A Simulation Study of the Contention Based Access Periods of the IEEE ad Hybrid MAC

Size: px
Start display at page:

Download "A Simulation Study of the Contention Based Access Periods of the IEEE ad Hybrid MAC"

Transcription

1 A Simulation Study of the Contention Based Access Periods of the IEEE ad Hybrid MAC C. Hemanth Department of Electrical Engineering Indian Institute of Technology, Madras Chennai, India T.G. Venkatesh Department of Electrical Engineering Indian Institute of Technology, Madras Chennai, India Abstract IEEE ad is a recent Wireless LAN standard operating at 60 GHz band. In this paper a simulation based performance evaluation of the Contention Based Access Periods (CBAP) of the IEEE ad hybrid MAC protocol under Pareto arrivals is carried out. Two performance metrics namely, throughput and average delay are evaluated. Due to the hybrid nature of the protocol, CBAP packet transmissions has to be deferred when the protocol switches from CBAP to contention free period. We show that (i) this deferral of packet transmission along with (ii) CBAP bandwidth allocation scheme has significant effect on the system performance. Keywords hybrid MAC; IEEE ad; Pareto; throughput; MAC delay; simulation; I. INTRODUCTION IEEE ad is a recent (Dec. 2013) amendment to the WLAN standard, operating at 60 GHz, which promises a wireless equivalent of gigabit Ethernet [1]. Due to the availability of huge unlicensed bands at 60 GHz, larger bandwidths can be used for communication, thereby improving the data rates for multimedia applications. The 60 GHz band is very useful for short range communications with larger bandwidths. The various potential applications envisaged for the IEEE ad [2] standard are: 1) Web browsing and other best effort data transfer 2) Sync and go file transfer, that enables gigabytes of file transfer in very short time 3) Uncompressed high definition video streaming that enables wireless display of content on a remote screen 4) Wireless gaming Apart from the technical challenges, the requirement of the usages the ad network needs to support are extremely varied in nature. Applications such as wireless display, gaming etc., are very sensitive to delay and jitter and have very stringent QoS requirements [3]. On the other hand, applications such as web browsing, sync and go file transfer etc., are best effort in nature and hence do not require QoS guarantees [3]. The diverse set of requirements from the envisaged usages and applications along with the propagation characteristics in 60 GHz, creates considerable challenges for the MAC layer design. A. The Need for Hybrid MAC protocol for 60 GHz band Although attractive, the wireless communication in 60 GHz band has significant technical challenges. We know that the radiated power decays along the distance, according to the inverse square law given by Friis equation [4]. From the Friis equation, the loss between two isotropic antennas is given as L f ree = ( λ 4πr ) 2 (1) where λ is the wavelength. Converting the equation (1) in terms of frequency and expressing in units of decibels we have L f ree = log 10 f + 20log 10 r (2) where f is frequency in GHz, r is the line of sight distance between the antennas in km. From the equation (2) it can be observed that, as the frequency increases the free space loss increases. It can be observed that even for shorter distances, free space loss is high as compared to the the conventional 2.4 / 5 GHz band. For example, consider a distance of 1 m, the free space loss at 5 GHz is around 46.3 db, whereas at 60 GHz, the free space loss is db, which is almost 21 db higher [1]. Further in the case of millimetre wave signals, attenuation due to oxygen absorption also occurs since the atmospheric oxygen absorption peaks at 60 GHz [5]. This leads to further attenuation as compared to the 2.4 / 5 GHz band. Therefore due to high frequency, short wavelength and oxygen absorption spectrum characteristics, the attenuation at 60 GHz can be of the order of 20 db higher than the 2.4 / 5 GHz band operation [3], [6]. In order to compensate the 20 db loss, directional antennas can be successfully used. Due to small wavelengths, multiple antennas can be packed in a very small area, which can then be used for highly directional beamforming. In order to identify the best MAC scheme at 60 GHz, a simulation based study was carried out using the three most popular MAC schemes, namely TDMA, CSMA/CA and Polling [3]. The CSMA/CA is suitable for bursty traffic due to its efficient channel utilization, but due to omni directional communication there is a significant performance penalty. The TDMA is an efficient protocol for wireless display and large file transfers in sync and go. Polling can exploit directional communication effectively but faces a performance hit due to the high power consumption at the master node and latency involved due to polling stations having empty queues. Finally due to the pros and cons of each access scheme and diversity of requirements, a hybrid MAC scheme using these protocol on a as-needed basis was proposed. ISBN: PGNet

2 Applications such as web browsing and sync and go file transfers can use the contention based access while TDMA protocol is ideal for applications like video streaming. In this paper we analyse the performance of the Contention Based Access Periods (CBAP) of the IEEE ad MAC protocol using simulations. The remainder of the paper is organized as follows. IEEE ad MAC layer is described in detail in Section II. Section III describes the IEEE ad CBAP protocol and highlights the differences from the conventional DCF operation. Literature related to the performance analysis of IEEE ad is presented in section IV. The performance evaluation using simulation is presented along with results and discussions in Section V. Finally the paper is concluded in Section VI. II. DESCRIPTION OF THE IEEE AD MAC LAYER In this section, description of the IEEE ad MAC standard [2] is presented which will form the basis for our simulations in the subsequent sections. A. Network Architectures Due to the characteristics of the wireless medium in 60 GHz and the envisaged usages, the conventional architectures like Basic Service Set (BSS) and Independent Basic Service Set (IBSS) of the legacy networks are unsuitable for ad networks [2]. Based on the above factors, a new architecture called as Personal Basic Service Set (PBSS) has been proposed for IEEE ad. A PBSS network behaves in an adhoc manner, with one of the station (STA)/node assuming the role of PBSS central point (PCP)/Access Point (AP) to provide basic timing, synchronization and allocation of Data Transmission Time (DTT). Even though a new architecture is defined for IEEE ad, the conventional architectures of IBSS and infrastructure BSS are also supported. This is to ensure the backwards compatibility of the system. B. Medium Access Channel access by a STA occurs during beacon intervals (BI) and is coordinated using a schedule. A STA operating as a PCP/AP generates the schedule and communicates it to STAs at frequent intervals called Beacon Intervals (BI) using Beacon and Announce frames [2]. Fig. 1 illustrates the structure of a BI where the channel access is divided into Beacon Header Interval (BHI) and Data Transmission Time (DTT). The access during BHI includes the transmission of beacon frames (during BTI), beamforming training (during A-BFT) and request-response based management access periods (during AT). The Beacon Time Interval (BTI) is a time period during which the PCP/AP transmits one or more beacon frames in different directions. In addition to network management information carried in the beacon, the beacon frame is also used to bootstrap the beamforming procedure between the PCP/AP and a receiving station. A station willing to join the network scans for a beacon, continues the beamforming Fig. 1. Example structure of IEEE ad Beacon Interval process with the PCP/AP in the Association Beamforming Training (A-BFT) time, and finally associates with the PCP/AP. The A-BFT is a time period to perform initial beamforming training between the station and the PCP/AP. The A-BFT follows the BTI to provide continuity to the beamforming process that was bootstrapped through the beacon transmission in the preceding BTI. The structure of the A-BFT is slotted, which allows for multiple stations to do beamforming with the PCP/AP concurrently in the same A-BFT. Fig. 2. Illustration of request response based frame transfer during AT of IEEE ad Beacon Interval During the Announcement Time (AT) period, request response based management frames are exchanged between the PCP/AP and STAs. Apart from various other management frame exchanges, the Announcement Time (AT) period of the BI is used to reserve the slots for SP. This reservation process in AT is depicted in Fig. 2. The PCP/AP initiates the frame transmission in AT. During the AT, the PCP/AP polls all the nodes or a subset of nodes. All the nodes associated with the PCP/AP which are in need of SP, send a Service Period Request (SPR) as a reply to the poll sent by a PCP/AP. Based on these requests and QoS requirements, the PCP/AP allocates SPs to the different nodes in the subsequent frames. The PCP/AP keeps count of all the SP requests received from the individual nodes. The amount of outstanding request is reduced as the SP is allocated to each node. To support the wide variety of applications and usages envisioned, the MAC supports both random access and scheduled TDMA access. The DTT of the BI is divided into Service Periods (SP) and Contention Based Access Periods (CBAP) which provides transmission opportunities for STAs that are part of the network [2]. Channel access during the SPs is scheduled and assigned to specific STA and the access in CBAP is based on IEEE Distributed Coordination Function (DCF).

3 III. REVIEW OF THE LITERATURE ON THE PERFORMANCE ANALYSIS OF IEEE AD There are many papers on general IEEE ad and the PHY aspects of it. Not much work has been done to analyse the MAC performance. In this section we present a few litereture related to the performance evaluation of MAC layer of the IEEE ad. The authors in [6] give an overview of the current IEEE ad task group activities, and the expected enhancements to The IEEE ad standard was briefly explained and the MAC and PHY amendments were discussed by Cordeiro et al [7]. The survey paper [8] highlights the PHY/MAC enhancements and QoS mechanisms for the high throughput WLANs namely IEEE n, IEEE aa, IEEE ac and IEEE ad. In this paper many work related to the above mentioned standards are compared and contrasted for their contribution. This survey paper emphasizes the need to analyse the performance of IEEE ad hybrid MAC analytically. The authors in [1] highlight the needs of multi gigabit WiFi. They also highlight the challenges in implementation of multi gigabit WiFi using the examples of IEEE ad and IEEE ac. The authors in [9] discussed the possibility of a dual band architecture for ad based networks where the 2.4 / 5 GHz band could be used for contention mechanism and later 60 GHz band could be used for data transmission. The performance of CSMA/CA at 60 GHz was evaluated using NS- 2 simulations in [10]. The impact of antenna directivity and CSMA/CA operation modes on the throughput was analyzed. The results showed that a 90 antenna pattern at both PCP/AP and the stations exhibited the maximum throughput under the scenarios considered. The quality of service requirements and potential solutions for supporting variable bit rate traffic along with data traffic was investigated in [11]. The authors finally concluded that a combination of MAC schemes like TDMA with either CSMA or polling would be efficient for QoS guarantees along with efficient channel utilization. In [12] the authors design a random access MAC protocol with directional and cooperative communication, D-coop MAC for the IEEE ad. They use a 3 dimensional Markov chain model to analyse the performance of the proposed MAC scheme and claim that D-coop MAC outperforms the conventional IEEE ad MAC. To evaluate the performance of IEEE ad MAC, they have considered only the CBAP and neglected the effect of SP on CBAP in the analysis. In [13] the authors have presented analytical modelling and analysis of the CBAP of the IEEE ad using a Markov chain and evaluated the throughput and delay performance. For the analysis and simulations, Poisson arrival model was considered. Even though Poisson arrival process are easier to analyse analytically, best effort / bursty traffic are well modelled by Pareto distributions and not by Poisson distribution. In this paper, we aim to do a performance evaluation by considering arrival models as close to real world traffic using Pareto arrivals. IV. PROTOCOL DESCRIPTION In this section we describe the access mechanism of CBAP in detail, which is needed to understand the performance of the system. The system is assumed to be slotted. The access during CBAP is based on IEEE DCF, which is basically a carrier sense multiple access with collision avoidance (CS- MA/CA) with binary exponential backoff scheme. However, due to hybrid nature of the MAC protocol, the DCF mechanism has been adapted as follows [13]. In the basic access mechanism of the DCF, if the channel is sensed idle for a DIFS duration, the packet is transmitted. If the channel is sensed busy, the node waits for the channel to be idle for a DIFS duration. A random backoff counter value is then generated from U[0,CW min 1], where CW min is the minimum backoff window size. The counter value is decremented at the end of every idle slot and frozen whenever the channel is sensed busy. In case of IEEE ad networks, channel can be busy either due to packet transmission is CBAP or during SPs. The node attempts to transmit the packet whenever the counter reaches zero if sufficient time remains in the current CBAP duration. If the transmission is successful, the process is started for the next packet if available. On the other hand, if the transmission encounters a collision, the backoff window is doubled and the backoff process is continued. If the remaining time in the current CBAP is not sufficient for the packet transmission, the packet transmission is deferred. Upon deferral of the packet transmission due to lack of sufficient time, a random count is generated from the current backoff window and the backoff process is continued. In the above mentioned case of transmission deferral, the backoff window size is not doubled since the deferral was due to lack of time in the current CBAP period and not due to collision [13]. The doubling of the backoff window is continued until the backoff window reaches its maximum stipulated value of CW max. Upon further collision, the backoff window is not doubled, but the backoff process continues till the maximum retrial limit is reached. The packet is dropped when a collision occurs after reaching the max retrial limit. A. Simulation Setup V. PERFORMANCE EVALUATION The simulations have been carried out using MATLAB [14]. A single hop network of N functionally identical STAs, transmitting the data using the CBAP of the IEEE ad MAC is assumed. We assume a scenario where all the N STAs are transmitting the packet to a PCP/AP through a common wireless channel. There are no hidden STAs present in the network. We consider the basic access mechanism of the DCF. We consider web browsing as an application that uses CBAP of the IEEE ad. In order to model the above scenario, we assume that the inter arrival times are Pareto distributed. All nodes are assumed to have an infinite buffer. We assume the structure of BI as shown in Fig. 1 for our model and analysis. We perform simulations for different CBAP fractions. CBAP fraction (denoted as α) is defined as the ratio of CBAP duration to the length of DTT of the BI.

4 The parameters used for the simulation are taken from the standard [2] and it is given in Table I. The simulation was carried out for 2x10 8 slot times. We assume a fixed BI length of 5 ms for the simulations. A constant CBAP packet payload of 7500 octets is used for simulation purposes. The parameters used for Pareto distribution are location = 0.38, shape = 0.85 [15]. TABLE I. Parameter NETWORK PARAMETERS FOR THE ANALYSIS OF CBAP Value Channel Bit Rate 2Gbps Slot time(σ) 5 µs DIFS 13 µs SIFS 3 µs Propagation Delay(δ) 100 ns CW min 15 CW max 1023 T c, Te D Header+L+DIFS+δ T s, Te A Header+L+SIFS+δ +ACK+DIFS+δ Max MPDU 7995 octets Throughput (Gbps) Poisson Pareto Number of Stations (N) Fig. 3. Overall CBAP throughput versus the number of stations (N) for different arrival distributions. α =1, Poisson average inter arrival time =50µs. B. Results and Discussions 1) Overall CBAP Throughput Versus Number of Stations: In Fig. 3 we compare the throughput variation with respect to the number of stations for both Pareto and Poisson arrivals. We observe that as the number of nodes increases, due to an unsaturated nature of the system the overall system throughput initially increases and then saturates for both Pareto and Poisson arrival processes. Once the system reaches saturation, the per node throughput would decrease with a further increase in the number of stations. It can also be observed that, due to the hybrid nature of the protocol, the maximum channel utilisation obtained from CBAP is 40%. From the Fig. 3, we can observe that the throughput of Poisson arrival is larger than the throughput of Pareto arrivals. Hence most of the existing analysis in the literature are over estimating the realistic throughput. 2) Overall CBAP Throughput Versus Arrival Rate: The variation of throughput with respect to the arrival rate for different CBAP fractions is shown in Fig. 4. We observe that, as the arrival rate increases, the throughput initially increases and then gets saturated. When the CBAP fraction is reduced from 1 to 0.8, intuitively the throughput should scale down by a factor of 0.8 as the role of SP is just to freeze the CBAP activity. However we observe that the throughput scales down by a factor less than 0.8. This could be attributed to two opposing factors namely, (a) deferral of packet transmission due to the unavailability of channel in the current CBAP would lead to decrease in throughput and (b) when the system is frozen due to SP, the arrivals to the queue maintained by the node continues, which in turn reduces the time the system is idle due to queue being empty. This would have an effect of moving the system towards saturation and thereby increase the throughput. In this case we observe that factor (b) dominates and thereby, the throughput reduction is less than a factor of 0.8. Throughput (Gbps) CBAP fraction = 1 CBAP fraction = 0.8 CBAP fraction = Arrival Rate (pps) 3 4 x 10 5 Fig. 4. Overall CBAP throughput versus arrival rate for different CBAP fractions for N=10. 3) Overall CBAP Throughput Versus Packet Length: The variation of throughput with respect to the packet length is shown in Fig. 5. It can be seen that for all CBAP fractions, for smaller packet lengths (till 20 kb), the throughput increases with an increase in packet length. The reason behind this would be that as the packet length increases, the relative MAC overhead decreases, thereby increasing the throughput. For all values of N, CBAP fraction, with an increase in packet length above 90 kb, the throughput decreases. This could be due to the fact that with an increase in the packet size, the possibility of deferrals due to insufficient time would increase. Further, due to the alternating nature of the hybrid

5 MAC, for packet lengths greater than the CBAP durations, the probability of packet transmissions becomes zero and thereby the throughput goes to zero. For packet lengths between kb depending on the CBAP fraction, the critical packet length beyond which the throughput starts reducing changes. For higher CBAP fractions (=1), the critical packet length (70 kb) is larger as compared to smaller CBAP fraction (=0.5) (critical packet length= 50kb). Here we also observe that for a given CBAP fraction (=1), as the number of nodes is increased, the throughput reduces under basic access mechanism. This could be attributed to the fact that as the number of nodes increases, the chances of collisions increases (under the basic access mechanism) and hence the throughput reduces. Average Delay (ms) CBAP fraction =.1 CBAP fraction = 0.5 CBAP fraction = 1 Throughput (Gbps) N = 10, CBAP fraction = 1 N = 30, CBAP fraction = 1 N = 10, CBAP fraction = 0.5 N = 10, CBAP fraction = Packet Length (kb) Fig. 5. Overall CBAP throughput versus the packet length (in kb) for different number of users (N) and different CBAP fractions. 4) Average Delay versus Number of Stations: The variation of average CBAP delay with respect to number of stations is presented in Fig. 6. Here we can observe that for a given CBAP fraction, as the number of stations increases, the average delay increases. This can be attributed to the fact that as the number of stations increases, the possibility of collision increases and thereby the average duration between two successful transmission of the packet increases. Further we can observe that as the CBAP fraction reduces, the average delay increases. This can be attributed to the fact that as the CBAP fraction decreases, the duration for which SP operates increases, thereby increasing the average time taken to transmit the packet. Apart from that, the possibility of the packet transmission being deferred due to insufficient time in the current CBAP increases and hence the increase in average delay. VI. CONCLUSION In this paper we have analysed the performance of the Contention-Based Access Periods of the IEEE ad hybrid Number of STAs (N) Fig. 6. Average delay versus Number of Stations for different values of CBAP fractions for N=10. MAC using simulations. The simulations are carried out for the case of Pareto arrivals. Throughput and delay are evaluated as the performance metrics of the protocol. The results indicate that the Poisson traffic over estimates the system performance as compared to the Pareto traffic. The CBAP throughput scales down and average delay increases with an decrease in CBAP fraction. It can also be observed that packet length plays an important role in deciding the maximum throughput that can be achieved by the CBAP. REFERENCES [1] L. Verma, M. Fakharzadeh, and S. Choi, Wifi on steroids: ac and ad, Wireless Communications, IEEE, vol. 20, no. 6, pp , December [2] IEEE standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements-part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 3: Enhancements for very high throughput in the 60 GHz band, IEEE Std ad-2012 (Amendment to IEEE Std , as amended by IEEE Std ae-2012 and IEEE Std aa-2012), pp , Dec [3] C. Cordeiro, Evaluation of medium access technologies for next generation millimeter-wave WLAN and WPAN, in International Conference on Communications Workshops, ICC IEEE, 2009, pp [4] T. S. Rappaport, Wireless Communications: Principles and Practice. Dorling Kindersley, [5] S. Yong, P. Xia, and A. Valdes-Garcia, 60 GHz Technology for Gbps WLAN and WPAN: from Theory to Practice. Wiley, [6] E. Perahia, C. Cordeiro, M. Park, and L. L. Yang, IEEE ad: defining the next generation multi-gbps Wi-Fi, in Consumer Communications and Networking Conference (CCNC), th IEEE. IEEE, 2010, pp [7] C. Cordeiro, D. Akhmetov, and M. Park, IEEE ad: introduction and performance evaluation of the first multi-gbps wifi technology, in Proceedings of the 2010 ACM international workshop on mmwave communications: from circuits to networks. ACM, 2010, pp. 3 8.

6 [8] E. Charfi, L. Chaari, and L. Kamoun, PHY/MAC enhancements and QoS mechanisms for very high throughput WLANs: A survey, Communications Surveys Tutorials, IEEE, vol. 15, no. 4, pp , Fourth [9] K. Mandke and S. M. Nettles, A dual-band architecture for multi-gbps communication in 60 GHz multi-hop networks, in Proceedings of the 2010 ACM international workshop on mmwave communications: from circuits to networks. ACM, 2010, pp [10] W. Zhou, S. Nandagopalan, and D. Qiao, A simulation study of CS- MA/CA performance in 60GHz WPANs, in Global Telecommunications Conference, GLOBECOM IEEE, Nov 2009, pp [11] M. Park, C. Cordeiro, E. Perahia, and L. L. Yang, QoS considerations for 60 GHz wireless networks, in GLOBECOM Workshops, 2009 IEEE. IEEE, 2009, pp [12] Q. Chen, J. Tang, D. Wong, X. Peng, and Y. Zhang, Directional cooperative MAC protocol design and performance analysis for IEEE ad WLANs, Vehicular Technology, IEEE Transactions on, vol. 62, no. 6, pp , July [13] C. Hemanth and T. G. Venkatesh, Performance analysis of contentionbased access periods and service periods of ad hybrid medium access control, IET Networks, DoI: /iet-net , [14] MATLAB, version (R2010a). Natick, Massachusetts: The MathWorks Inc., [15] M. Sharma and A. Sahoo, A comprehensive methodology for opportunistic spectrum access based on residual white space distribution, in Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management. ACM, 2011, p. 46.

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution

On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com On the Performance Enhancement of Wireless LAN - A Multi-polling Mechanism with Hidden Terminal Solution Yue Fang, Daqing Gu, A. Bruce McDonald,

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

Performance Analysis of Integrated Sub-6 GHz-Millimeter Wave Wireless Local Area Networks

Performance Analysis of Integrated Sub-6 GHz-Millimeter Wave Wireless Local Area Networks Performance Analysis of Integrated Sub-6 GHz-Millimeter Wave Wireless Local Area Networks Omid Semiari 1, Walid Saad 2, Mehdi Bennis 3, and Merouane Debbah 4 1 Department of Electrical Engineering, Georgia

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Beamforming Training for IEEE ay Millimeter Wave Systems

Beamforming Training for IEEE ay Millimeter Wave Systems Beamforming Training for IEEE 802.11ay Millimeter Wave Systems Claudio R. C. M. da Silva, Jonathan Kosloff, Cheng Chen, Artyom Lomayev, and Carlos Cordeiro Next Generation and Standards (NGS) and Wireless

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

A Novel Framework for Radio Resource Management in IEEE Wireless LANs

A Novel Framework for Radio Resource Management in IEEE Wireless LANs Dublin Institute of Technology ARROW@DIT Conference papers Communications Network Research Institute 2005-01-01 A Novel Framework for Radio Resource Management in IEEE 802.11 Wireless LANs Mark Davis Dublin

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

ACK-based QoS Support and Throughput Improvement over WLANs

ACK-based QoS Support and Throughput Improvement over WLANs ACK-based QoS Support and Throughput Improvement over 802.11 WLANs Mehmet Fatih Tüysüz Department of Computer Engineering Harran University ftuysuz@harran.edu.tr ABSTRACT In IEEE 802.11 wireless network

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Directional MAC Protocol for IEEE ad based Wireless Local Area Networks

Directional MAC Protocol for IEEE ad based Wireless Local Area Networks 1 Directional MAC Protocol for IEEE 802.11ad based Wireless Local Area Networks Anique Akhtar and Sinem Coleri Ergen Abstract IEEE 802.11ad defines a new physical and medium access control layer for IEEE

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Survey on OFDMA based MAC Protocols for the Next Generation WLAN

Survey on OFDMA based MAC Protocols for the Next Generation WLAN Survey on OFDMA based MAC Protocols for the Next Generation WLAN Bo Li, Qiao Qu, Zhongjiang Yan, and Mao Yang School of Electronics and Information Northwestern Polytechnical University, Xi an, China Email:

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

IEEE e QoS for Wireless LAN:

IEEE e QoS for Wireless LAN: IEEE 802.11e QoS for Wireless LAN: A Research Direction James Yu 12/09/2003 TDC Network Seminar 1 IEEE 802.11 MAC Layer Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) Different from CAMA/CD

More information

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs

Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Two-phase Collision Avoidance to Improve Scalability in Wireless LANs Seongil Han, Yongsub Nam, Yongho Seok, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs

Characterising the Behaviour of IEEE Broadcast Transmissions in Ad Hoc Wireless LANs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Characterising the Behaviour of IEEE 802.11 Broadcast Transmissions

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online:

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs

A Beacon-Based Collision-Free Channel Access Scheme for IEEE WLANs Wireless Pers Commun (2014) 75:155 177 DOI 10.1007/s11277-013-1353-z A Beacon-Based Collision-Free Channel Access Scheme for IEEE 802.11 WLANs M. F. Tuysuz H. A. Mantar Published online: 27 August 2013

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance

An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance 1 An Efficient Tool for the Evaluation of the Impact of WiFi Interference on Bluetooth Performance Madani Zeghdoud 1, Pascal Cordier 1, and Michel Terré 2 1 France Telecom R&D, Issy les Moulineaux, France.

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Energy Efficiency of an Enhanced DCF Access Method using Bidirectional Communications for Infrastructure-based IEEE WLANs

Energy Efficiency of an Enhanced DCF Access Method using Bidirectional Communications for Infrastructure-based IEEE WLANs 3 IEEE 8th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Energy Efficiency of an Enhanced Access Method using Bidirectional Communications for

More information