Efficient MAC Strategies for the IEEE n wireless LANs

Size: px
Start display at page:

Download "Efficient MAC Strategies for the IEEE n wireless LANs"

Transcription

1 WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2006; 6: Published online 9 January 2006 in Wiley InterScience ( DOI: /wcm.274 Efficient MAC Strategies for the IEEE n wireless LANs Yang Xiao*,y Computer Science Division, The University of Memphis, 373 Dunn Hall, Memphis, TN 38152, U.S.A. Summary Current IEEE wireless local area network (WLAN) standard products can provide up to 54 Mbps raw transmission rate, while non-standard WLAN products with 108 Mbps have already appeared in the market, and the next generation WLAN will provide much higher transmission rates. However, the medium access control (MAC) was designed for lower data rates, such as 1 2 Mbps, and it is not an efficient MAC. Furthermore, a theoretical throughput limit exists due to overhead and limitations of physical implementations, and therefore increasing transmission rate cannot help a lot. Designing efficient MAC strategies becomes critical and important. In this paper, we introduce and propose a series of efficient MAC strategies to overcome the fundamental overhead, and to improve performance. The protocols and mechanisms include Direct Link Protocol, Without Acknowledgement, Without Retransmissions, Block Acknowledgement Protocol, Concatenation, Packing, Multiple Frame Transmission (versions 1 and 2) and Piggyback. The aim of this paper is to introduce and propose these efficient new MACs not only for current IEEE standards (.11a/.11b/.11g), but also for the next generation WLAN with higher speed and higher throughput, especially for IEEE n. Copyright # 2006 John Wiley & Sons, Ltd. KEY WORDS: IEEE ; medium access control (MAC); distributed coordination function (DCF); IEEE n; IEEE e 1. Introduction The IEEE wireless LAN (WLAN) becomes an essential feature of every day s life and is being accepted for many different environments. The IEEE medium access control (MAC) employs mandatory contention-based channel access function called distributed coordination function (DCF), and an optional centrally controlled channel access function called point coordination function (PCF) [1]. The DCF adopts a carrier sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff. The PCF adopts polling mechanisms and has never been successful in reality. To support the MAC-level quality of service (QoS), the IEEE Working Group is currently working on the standardization of IEEE e [5,11,12], which is in the final stage. The emerging IEEE e standard provides QoS features and multimedia support to the existing /.11b/.11a/.11g WLAN standards, while maintaining full backward compatibility with these standards. The IEEE e MAC employs a channel access function, called hybrid coordination function (HCF), which includes a contention-based channel access and a contention-free centrally controlled channel access mechanism. *Correspondence to: Yang Xiao, Computer Science Division, The University of Memphis, 373 Dunn Hall, Memphis, TN 38152, U.S.A. y yangxiao@ieee.org Copyright # 2006 John Wiley & Sons, Ltd.

2 454 Y. XIAO The IEEE , b and a/g specifications provide up to 2, 11 and 54 Mbps data rates [1 4] respectively. To provide better QoS, especially for multimedia applications, increasing data rates is also highly desirable. Therefore, the IEEE Working Group is pursuing IEEE n, an amendment for higher throughput and higher speed enhancements, aiming for higher throughput instead of higher data rates with PHY and MAC enhancements. The IEEE n standard process has three phases: the phase 1 is the preparation stage from January 2002 to September 2002; the phase 2 is the stage of the IEEE High Throughput Study Group (HTSG) from September 2002 to September 2003; the phase 3 is the stage of IEEE n Task Group from September 2003 to September 2005 (expected). During the phase 1, the preparation stage, IEEE Working Group was seeking higher data rates over 100 Mbps for IEEE a extension [6 10,13 16]. Some higher data rate approaches were proposed such as bit-loading (BL) approach [14], the double clock rate approach [15], the double subcarrier number approach [15], the 4096-QAM- OFDM approach [15] and the OFDM/SDM (multicarrier MIMO) system approach [15] etc. However, we proved that a theoretical throughput limit exists due to overhead of MAC and PHY [8,9]. In other words, the theoretical throughput limit, about 75 Mbps for IEEE a with the payload size of 1500 bytes [9], upper bounds any obtained throughput even when the data rate goes infinitely high. Therefore increasing transmission rate cannot help a lot. Both reducing overhead and pursuing higher data rates are therefore necessary and important [10]. The IEEE HTSG was established in July 2002 emphasizing higher throughput for higher data rates over 100 Mbps wireless LANs. During the phase 2, the stage of the IEEE HTSG, Project Authorization Request (PAR) and Five Criteria for Standards Development had been established. During the phase 3, the IEEE n Task Group undertakes the following steps: (a) identify and define usage models, channel models and related MAC and application assumptions; (b) identify and define evaluation metrics that characterize the important aspects of a particular usage model; (3) call for proposals, combine them, revise them and finally publish a final standard. It is planned to publish the IEEE n standard in October 2005 [17]. So far, most of the contributions in the IEEE n meetings focus on PHY enhancements. The aim of this paper is the same as IEEE n, and we focus on MAC enhancements instead of PHY enhancements. Therefore, this paper serves a good purpose for MAC enhancements, which can also be proposed in future IEEE n task group meetings. In this paper, we give an overhead analysis to identify the fundamental problem of MAC inefficiency, i.e. overhead (MAC/PHY headers and trailers, inter-frame spaces, backoff time and acknowledgements). We introduce and propose following efficient MAC strategies. Direct Link Protocol (DLP): DLP was proposed in IEEE e [5]. Since stations are not allowed to transmit frames directly to other stations that are not the access point (AP) if an AP is present, DLP allows stations to transmit frames directly to another station by setting up such data transfer when an AP is present. Therefore, efficient transmissions can be achieved. Without Acknowledgement: In the DCF, error control adopts positive acknowledgment. In other words, every transmitted frame needs a positive acknowledgment. For some applications such as frames with audio UDP packets as payload, delay is much more important, whereas some frame-loss is tolerable. Therefore, we can adopt without acknowledgement mechanism to become more efficient. Without Retransmissions: For real-time multimedia traffic with sensitive delay requirements, retransmitted frames may be too late to be useful due to the unexpected delay. With this consideration, for some applications such as real-time transmissions, the retry-limit can be set to be zero to become more efficient. In other word, no retransmission happens. Block Acknowledgement Protocol (BAP): BAP was proposed in IEEE e [5]. It is also called Burst Transmission and Acknowledgment (BTA) [10], Contention-Free Burst (CFB) [11], Group Transmission and Acknowledgements (GTA) [12], Delayed Group Acknowledgement (DGA) and etc. The idea of BAP is that instead of acknowledging each frame, a burst of frames is received first, and then the whole burst is acknowledged one time. Concatenation [18]: The idea of a concatenation mechanism is to concatenate multiple frames into a single transmission. Frames can be concatenated if they are available, and have the same source and destination addresses. The length of concatenation should be smaller than a threshold.

3 EFFICIENT MAC STRATEGIES 455 Packing: Packing is the act of combining multiple service data units (SDUs) from a higher layer into a single MAC protocol data unit (PDU). It is similar to concatenation, but the difference is that SDUs for the packing mechanism form one PDU, whereas SDUs for the concatenation mechanism form separate PDUs. Multiple Frame Transmission: Multiple frames are transmitted in a burst in order to reduce the overhead relatively. It is similar to concatenation and packing too. The difference is that each frame is transmitted separately with a separate SIFS and/ or an acknowledgement. Piggyback [18]: The idea of the piggyback mechanism is that a destination station is allowed to piggyback a data frame to the source station once during the DCF period if the destination station has a frame to send to the source station. Note that not all of the above schemes are perfect: each scheme has advantages and disadvantages. We will further discuss them in later sections. In this paper, all results adopt IEEE a as an example. However, it is easy to be applied to IEEE b/.11g/.11e. Similar conclusions will hold for IEEE b/.11g/.11e too. The rest of the paper is organized as follows. In Section 2, we briefly introduce the IEEE MAC and IEEE e. In Section 3, we study theoretical throughput limit and provide an overhead analysis. We introduce and propose a series of efficient MAC enhancements in Section 4. Performance evaluations are embedded in the schemes. We conclude this paper in Section Introduction of IEEE MAC and IEEE e We introduce the IEEE MAC and the IEEE e MAC in Subsections 2.1 and 2.2 respectively The IEEE MAC The IEEE MAC employs a mandatory DCF and an optional PCF. These functions determine when a station (STA), operating within a basic service set (BSS) or independent BSS (IBSS), is permitted to transmit. There are two types of networks: infrastructure network (BSS) in which an AP is present and ad hoc network (IBSS) in which an AP is not present. In a long run, time is always divided into repetition intervals called superframes. Each superframe starts with a beacon frame, and the remaining time is further divided into a contention-free period (CFP) and a contention period (CP). The DCF works during the CP and the PCF works during the CFP. If the PCF is not active, a superframe will not include the CFP. The DCF defines a basic access mechanism and an optional request-to-send/clear-to-send (RTS/CTS) mechanism. In the DCF, a station with a frame to transmit monitors the channel activities until an idle period equal to a distributed inter-frame space (DIFS) is detected. After sensing an idle DIFS, the station waits for a random backoff interval before transmitting. The backoff time counter is decremented in terms of slot time as long as the channel is sensed idle. The counter is stopped when a transmission is detected on the channel, and reactivated when the channel is sensed idle again for more than a DIFS. In this manner, stations that deferred from channel access because their backoff time was larger than the backoff time of other stations, are given a higher priority when they resume the transmission attempt. The station transmits its frame when the backoff time reaches zero. At each transmission, the backoff time is uniformly chosen in the range [0, CW 1] in terms of timeslots, where CW is the current backoff window size. At the very first transmission attempt, CW equals the initial backoff window size CW min. After each unsuccessful transmission, CW is doubled until a maximum backoff window size value CW max is reached. After the destination station successfully receives the frame, it transmits an acknowledgment frame (ACK) following a short inter-frame space (SIFS) time. If the transmitting station does not receive the ACK within a specified ACK timeout, or it detects the transmission of a different frame on the channel, it reschedules the frame transmission according to the previous backoff rules. The above mechanism is called the basic access mechanism. In such a mechanism, the hidden node problem may happen: transmissions of a station cannot be detected using carrier senses by a second station but interfere with transmissions from the second station to a third station. To reduce the hidden station problem, an optional four-way data transmission mechanism called RTS/CTS is also defined in the DCF. In the RTS/CTS mechanism, before transmitting a data frame, a short RTS frame is transmitted. The RTS frame also follows the backoff rules introduced above. If the RTS frame succeeds, the receiver station responds with a short CTS frame. Then a data frame

4 456 Y. XIAO and an ACK frame will follow. All four frames (RTS, CTS, data, ACK) are separated by an SIFS time. In other words, the short RTS and CTS frames reserve the channel for that data frame transmission which follows. The PCF is an optional centrally controlled channel access function, which provides contention-free (CF) frame transfer. The PCF is designed for supporting time-bounded services, which can provide limited QoS. It logically sits on top of the DCF, and performs polling, enabling polled stations to transmit without contending for the channel. It has a higher priority than the DCF by adopting a shorter inter-frame space (IFS) called point inter-frame space (PIFS). If the PCF is implemented, CFP under the PCF and CP under the DCF alternate over time. A CFP and a CP forms a superframe. The AP where the point coordinator (PC) is normally located senses the medium idle for a PIFS interval, and then transmits a beacon frame to initiate a CFP (in other words, to initiate a superframe). After a SIFS time, the PC sends a poll frame to a station to ask for transmitting a frame. The poll frame may or may not include data to that station. After receiving the poll frame from the PC, the station with a frame to transmit may choose to transmit a frame after a SIFS time. When the destination station receives the frame, an ACK is returned to the source station after a SIFS time. The PC waits a PIFS interval following the ACK frame before polling another station or terminating the CFP by transmitting a CF-end frame. If the PC receives no response from the polled station for a PIFS interval, the PC can poll next station or terminate the CFP by transmitting a CF-End frame IEEE E IEEE e provides a channel access function, called Hybrid Coordination Function to support applications with QoS requirements. The HCF includes both a contention-based channel access and a centrally controlled channel access. The contention-based channel access of the HCF is also referred to as enhanced distributed coordination function (EDCF). A new concept, transmission opportunity (TXOP), is introduced in IEEE e. A TXOP is a time period when a station has the right to initiate transmissions onto the wireless medium. It is defined by a starting time and a maximum duration. A station cannot transmit a frame that extends beyond a TXOP. If a frame is too large to be transmitted in a TXOP, it should be fragmented into smaller frames. The EDCF works with four access categories (ACs), which are virtual DCFs, where each AC achieves a differentiated channel access. This differentiation is achieved through varying the amount of time a station would sense the channel to be idle and the length of the contention window during a backoff. The EDCF supports eight different priorities, which are further mapped into four ACs. ACs are achieved by differentiating the arbitration inter-frame space (AIFS), the initial window size, and the maximum window size. For the AC iði ¼ 0;...; 3Þ, the initial backoff window size is CW min ½iŠ, the maximum backoff window size is CW max ½iŠ, and the arbitration interframe space is AIFS[i]. For 0 i < j 3, we have CW min ½iŠ CW min ½jŠ, CW max ½iŠ CW max ½jŠ and AIFS[i] AIFS[j], and at least one of above inequalities must be not equal to. In other words, the EDCF employs AIFS[i], CW min ½iŠ and CW max ½iŠ (all for i ¼ 0;...; 3) instead of DIFS, CW min and CW max respectively. If one AC has a smaller AIFS or CW min or CW max, the AC s traffic has a better chance to access the wireless medium earlier. The values of AIFS[i] (i ¼ 0,...,3), CW min [i] (i ¼ 0,...,3) and CW maz [i] (i ¼ 0,...,3) are referred to as the EDCF parameters, which will be announced by the QoS access point (QAP) via periodically transmitted beacon frames. 3. Theoretical Limit and Overhead Analysis The achievable maximum throughput (MT) can be achieved when the system is at the best-case scenario: (1) the channel is an ideal channel without errors; (2) at any transmission cycle, there is one and only one active station which always has a frame to send, and other stations can only accept frames and provide acknowledgments. The throughput upper limit (TUL) [8,9] is defined as the maximum throughput when the raw data rate goes infinitely high. As indicated in Reference [10], overhead is the major fundamental issue for inefficient MAC, and it includes headers (MAC header, FCS and PHY header), inter-frame spaces, backoff time and acknowledgements. In this section, we assume that control rate is the same as data rate. Define overhead as the difference between data rate and throughput, and define the normalized overhead as the overhead divided by data rate. We further assume that all higher data rates are compatible with IEEE a.

5 EFFICIENT MAC STRATEGIES 457 Fig. 1. Maximum throughput (MT) and throughput upper limit (TUL) versus data rate. Fig. 3. Normalized overhead versus data rate (Mbps). Fig. 2. Overhead (Mbps) versus data rate (Mbps). Figure 1 shows that MT and TUL versus data rate with payload size 100 and 1500 bytes. The TUL depends on the payload size. When the payload size is 100 bytes, the TUL is about 5 Mbps, and when the payload size is 1500 bytes, the TUL is about 75 Mbps. We observe that as the data rate increases, the MT increases, but are bounded by the TUL. Figures 2 and 3 show overhead and normalized overhead versus data rate respectively. We observe that both the overhead and the normalized overhead increase as the data rate increases. The normalized overhead almost reaches 100% after 180 Mbps when the payload size is 100 bytes. The normalized overhead almost reaches 70% after 180 Mbps when the payload size is 1500 bytes. Figures 4 and 5 show overhead and normalized overhead versus payload size respectively. We Fig. 4. Overhead (Mbps) versus payload (bytes). Fig. 5. Normalized overhead versus payload (bytes).

6 458 Y. XIAO observe that both the overhead and the normalized overhead decrease as the payload size increases. The normalized overhead almost reaches 100% when the payload size is very small. In summary, overhead and normalized overhead are extremely large (relatively) either when the data rate is high or when the frame is small. Therefore, new efficient MAC strategies are especially needed. In next section, we will introduce and propose several efficient MAC protocols to overcome overhead. Fig. 6. Directed-link protocol (DLP). 4. Efficient MAC Protocols In this section, we introduce and propose several efficient MAC protocols: direct link protocol, Without Acknowledgement, Without Retransmissions, Block Acknowledgement Protocol, Packing, Concatenation, Multiple Frame Transmission and Piggyback in the following subsections Direct Link Protocol Direct link protocol (DLP) was proposed in IEEE e [5]. The DLP allows a QoS station (QSTA) to transmit frames directly to another QSTA by setting up such data transfer when a quality access point (QAP) is present. The need for this protocol is motivated by the fact that the intended recipient may be in Power Save Mode, in which case it can only be woken up by the QAP. Another purpose of the DLP is to be efficient. The DLP allows the sender and the receiver to exchange rate set and other information. Furthermore, The DLP messages can be used to attach security information elements. This protocol prohibits the stations going into powersave for the active duration of the direct stream. DLP does not apply in an ad hoc network, where frames are always sent directly from one QSTA to another. A direct link can be built by following sequences: QSTA-1 that has data to send invokes the DLP and sends a DLP-request frame to the QAP, shown in Figure 6 (1a). This request contains the rate set, and (extended) capabilities of QSTA-1, as well as the MAC addresses of QSTA-1 and QSTA-2. If QSTA-2 is associated in the BSS, the QAP shall forward the DLP-request to the recipient, QSTA-2, shown in Figure 6 (1b). If QSTA-2 accepts the direct stream, it shall send a DLP-response frame to the QAP, shown in Figure 6 (2a). The QAP shall forward the DLP-response to QSTA-1, shown in Figure 6 (2b), after which the direct link becomes active and frames can be sent from QSTA-1 to QSTA-2 and from QSTA-2 to QSTA-1, shown in Figure 6 (3). When the direct link is active, QSTA-1 may use DLP-probes to gauge the quality of the link between QSTA-1 and QSTA-2. The direct link becomes inactive when no frames have been exchanged as part of the direct link for the duration of adlpidletimeout. After the timeout, frames with destination QSTA-2 shall be sent via the QAP. In the simulations, we evaluate the DLP in the EDCF for voice streams (AC ¼ 3), video streams (AC ¼ 1) and data (AC ¼ 0) in terms of throughput and delay. The simulation program is implemented with Java using discrete event simulation approach. We have the following parameters unless stated otherwise: AIFS[3] ¼ 25 ms; CW min [3] ¼ 8; CW max [3] ¼ 512; AIFS[1] ¼ 25 ms; CW min [1] ¼ 64; CW max [1] ¼ 2048; AIFS[0] ¼ 34 ms; CW min [0] ¼ 256; 256; CW max [0] ¼ 16384; each video stream is 4.86 Mbps, which is generated by a constant inter-arrival time ms with a mean frame size 1464 bytes. Each voice stream is Mbps, which is generated by a constant inter-arrival time 4 ms with a mean frame size 92 bytes. Each data station has traffic of 2 Mbps, which is generated by an exponential interarrival time 6 ms with a mean payload size 1500 bytes. The data rate is 54 Mbps and the control rate is 24 Mbps. We assume that all the stations are within the transmission range. The simulation time is 100 s. Initially, there are one voice stream, one video stream and one data QSTA in the system. At 10 and 20 s, one voice stream one video stream, and one data station are added each time. At 30, 40 and 50 s, only one voice stream is added each time. There are totally six

7 EFFICIENT MAC STRATEGIES 459 improved for all ACs. For voice, video and data, delay per stream increases as the traffic load increases. In summary, the DLP improves IEEE /.11e/.11a MAC efficiency. However, if two QSTAs have only very few frames to transmit/exchange such as one frame only, the DLP is not recommended since the DLP has overhead of four message exchanges when setting up the direct link. Normally, the DLP is recommended if one QSTA will be active for a time period to transmit frames to another QSTA such as FTP, real-time transmission etc. Fig. 7. Throughputs (Mbps) of voice (a), video (b) and data (c) with and without the DLP versus the simulation time. voice streams, three video streams and three data QSTAs at the end of the simulation. Figure 7 shows throughputs (per stream) for voice, video and data with and without the DLP. As illustrated in the figure, with the DLP, throughput has been greatly improved for all ACs. We observe that when the traffic load is small, video throughput (per stream) is pretty well, whereas when the traffic load is large, some fluctuations happen. On the other hand, voice throughput (per stream) is pretty well since voice needs less bandwidth so that the influence by the heavy traffic load is small. Figure 8 shows delays (per stream) for voice, video and data with and without the DLP. As illustrated in the figure, with the DLP, delay has been greatly 4.2. Without Acknowledgement In the DCF error control adopts positive acknowledgment. In other words, every transmitted frame needs a positive acknowledgment. For some applications such as frames with audio UDP packets as payload, delay is much more important, whereas some frame-loss is tolerable. Therefore, we can adopt without acknowledgement mechanism to become more efficient. Define throughput gain (TG) as the difference of the MT without ACK and the MT with ACK, divided by the MT with ACK. Figure 9 shows TG versus data rate when the payload size is 1500 bytes, TG increases as the data rate increases, and reaches 12% at the data rate 216 Mbps. Therefore, TG is high for high data rates. Figure 10 shows TG versus payload. For both data rates (6 and 216 Mbps), TG decreases as the payload size increases. In summary, the without ACK scheme is more effective when the payload size is small or the data rate is high. Fig. 8. Delays (ms) of video, voice and data with and without the DLP. Fig. 9. Throughput gain versus data rate.

8 460 Y. XIAO Fig. 10. Throughput gain versus payload size. Fig. 11. Delay gain (DG) and frame dropping loss (FDL) Without Retransmissions In the DCF error control adopts positive acknowledgment and retransmission to improve transmission reliability in the wireless medium. If an acknowledgement frame for a transmitted frame has not been received for a timeout period, the transmitted frame is assumed to be corrupted and the frame will be retransmitted for many times until a positive acknowledgement is received or the number of retransmissions reaches a limit. In the later case, the frame is dropped. Therefore, the MAC is a very robust protocol for the best-effort service in the wireless medium. For realtime multimedia traffic with sensitive delay requirements, retransmitted frames may be too late to be useful due to the unexpected delay. With this consideration, for some applications such as real-time transmissions, the retry-limit can be set to be zero to become more efficient. In other word, no retransmission happens. Define delay gain (DG) as the difference of the delay with the retry limit as 7 and the delay without retransmissions, i.e. the retry limit as 0, divided by the delay with the retry limit as 7. Define frame dropping loss (FDL) as the difference of the frame dropping ratio with the retry limit as 0 and the frame dropping ratio with the retry limit as 7, divided by the frame dropping ratio with the retry limit as 0. Figure 11 shows the DG and the FDL over the number of active stations. As illustrated in the figure, as the number of active stations increases, the DG increases and the FDL decreases. We observe that the DG can be as large as % when the number of active stations is 45; and the FDL can be one the range from 99 to 100%. In other words, the without retransmission scheme can significantly improve delay with some degree of degraded frame dropping ratio Block Acknowledgement Protocol Block acknowledgement protocol (BAP) was proposed in IEEE e [5]. It is also called burst transmission and acknowledgment (BTA) [10], contention-free burst (CFB) [11], group transmission and acknowledgements (GTA) [12], delayed group acknowledgement (DGA) and etc. The idea of BAP is that instead of acknowledging each frame, a burst of frames is received first, and then the whole burst is acknowledged at one time. A MAC service data unit (MSDU) is the information that is delivered as a unit between MAC service access points (SAP s). A MAC protocol data unit (MPDU) is the unit of data exchanged between two peer MAC entities using the services of the physical layer (PHY). We use MPDU s and frames interchangeably in this section. Since wireless medium (WM) is error-prone, transmitted frames can easily be corrupted, even without collisions. In the IEEE MAC protocol, each frame is acknowledged. This approach is very natural and robust, but it introduces quite an amount of overhead. In order to reduce the acknowledgement overhead, BAP is currently being discussed in the IEEE e task group [5]. The BAP mechanism allows a burst of frames to be transmitted before any acknowledgement. After sending a burst of frames, the sender sends a burst acknowledgement request (BlockAckReq) frame,

9 EFFICIENT MAC STRATEGIES 461 Table I. Comparison. Data rate (Mbps) Payload size: 1000 bytes Basic access BAP BAP model MT (Mbps) improvement (%) MT (Mbps) MT increase % % % % TUL % and the receiver must respond by sending the burst acknowledgement (BlockAck) frame, in which the correctly received frames information is included. All the frames, including BlockAckReq frame and BlockAck frame, are separated by an SIFS period. The sender should first win a transmission opportunity (TXOP) using a channel access mechanism before starting a burst. A TXOP is a time period when a station has the right to initiate transmissions onto the WM. A TXOP is defined by a starting time and a maximum duration. The burst length is limited, and the amount of state that must be kept by the receiver of the receiving frames is bounded. The sequence control field is 16 bits in length and consists of two subfields, the fragment number (4 bits) and the sequence number. Therefore, an MSDU could be decomposed into 2 4 ¼ 16 fragment frames maximum if the size of the MSDU is larger than the fragmentation threshold. The Ack bitmap field is 32 octets in length, where each bit can acknowledge one fragment frame (MPDU). Some of the MSDU s in the burst may be fragmented, and it is hard to know a priori if fragmentation will ever be used or not. Therefore, in order to accommodate fragmentations, 16 bits in the Ack Bitmap field are needed to acknowledge an MSDU, where each bit acknowledges one potential fragment frame (MPDU) of the MSDU. In other words, to acknowledge one MSDU, two octets in the Ack Bitmap field are needed. Therefore, the Bitmap in the Ack Bitmap field can acknowledge up to 32/2 ¼ 16 MSDU s. The Sequence Control field contains the fragment number and sequence number corresponding to bit 0 of the Ack Bitmap. The sequence control field defines an MPDU sequence number equal to (sequence number 16) þ fragment number. Bit position n, if set to a 1, acknowledges MPDU with MPDU sequence number equal to (sequence control þ n). If the BlockAck indicates that an MPDU was not received correctly, the sender shall retry that MPDU subject to MPDU s appropriate retry limit. Retransmitted burst data MPDU s shall preserve their original relative order. The receiver shall maintain a burst acknowledgement record consisting of a transmitter address and a 32-octet bitmap of received MPDU sequence numbers. These hold the acknowledgement state of the burst data received from that sender. Table I summarizes and compares the maximum throughputs when the payload size is 1000 bytes. It also shows the performance improvement after using the BAP mechanism. The maximum throughput increase is calculated by (MT BAP -MT)/MT in percentage. The TUL-increase is calculated in a similar way. As illustrated in the table, after using the BAP mechanism, MT increases 61.54, 97.6, %, for % for data rates 54, 108, 162 and 216 Mbps respectively. The TUL increases % after using the BAP mechanism. One observation is that such increase (in percentage) increases as the data rate increases after using the BAP mechanism. In other words, the BAP mechanism particularly works better for higher data rates Packing, Concatenation and Multiple Frame Transmission In this section, we introduce and propose three similar efficient MAC strategies: Packing, Concatenation and Multiple Frame Transmission, shown in Figure 12. The ideas of these three approaches are similar, i.e. to put multiple frames into a single (or approximately single) transmission. These mechanisms have many benefits. First of all, since transmitting longer frames may have a better throughput than transmitting shorter frames, adopting these mechanisms, the system can achieve the throughput of transmitting longer frames. The second and the most important benefit is that these mechanisms can reduce overhead. Without these mechanisms, each frame transmission needs a separate set of overhead (headers, inter-frame spaces, backoff time and/or acknowledgements). With these mechanisms, instead of several sets of overhead for different frames, only one set of overhead will be used. Finally, these mechanisms can reduce the average delay. Without these mechanisms, the second or a later frame is transmitted in a much later time. With these mechanisms, it will be transmitted almost at the same time or at an earlier time.

10 462 Y. XIAO the packing mechanism form one PDU, whereas SDUs for the concatenation mechanism form separate PDUs. In other words, packing is to combine all concatenated frames into a real big frame with one header instead of many concatenated frames. As shown in Figure 12(b), the result of packing is a real frame with MAC header called packing header, and multiple payloads: each payload has a length field in front. The packing mechanism is more efficient than the concatenation mechanism, but sacrifices complexity and processing time of combining and decomposing frames. Fig. 12. Diagrams for Concatenation, Packing and Multiple Frame Transmission (CH, concatenation header; PH. packing header; L1 Ln. length of the following payload). Note that in Figure 12, physical overhead is not shown, and diagrams are not drawn with scales. Furthermore, only basic access mode is showed. The diagrams for the optional RTS/CTS mode are omitted Concatenation Frames can be concatenated if they are available, and have the same source and destination addresses. Multiple frames are concatenated into a super frame, shown in Figure 12(a). A super frame includes a concatenation header (CH) frame and concatenated frames. In the CH, the frame control type field indicates that it is a concatenation super frame, and the payload includes the count of concatenated frames (2 bytes), and a total length field (2 bytes). When the destination station receives the super frame, it decomposes the super frame into normal frames, and acknowledges the last concatenated frame only. The destination station can easily identify boundaries of concatenated frames using preambles and FCS Packing Frames can be packed if they are available, and have the same source and destination addresses. Packing, shown in Figure 12(b), is the act of combining multiple service data units (SDUs) from a higher layer into a single MAC protocol data unit. It is similar to concatenation, but the difference is that SDUs for Multiple frame transmission The idea of Multiple Frame Transmission is similar to packing and concatenation. There are two kinds of multiple fame transmission. We called them multiple frame transmission version 1 (MFT-1) (Figure 12(c)) and multiple frame transmission version 2 (MFT-2) (Figure 12(d)). In MFT-1, frames are separated by SIFS. In MFT-2, each framed are acknowledged separately. MFT-1 is similar to BAP. Frames can be conducted with MFT-1, if they are available, and have the same source and destination addresses. However, for MFT-2, such requirements are not necessary. For Packing, Concatenation and MFT-1, the acknowledgement scheme needs to changed, whereas for MFT- 2, the acknowledgement scheme remains the same Thresholds One question is how big a super/real/virtual frame should be. One possible solution is that the number of concatenated/packed/multiple frames should not be larger than a threshold (such as 2, 3 or 4), and the total length should be smaller than another threshold, which is smaller than or equal to the fragmentation threshold. The threshold is called the concatenation threshold, the packing threshold or the multiple frame transmission threshold. For example the threshold can be 500 bytes. The purpose of these mechanisms is not to build a huge frame, but a reasonable size of frame since huge frames may cause a bad effect on fairness, and when collided, a longer frame is lost. Note that for IEEE802.11a, the length field of PLCP frame can indicate less value than 4096 bytes, and the maximum size of MAC frame is generally 2346 bytes [3]. The threshold should be much smaller than 2346 bytes. The threshold will be further discussed in simulation results.

11 EFFICIENT MAC STRATEGIES 463 When the RTS/CTS mode is used, the RTS threshold (defined as dot11rtsthreshold [1]) is turned on, i.e. if the total length of a frame is larger the RTS threshold, the RTS/CTS mode is automatically used. We could use the total length of super frame as the size of a frame to use the RTS/CTS mode Processing time One tradeoff of the concatenation and packing mechanisms is that the processing delay will increase a little. A good processing time is an idle time such as backoff time. Some frames could be concatenated/ packed beforehand, but at most times, frames must be concatenated/packed at real-time when frames are in the queue waiting for transmission. The super frameformat for the concatenation mechanism is designed in such a way that processing time of combining and decomposing frames is insignificant, whereas the packing mechanism is more efficient than the concatenation mechanism, but sacrifices complexity and processing time of combining and decomposing frames. MFT-1 and MFT-2 do not need additional processing time Implementation issue and other issues The concatenation/packing mechanism can be implemented in both stations and access points in which a queue is implemented so that when higher layer data arrives and cannot be sent immediately, the waiting frames are put into the queue. Such a scenario happens since the frame in the head of the queue often experiences backoff, collisions and waiting for an ACK. For all four mechanisms, examples for available frames can be formed from short UDP packets, realtime voice/audio packets, TCP-ACK packets and so on. The above-mentioned packets are all small in size, and therefore, good throughputs are expected by using these mechanisms. One small frame can also be concatenated/packed/transmitted with a relatively large frame, e.g. a TCP ACK packet follows a relatively large frame. In case that there are no available frames in the queue (in other words, concatenation/ packing rarely occurs), normal DCF procedures will be used by default and the system will have the same performance as before. These mechanisms are not a reversed mechanism of fragmentation. In fact, the proposed mechanisms require that the total length of the super/real/virtual frames is less than the fragmentation threshold. Therefore, there will be no concatenated/packed/ multiple frame that was originally generated by a previous fragmentation mechanism. On the other hand, the super/real/virtual frame will not be fragmented since the total length is less than the fragmentation threshold. Since these mechanisms do not change any system behavior such as the backoff behavior except that frames become larger, it is easy to see that these mechanisms should have a better performance untuitively Simulation results with single transmission station In this subsection, we study MT for the proposed schemes. In the simulation, the data rate is 54 Mbps. The number of packed/concatenated/multiple frames is 2. Figure 13 shows MT for different mechanisms. All mechanisms have better MTs than that of the original MAC. It also shows that packing is the most efficient mechanism, and concatenation is better than MFT-1, which is better than MFT Simulation results with multiple transmission stations In this subsection, we study the throughput with multiple transmission stations for the proposed schemes. In the simulation, the data rate is 54 Mbps and the payload size is 100 bytes. The number of packed/concatenated/multiple frames is 3. In the simulations, each station always has frame ready to send. Fig. 13. MT for different mechanisms (Payload ¼ 1000 bytes.).

12 464 Y. XIAO Fig. 14. Normalized throughput versus number of stations. Figure 14 shows normalized throughput versus number of stations, where the normalized throughput is defined as the portion of time used to transmit payload when stations have frames ready to transmit in any time. We observe that the packing mechanism has the highest throughput. Concatenation is a little better than MFT-1, which is better than MFT-2. All mechanisms are better than the original MAC in terms of throughput. In summary, the decreasing order in terms of efficiency is packing, concatenation, MFT-1 and MFT-2. However, it is also a decreasing order in terms of complexity Piggyback The idea of the piggyback mechanism (PM) is that a receiver station is allowed to piggyback a data frame to the sender station once if the receiver station has a frame to send to the sender. Such a mechanism is beneficial for cases such as TCP ACK packets. TCP over IEEE DCF is considered as an example. After a TCP receiver entity successfully received a TCP packet from a TCP sender entity, it needs to send a TCP ACK back to the TCP sender entity. However, the backward TCP ACK also needs to compete with the channel access. If the access delay of the TCP ACK is very large, the TCP sender entity will misjudge that the original TCP packet did not go through to the receiver, and will retransmit the original TCP packet again. With the proposed PM, the above backward TCP ACK will be piggybacked to the sender immediately after receiving the TCP packet. The overall performance will be improved greatly. For the original MAC, if the destination has a frame to send to the source after receiving a frame, it needs Fig. 15. MT over payload. to compete the channel again by at least a DIFS time and a random backoff. On the other hand, in the PM, the destination can piggyback a frame to the source with the ACK information included. The source then sends an ACK to acknowledge the piggybacked frame after a SIFS time. The benefit of the proposed piggyback mechanism is that the piggybacked frame does not need to wait DIFS and complete the channel again. Piggyback will reduce overhead, and improve performance. If there is not a frame available to piggyback, similar to the concatenation mechanism, normal DCF operations will be performed by default, and the system will have the same performance as before. In the simulations, the data rate is 54 Mbps. Figure 15 shows MT for the PM and the original MAC. The PM is better than the original MAC in terms of MT. Figure 16 shows normalized throughput versus number of stations. In the simulations, each station Fig. 16. Normalized throughput versus number of stations.

13 EFFICIENT MAC STRATEGIES 465 always has frame ready to send. We observe that the PM has better throughput than the original MAC. 5. Conclusions and Future Work In this paper, we have identified that overhead is the fundamental problem of inefficiency. Increasing transmission rate alone cannot help a lot. The overhead is very large either when the data rate is high or when the frame size is small. Therefore, new efficient MAC strategies are especially needed. We have introduced and proposed several MAC enhancements for higher throughput: Direct Link Protocol, Without Acknowledgement, Without Retransmission, Block Acknowledgement Protocol, Concatenation, Packing, Multiple Frame Transmission Version 1 and Version 2 and Piggyback. Our simulation results show that all these MAC enhancements can improve throughput greatly. The without ACK scheme is more effective when the payload size is small or the data rate is high. The without retransmission scheme can significantly improve delay with some degree of degraded frame dropping ratio. The ideas of packing, concatenation, MFT-1 and MFT-2 are similar. The above order is a decreasing order in terms of efficiency, but a decreasing order in terms of complexity. In this paper, we only consider an ideal channel in our performance evaluations. Performance evaluations under a noisy channel are our current and future work, and we have already reported some preliminary results in this respect in the recent IEEE n meeting [19,20]. Acknowledgement The author thanks Mr. Haizhon Li for providing two simulation figures (Fig. 7 and Fig. 8) of the DLP. References 1. IEEE WG, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification, Standard, IEEE, August IEEE b WG, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification: High- Speed Physical Layer Extension in the 2.4 GHz Band, IEEE, September IEEE a WG, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification: High- Speed Physical Layer in the 5 GHz Band, IEEE, September IEEE g-2003, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 4: Further Higher-Speed Physical Layer Extension in the 2.4 GHz Band. 5. IEEE e/D3.3.2, Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS), November Jones VK, DeVegt R, Terry J. Interest for HDR extension to a, IEEE Interim Meeting, doc. IEEE r0, January Tan TK. Call for Interests on a Higher Rates Extension. IEEE Interim Meeting, January Xiao Y, Rosdahl J. Throughput Limit for IEEE IEEE 802 Interim Meeting, May 13 17, 2002, doc.: IEEE / 291r0. 9. Xiao Y, Rosdahl J. Throughput and Delay Limits of IEEE IEEE Communications Letters 2002; 6(8): Xiao Y, Rosdahl J. Performance Analysis and Enhancement for the Current and Future IEEE MAC Protocols. ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), special issue on Wireless Home Networks 2003; 7(2): Choi S, Prado J, Shankar S, Mangold S. IEEE e Contention-Based Channel Access (EDCF) Performance Evaluation. In Proceedings IEEE ICC 03, Anchorage, Alaska, USA, May Xiao Y. IEEE e: A QoS Provisioning at the MAC layer. IEEE Wireless Communications 2004; 11(3): Xiao Y, Rosdahl J. Throughput Analysis for IEEE a Higher Data Rates. IEEE r0, March Tzannes M, Cooklev T, Lee D. Extended Data Rate a. IEEE r0, March Hori S, Inoue Y, Sakata T, Morikura M. System capacity and cell radius comparison with several high data rate WLANs. IEEE r1, March Coffey S. Suggested criteria for high throughput extensions to IEEE systems. IEEE r0, March Shoemake MB. Task Group N Schedule. IEEE / 488r Xiao Y. Concatenation and Piggyback Mechanisms for the IEEE MAC. Proceedings of IEEE WCNC Ni Q, Li T-J, Turletti T, Xiao Y. AFR Partial MAC Proposal for IEEE n. IEEE n Working Group Document: IEEE n, September Ni Q, Li T-J, Turletti T, Xiao Y. AFR Partial MAC Proposal for IEEE n: Presentation. IEEE n Working Group Document: IEEE n, September Author s Biography Yang Xiao received his Ph.D. in Computer Science and Engineering from Wright State University, Dayton, OH, U.S.A. He had been a software engineer a senior software engineer, and a technical lead working in the computer industry for 5 years in early 1990s. He worked at Micro Linear-Salt Lake City Design Center as an MAC

14 466 Y. XIAO architect involving the IEEE (Wireless LAN) standard enhancement work before he joined The University of Memphis as an assistant professor of computer science. Dr. Xiao is a voting member of the IEEE Working Group, a senior member of IEEE, and a member of ACM. He is an associate editor of EURASIP Journal on Wireless Communications and Networking, and currently serves on the editorial boards of (Wiley) Journal of Wireless Communications and Mobile Computing, International Journal of Wireless and Mobile Computing and International Journal of Signal Processing. He serves a lead guest editor for (Wiley) Journal of Wireless Communications and Mobile Computing, special issue on Mobility, Paging and Quality of Service Management for Future Wireless Networks in , a lead guest editor for International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, WPANs, Ad Hoc Networks and Sensor Networks in , and an associate guest editor for International Journal of High Performance Computing and Networking, special issue on Parallel and Distributed Computing, Applications and Technologies in He serves as a symposium co-chair for Symposium on Data Base Management in Wireless Network Environments in IEEE VTC 2003 Fall. He serves as a TPC member for many conferences such as ICC, GLOBECOM, ICDCS, WCNC ICCCN, PIMRC, WMASH etc. Dr. Xiao s current research interests include wireless local area networks, wireless personal area networks and mobile cellular networks. He has published many papers in major journals and refereed conference proceedings related to these research areas, such as IEEE Transactions on Mobile Computing, IEEE Transactions on Wireless Communications, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Vehicular Technology, IEEE Communications Letters, IEEE Communications Magazine, IEEE Wireless Communications, ACM/Kluwer MONET etc.

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS

A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN e NETWORKS A SCHEME FOR IMPROVED DELAY AND FRAME DROP PROBABILITIES IN 82.11e NETWORKS Daniel Fokum and Cory Beard School of Computing and Engineering, University of Missouri Kansas City 534 Robert H. Flarsheim Hall

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Notes on the Inefficiency of e HCCA

Notes on the Inefficiency of e HCCA Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

IEEE e Enhanced QoS

IEEE e Enhanced QoS IEEE 802.11e Enhanced QoS 國立中興大學資工系曾學文 Tel : (04)22840497 ext 908 E-mail: hwtseng@nchu.edu.tw Outlines Introduction Traffic Differentiation Hybrid Coordination Function (HCF) Contention-Based Channel Access

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

IEEE e QoS for Wireless LAN:

IEEE e QoS for Wireless LAN: IEEE 802.11e QoS for Wireless LAN: A Research Direction James Yu 12/09/2003 TDC Network Seminar 1 IEEE 802.11 MAC Layer Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Different from CAMA/CD

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

IEEE N: ENHANCEMENTS FOR HIGHER THROUGHPUT IN WIRELESS LANS

IEEE N: ENHANCEMENTS FOR HIGHER THROUGHPUT IN WIRELESS LANS ACCEPTED FROM O PEN C ALL IEEE 8.N: ENHANCEMENTS FOR HIGHER THROUGHPUT IN WIRELESS LANS YANG XIAO, THE UNIVERSITY OF MEMPHIS L frame (d) level version A single frame frame MA fram (e) level version L (f)

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Exam4Tests.   Latest exam questions & answers help you to pass IT exam test easily Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : PW0-300 Title : Certified Wireless Network Expert Vendors : CWNP Version : DEMO Get Latest

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1 Announcements 18-759: Wireless Networks Lecture 11: 802.11* Please mail survey team information» Can include topic preferences now if you have them Submit project designs through blackboard Homework 2

More information

Converging Voice, Video and Data in WLAN with QoS Support

Converging Voice, Video and Data in WLAN with QoS Support Research Online ECU Publications Pre. 211 28 Converging Voice, Video and Data in WLAN with QoS Support Hushairi Zen Daryoush Habibi Justin Wyatt Iftekhar Ahmad 1.119/WOCN.28.4542485 This article was originally

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Optimized WLAN MAC Protocol for Multimedia Applications

Optimized WLAN MAC Protocol for Multimedia Applications Research Online ECU Publications Pre. 2011 2008 Optimized WLAN MAC Protocol for Multimedia Applications Hushairi Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542484 This article

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Wireless Local Area Network (WLAN) Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Outline Wireless LAN Overview History IEEE 802.11-1997 MAC implementations PHY implementations

More information

Throughput Enhancement of IEEE WLAN for Multimedia Communications.

Throughput Enhancement of IEEE WLAN for Multimedia Communications. Enhancement of IEEE 82.11 WLAN for Multimedia Communications. T.M Nazmul Huda Blekinge Institute of Technology (BTH) Karlskrona, Sweden tmnazmulhuda@yahoo.ca Abstract: This paper mainly focuses on the

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Performance evaluation of IEEE e

Performance evaluation of IEEE e IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 159 Performance evaluation of IEEE 802.11e Sandeep kaur 1, Dr.jyotsna sengupta 2 Department of Computer Science,

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Adaptive Channel Occupation for Wireless Video Delivery

Adaptive Channel Occupation for Wireless Video Delivery Adaptive Channel Occupation for Wireless Video Delivery Ismail Djama and Toufik Ahmed CNRS-LaBRI Lab, University of Bordeaux-1. 351 Cours de la Libération, F-3345 Talence - France Tel: +33 5 4 35 47, Fax:

More information

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access

Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access Fairness and Transmission Opportunity Limit in IEEE802.11e Enhanced Distributed Channel Access by Anni Matinlauri Instructor: Jouni Karvo Supervisor: Professor Raimo Kantola Agenda Background Research

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University

A SURVEY OF QOS TECHNIQUES IN Drabu, Yasir Department of Computer Science, Kent State University A SURVEY OF QOS TECHNIQUES IN 802.11 Drabu, Yasir Department of Computer Science, Kent State University Contents 1. Abstract 2. Introduction 3. Background 3.1. 802.11 Mac Sub layer 3.2. Distributed Coordination

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

Appendix A Pseudocode of the wlan_mac Process Model in OPNET

Appendix A Pseudocode of the wlan_mac Process Model in OPNET Appendix A Pseudocode of the wlan_mac Process Model in OPNET static void wlan_frame_transmit () { char msg_string [120]; char msg_string1 [120]; WlanT_Hld_List_Elem* hld_ptr; const WlanT_Data_Header_Fields*

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

WIRELESS local area networks (LANs) have quickly

WIRELESS local area networks (LANs) have quickly 282 IEEE TRASACTIOS O WIRELESS COMMUICATIOS, VOL 4, O 5, SEPTEMBER 2005 IEEE 802 Performance Enhancement via Concatenation and Piggyback Mechanisms Yang Xiao, Senior Member, IEEE Abstract The IEEE 802

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Fair and Effective Transmissions in IEEE e WLAN

Fair and Effective Transmissions in IEEE e WLAN GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 17 Fair and Effective Transmissions in IEEE 802.11e WLAN Seongcheol Kim 1 and Jinoo Joung 1 1 Software School, Sangmyung University, Seoul, Korea

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information