ACK pacets, and as the attached information can be as short as several bits, the introduced overhead is acceptable. For question (2), the most challenging problem for idle- reuse is that, when two routers have sending and receiving idle- respectively, how they can have a high probability to pic each other to reuse this idle-. Because they both have five other neighbors, the probability of successful reuse can be as low as 4%, if they just flip a coin. For question (3), fairness is another concern, which is important for a networ to provide better service. As shown in Fig. 2, if router and both have many data pacets to send to, should try to fairly allocate its receiving idle-s between them. We will further discuss these questions and give our solutions in the next section /08/$ IEEE. 2 This full text paper was peer reviewed at the of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2008 proceedings.

3 III. IDLE-SLOT ECYCLING In this Section, four idle- recycling algorithms will be proposed and compared. The basic idea is that, some idle- reuse agreements will be set up between routers to increase the probability of successful idle- reuse. The fairness issue will also be addressed. A. andom Idle-Slot ecycling (-IS) -ISs a very simple way to reuse idle-s: at an arbitrary time, if a router has a sending idle- (receiving idle-), it randomly pics up one among other five s to send (receive) a pacet. The problem of this algorithm is also straightforward: the probability of successful idle- reuse can be very small. Suppose during the same time two neighboring routers and have one sending idle- and one receiving idle respectively, because both and have five other neighbors, the probability for them to pic up each other to reuse their idle-s is as low as 4%. B. Most ecently Used Idle-Slot ecycling (MU-IS) In a typical multi-hop wireless sensor networ, a data source periodically reports collected data to BSs. So once a router node successfully receives a pacet from its neighbor, may anticipate that there will be more following pacets from. Based on this observation, we designed the MU-IS, a quite simple yet efficient idle- recycling algorithm. The basic idea is that once router successfully transmits a pacet to its neighbor,anopportunistic preemptive idle reuse agreement (OP-agreement) is immediately set up between and, and then if has more sending idles, it will try to send pacets to and also will try to receive pacets from at its receiving idle-s. We call this idle- reuse agreement opportunistic and preemptive because these agreements between routers are only based on the current transmission and a guess for future traffic. Besides, these agreements might be set up and preempted frequently and dynamically according to the most recent successful pacet transmissions. For example, as shown in Fig. 3, in A, the router transmits a pacet to and then an OP-agreement is established between them. In the next B, if receives a pacet from its another neighbor, a new OP-agreement is immediately set up between and without regard to the previous OPagreement between and. So in the following C, if has a receiving idle-, it will try to reuse this idle- with instead of. Due to the traffic- partiality nature of data flows, MU-IS wors much better than -IS. However, since OP-agreement is set up opportunistically without accurate information for future traffic, it may not always wor well. As shown in Fig. 3, when releases its OP-agreement with and establishes a new one with, it actually does not now (a) A (b) B (c) C Fig. 3. Opportunistic Preemptive Idle- euse Agreement whether has more pacets for it or not in the near future. If has no more pacets or has no sending idle- in the next C, then the receiving idle- of will be wasted and at the same time the sending idle- of can not be utilized. Another problem is fairness, since the OP-agreement is preemptive, some nodes might have more chances to reuse idle-s than others. For example, as illustrated in Fig. 3, suppose A is followed by B, if both and have many pacets to send to, will always be able to preempt the OP-agreement from, such that may send more pacets than. Therefore, we will propose another two algorithms to further enhance the performance of MU-ISn the following subsections. C. Informed Idle-Slot ecycling (I-IS) The main differences between MU-IS and I-IS are that idle- reuse agreement is set up according to more accurate future traffic information and each agreement will be ept for a certain amount of time and cannot be arbitrarily preempted. I-ISs outlined as follows: (1) Each idle- reuse agreement has a reuse point (P). If P is greater than 0, the agreement is called an informed coordinated idle- reuse agreement (IC-agreement) and it cannot be preempted by others. On the other hand, if P is less than 1, the agreement is called an informed preemptive idle- reuse agreement (IP-agreement), which means new agreement can be set up to replace it. (2) When a router sends a data pacet to,if has more pacets for and does not have any existing ICagreement with others, will attach its buffer status and an idle- reuse request (I-equest) in the data pacet. (3) Once receives an I-equest from,if has receiving idle-s and has no existing IP-agreement with nor IC-agreement with others, sets up an IC-agreement with (P is initialized to a positive number, e.g. 10 in our simulations). The agreement set up confirmation will be attached in the ACK pacet to. (4) Suppose there is an IC-agreement (IP-agreement) between and. When has a sending idle-, will try to send a pacet to. On the other hand, will also try to receive a pacet from at its receiving idle-s. If they succeed to reuse an idle-, the P of the IC-agreement (IPagreement) is deducted by a small number (e.g. 1), otherwise P is deducted by a larger number (e.g. 3). When P of an /08/$ IEEE. 3 This full text paper was peer reviewed at the of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2008 proceedings.

4 IC-agreement is decreased to less than 1, the IC-agreement is converted to an IP-agreement. Since the future traffic information is exploited, the problem caused by the opportunism in MU-ISs relieved. Moreover, the idle- reuse chances are shared among neighbors more fairly by introducing two types of agreements. For example, as shown in Fig. 3, we pointed out that in MU- IS, will always preempt the OP-agreement from.but in I-IS, the IC-agreement between and cannot be preempted by before it turns to an IP-agreement. D. Informed Directional Idle-Slot ecycling (ID-IS) For the above algorithms, if two routers set up an agreement, it will be applied to all their six s and the al reuse is not taen into account. For example, as shown in Fig. 4, suppose that has pacets for both and, and has an idle- reuse agreement with.in E, can reuse its sending idle- with, while in A, cannot successfully transmit to because has pacets for. As we can see, in fact, in A, should reuse with since has no any pacet to receive. So, if the idle- reuse agreements can be set up by s, we can expect to reuse more idle-s. Thus, based on I-IS, ID-ISs proposed to reuse idles by s. The ID-ISs outlined as follows: (1) As in I-IS, there are two types of idle- reuse agreements, IP-agreement and IC-agreement, and each agreement has a P. For each router, it has six sending s and six receiving s. At the beginning, all these sending and receiving s are mared as unreserved. An agreement can be set up between one sending and one receiving of two routers. (2) When sends a data pacet to, if has more pacets for and has some unreserved sending s, will attach its buffer status, unreserved sending s and an I-equest in the data pacet. (3) Once receives an I-equest from,if has unreserved receiving s, sets up IC-agreements with in matched s (i.e. in these s, and have unreserved receiving and sending s respectively). Then, mars the corresponding receiving s as reserved. But if already has an existing IPagreement with in a certain, just eeps the IP-agreement. The agreement set up confirmation will be sent bac to via ACK. Upon receiving the ACK, sets up agreements and mars its sending s accordingly. (4) Suppose and have an IC-agreement (IPagreement) in A. When has a sending idle- in A, will try to send a pacet to.onthe other hand, when has a receiving idle- in A, will try to receive a pacet from. If they succeed to reuse an idle-, the P of the IC-agreement (IP-agreement) is deduced by a small number, otherwise P is decreased by a larger number. When the P of an IC-agreement is less than (a) E (b) A (c) B Fig. 4. Informed Directional Idle-Slot ecycling 1, the IC-agreement is converted to an IP-agreement and the corresponding is mared as unreserved. IV. SIMULATION We evaluate our proposed idle- recycling algorithms (-IS, MU-IS, I-IS, and ID-IS) through two sets of simulations. We first study their throughput and delay performance, and then we focus on the flow rate fairness they attained. In our simulations, there are 200 router nodes (cells) deployed in a squared area. Each inter-cell and intracell time is 0.01 second. Only inter-cell communications are simulated and during each inter-cell time one pacet can be transmitted. Every pacet has a fixed length of 512 bytes. Simulation results show that all the three algorithms (MU-IS, I-IS, and ID-IS) can greatly improve networ throughput and decrease pacet transmission delay, where ID- IS gives the highest throughput. In addition, ID-IS can achieve better fairness than MU-IS and I-IS. In this section, the original protocol in [3] is used as a baseline for comparison purpose, and it is referred as no recycling. In the first set of simulations, there are two BSs (base stations), one of which is located at the northwest corner of the networ and the other one is located at the northeast corner. 10 out of the 200 nodes are randomly selected as data sources and they periodically send pacets to one of the two BSs. We run the simulation for 200 seconds. Fig. 5 compares the networ throughput achieved by different algorithms when varying the sending rate of each data source. We can see that with the sending rate increasing the networ quicly gets congested if no idle- reuse is exploited. In other words, the networ bandwidth is not well utilized. -IS achieves higher throughput but the improvement is limited. As we expected, the other three algorithms (MU- IS, I-IS, and ID-IS) are able to improve the networ throughput dramatically. Among the three algorithms, ID-IS gets the best performance and I-ISs also better than MU- IS, because informed algorithms can obtain more accurate information about future traffic, by which they can better reuse idle-s accordingly. We study the delay performance of the algorithms when the networ traffic is light, as pacets will be dropped when congestion happens. Fig. 6 shows the simulation results. Because idle-s are well utilized, the pacet transmission delays of MU-IS, I-IS and ID-IS are much smaller than /08/$ IEEE. 4 This full text paper was peer reviewed at the of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2008 proceedings.

5 Fig. 5. Fig. 6. Delivered pacets per second Delay in seconds no recycling -IS MU-IS I-IS ID-IS Sending rate (pacets per second) Networ throughput with different source sending rates no recycling -IS MU-IS I-IS ID-IS Sending rate (pacets per second) Transmission delay with different source sending rates those of the other two algorithms. The three curves (MU- IS, I-IS, and ID-IS) stic together because they all wor very well and approach the optimal delay performance. In the next set of simulations, we evaluate the fairness property. We set up two data flows, one of which goes from north to south and the other one goes from west to east, and they cross each other at the center of the networ, where the crossing node becomes the bottlenec. The sending rates of the two flows are set to high enough, such that they are always baclogged at the bottlenec. We observe the effective throughput of the two flows when they are competing with each other. From Table I, no recycling and -IS achieve near perfect fairness because they only allocate the same minimum bandwidth to each of the two flows and leave the rest bandwidth (idle-s) unused, or very limitedly reused. As the other three algorithms (MU-IS, I-IS, and ID-IS) exploit idle-s, the throughput is improved. Especially, ID- TABLE I THOUGHPUT (PACKETS PE SECOND) FAINESS FO TWO COSSING FLOWS flow 1 flow 2 no recycling IS MU-IS I-IS ID-IS IS achieves the best fairness because the idle- recycling in ID-ISs more elegantly coordinated. V. CONCLUSION The MAC protocol proposed in [3] for cellular structured sensor networs gives a promising solution for applications with real-time requirements. By eliminating transmission collisions, it saves energy and can potentially increase networ throughput. However, when traffic- partiality exists, which is very common in sensor networs, a lot of time s become idle and the networ capacity is not fully utilized. In this paper, we proposed four idle- recycling algorithms (-IS, MU-IS, I-IS, ID-IS) that can greatly improve networ throughput and reduce pacet transmission delay. Among the four algorithms, -IS and MU-IS do not need any auxiliary information, and MU-IS already performs quite well for most application scenarios. By maing use of the traffic information of neighboring cells, I-IS and ID-ISmprove the networ performance further. ID- IS achieves the best throughput, while it is able to allocate bandwidth among data flows fairly. Moreover, for all the four algorithms, the collision-free and real-time qualities of the original protocol are retained. The performance of the algorithms is evaluated through simulations. Our future wor will be focused on extending the algorithms to more general TDMA schemes without cellular structures. EFEENCES [1] I. F. Ayildiz, W. Su, Y. Sanarasubramaniam, and E. Cayirci, Wireless sensor networs:a survey, International Journal of Computer and Telecommunications Networing Elsevier, 38(4): , Mar [2] J. A. Stanovic, T. F. Abdelzaher, C. Lu, L. Sha, and J. C. Hou, ealtime communication and coordination in embedded sensor networs, In Proc. of the IEEE, Volume 91, Pages , Jul [3] M. Caccamo, L. Y. Zhang, L. Sha, and G. Buttazzo, An implicit prioritized access protocol for wireless sensor networs, in Proc. of IEEE eal-time Systems Sysmposium 02, Dec [4] D. J. Goodman, Cellular pacet communications, IEEE Transactions on Communications, 38(8), Aug [5] I. Chlamtac and S. Kutten, A spatial reuse tdma/fdma for mobile multihop radio networs, in Proc. IEEE INFOCOM Conf., pp , Mar [6] N. Funabii and Y. Taefuji, A parallel algorithm for broadcast scheduling problems in pacet radio networs, IEEE Trans. Commun., 41(6),pp , Jun [7] I. Cidon and M. Sidi, Distributed assignment algorithms for multihop pacet radio networ, IEEE Trans. Comput., 10(38), pp , [8]. Mnagharam, M. Demirhan,. ajumar, and D. aychaudhuri, Size matters: size-based scheduling for mpeg-4 over wireless channels, SPIE conference on Multimedia Computing and Networing 2004, Jan [9] E. Kwon, D. Hwang, and J. Lim, An idle time reuse scheme for ieee high-rate wireless personal area networs, IEEE Vehicular Technology Conference (VTC)., Vol.2, pp , Sept [10] S. hee, K. Chung, Y. Kim, W. Yoon, and K. Chang, An applicationaware mac scheme for ieee high-rate wpan, IEEE Wireless Communications and Networing Conf., (WCNC), vol.2, pp , Mar /08/$ IEEE. 5 This full text paper was peer reviewed at the of IEEE Communications Society subject matter experts for publication in the IEEE "GLOBECOM" 2008 proceedings.

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network

An Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

PERFORMANCE EVALUATION OF A TDMA MAC PROTOCOL IN AIRBORNE TELEMETRY NETWORKS

PERFORMANCE EVALUATION OF A TDMA MAC PROTOCOL IN AIRBORNE TELEMETRY NETWORKS PERFORMANCE EVALUATION OF A TDMA MAC PROTOCOL IN AIRBORNE TELEMETRY NETWORKS Muharrem Ali Tunç, Erik Perrins and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks Mary Wu 1, ChongGun Kim 1 1*, HeeJoo park 1 Dept. of Computer Eng., Yeungnam Univ., Korea Dept. of Cyber Security., Kyungil

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

WIRELESS/MOBILE networking is one of the strongest

WIRELESS/MOBILE networking is one of the strongest IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 3, MAY 2004 835 An Integrated Adaptive Bandwidth-Management Framework for QoS-Sensitive Multimedia Cellular Networks Sungwook Kim and Pramod K. Varshney,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011

1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Achieving MAC-Layer Fairness in CSMA/CA Networks Ying Jian, Ming Zhang, Student Member, IEEE, and Shigang Chen, Member, IEEE Abstract

More information

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link

Optimizing Packet Size via Maximizing Throughput Efficiency of ARQ on Bluetooth ACL Data Communication Link Proceedings of the 5th WSEAS Int. Conf. on APPLIED INFOATICS and COUNICATIONS, alta, September -7, 25 (pp24-28 Optimizing Pacet Size via aximizing Throughput Efficiency of AQ on Bluetooth ACL Data Communication

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 213 SSR Improvement in OFDMA Femtocell Networks Sandhya Y. A. M.Tech Student, KU Mar Baselios College of Engineering

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Cross Layer Design in d

Cross Layer Design in d Australian Journal of Basic and Applied Sciences, 3(3): 59-600, 009 ISSN 99-878 Cross Layer Design in 80.6d Ali Al-Hemyari, Y.A. Qassem, Chee Kyun Ng, Nor Kamariah Noordin, Alyani Ismail, and Sabira Khatun

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009

Interference in Femtocell Networks. Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Interference in Femtocell Networks Roger Piqueras Jover ELEN E6951 Wireless & Mobile Networking II April 13th 2009 Overview Wireless cellular networks Current challenges in cellular networks Femtocell

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

THE capabilities of mobile cellular communications may

THE capabilities of mobile cellular communications may 680 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 4, APRIL 2006 Analysis and Modeling of Upstream Throughput in Multihop Packet CDMA Cellular Networks Ali Nabi Zadeh, Member, IEEE, and Bijan Jabbari,

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Load Balancing and Relaying Framework in TDD W- CDMA Multi-hop Cellular Networks

Load Balancing and Relaying Framework in TDD W- CDMA Multi-hop Cellular Networks Load Balancing and Relaying Framework in TDD W- CDMA Multi-hop Cellular Networks Y. Hung Tam 1, Ahmed M. Safwat 2, and Hossam S. Hassanein 1 1 Telecommunications Research Laboratory, School of Computing,

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Novel Techniques for Fair Rate Control in Wireless Mesh Networks Novel Techniques for Fair Rate Control in Wireless Mesh Networks Mohiuddin Ahmed Computer Science and Engineering Department Islamic University of Technology Gazipur, Bangladesh K.M.Arifur Rahman Electrical

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS

VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS VIRTUAL CONNECTION TREE FOR 3G WIRELESS COMMUNICATION SYSTEMS Rajinder Kumar Department of Computer Science and Engineering Punjab Engineering College,Chandigarh raajinderkumar@gmail.com Abstract This

More information

A Self-Organized Femtocell for IEEE e System

A Self-Organized Femtocell for IEEE e System A Self-Organized Femtocell for IEEE 80.16e System Young Jin Sang, Hae Gwang Hwang and Kwang Soon Kim School of Electrical and Electronic Engineering, Yonsei University 134, Shinchong-dong, Seodaemun-gu,

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

DMP Packet Scheduling For Wireless Sensor Network

DMP Packet Scheduling For Wireless Sensor Network American Journal of Engineering Research (AJER) 2015 American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-08-15 www.ajer.org Research Paper Open

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Introduction to

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication

Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Ziwen Zhao, Sebastian S. Szyszkowicz, Tamer Beitelmal, Halim Yanikomeroglu Carleton University Ottawa, Canada Contents

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

REDUCTION OF NETWORK CONGESTION IN M2M COMMUNICATION

REDUCTION OF NETWORK CONGESTION IN M2M COMMUNICATION REDUCTION OF NETWORK CONGESTION IN M2M COMMUNICATION Leeban Moses.M 1, Abirami.U 2, Aishwarya.P 3, Fathima Yasmin.S 4, Hari Priya. K 5 1 Assistant Professor, 2,3,4,5 Student Members Department of Electronics

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

Quickest Search Over Multiple Sequences with Mixed Observations

Quickest Search Over Multiple Sequences with Mixed Observations Quicest Search Over Multiple Sequences with Mixed Observations Jun Geng Worcester Polytechnic Institute Email: geng@wpi.edu Weiyu Xu Univ. of Iowa Email: weiyu-xu@uiowa.edu Lifeng Lai Worcester Polytechnic

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks

A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 1143 A Probing Process for Dynamic Resource Allocation in Fixed Broadband Wireless Access Networks Qiang Wang and Anjali Agarwal, Member,

More information

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks KSII The first International Conference on Internet (ICONI) 2010, December 2010 1 Coexistence Issues in Contention-Based Heterogeneous Wireless Networks Eun-Chan Park 1, Minjoong Rim 1, Hwangnam Kim 2,

More information

A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh Networks*

A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial Reuse for Wireless Mesh Networks* A Distributed Channel Access Scheduling Scheme with Clean-Air Spatial euse for Wireless Mesh Networks* Yuan-Chieh Lin 1, Shun-Wen Hsiao 1, Li-Ping Tung 2, Yeali S. Sun 1, and Meng Chang Chen 2 1 Dept.

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Fair scheduling in the network with a mesh topology

Fair scheduling in the network with a mesh topology International Research Journal of Applied and Basic Sciences. Vol., 3 (5), 911-918, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Fair scheduling in the network with a mesh topology

More information