Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks"

Transcription

1 Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden terminal in this paper. The quantitive analysis of hidden terminal problem and simulation-based analysis of its mechanism is discussed. Through the extensive ns simulations the detail comparison for the impact of sending hidden terminal and receiving hidden terminal to the performance of TCP is also given. The results show that the hidden terminal will produce large volume of MAC packets collisions and RET packet loss, so the TCP always goes into RTO. In the same sending rate, UDP receiving hidden terminal is more harmful (drop TCP to 0%) to the TCP performance than sending hidden terminal (drop TCP to 80%). However, TCP sending hidden terminal is more harmful to the TCP performance than receiving hidden terminal. Keywords: Mobile Ad Hoc Networks, Hidden Terminal, TCP Performance, Simulation 1. Introduction Over the past few years, mobile ad hoc networks have emerged as a promising approach for the future mobile IP applications. This scheme can operate independently from existing underlying infrastructure and allows simple and fast implementation. Such features meet requirements primarily of applications for rescue operations, law enforcement and battlefield, etc. In MANETs, stations may rely on physical carrier-sensing mechanism to determine idle channel, such as in the IEEE 80.11[1] DCF (Distributed Coordinate Function). However, DCF cannot resolve the hidden station and the exposed station problems completely.

2 In wireless networks, interference is location dependent. Thus, the hidden terminal problem may happen frequently. Resolving hidden terminal problem becomes one of the major design considerations of MAC protocols. IEEE DCF is the most popular MAC protocol used in both wireless LANs and mobile ad hoc networks (MANETs). Its RTS/CTS handshake is mainly designed for such a purpose. However, it has an assumption that all hidden nodes are within the transmission range of receivers (e.g. to receive the CTS packet successfully). Some nodes, which are out of the transmission range of both the transmitter and the receiver, may still interfere with the receiver. This situation happens rarely in a wireless LAN environment since there most nodes are in the transmission range of either transmitters or receivers. However, in an ad hoc network, it becomes a serious problem due to the large distribution of mobile nodes and the multihops operation. Therefore, the hidden terminal problems continue to impact the transport layer protocol performance. The main contribution of this paper is the quantitive analysis of hidden terminal problem for mobile ad hoc networks. We also give detail researches for the impact of sending hidden terminal and receiving hidden terminal to the performance TCP, which is the interaction between MAC and transport protocol. The extensive and typical simulations show the different impact of different hidden terminal problem to the performance of TCP in the different type of traffics. The rest of this paper is organized as following. In section II, we briefly review the background of DCF mechanism and hidden terminal and exposed terminal problem. Section III, we analyze the hidden terminal problem with quantitive method. The simulation experiments and results are discussed in section IV. Some related work in the literature is given in Section V. In section VI we conclude the paper.

3 . Background Overview DCF The distributed coordinating function (DCF) of specifies the use of CSMA/CA to reduce packet collisions in the network. A node with a packet to transmit picks a random backoff value T b chosen uniformly from the set {0, 1, CW 1} (CW is the contention window size), and transmits after waiting for T b idle slots. Nodes exchange request to send (RTS) and clear to send (CTS) packets to reserve the channel before transmission. Both the RTS and the CTS contain the proposed duration of data transmission, which is the duration field indicates the amount of time that the channel will be utilized to complete the successful transmission of the data. Other hosts that overhear either the RTS or the CTS are required to adjust their network allocation vector (NAV), which indicates for how long the node should defer transmissions on the channel. If a transmission is unsuccessful (by the lack of CTS or the ACK for the data sent), the CW value is doubled and the lost packet is retransmitted. The limit of retransmission times of RTS is always set to seven and DATA is four. If the transmission is successful the host resets its CW to a minimum value CW min... Hidden Terminal and Exposed Terminal Problem A typical hidden terminal situation is depicted in Fig 1. Stations A and C have a frame to transmit to station B. Station A cannot detect C s transmission because it is outside the transmission range of C. Station C is therefore the hidden node to station A. Since A and C transmission areas are not disjoint, there will be packet collisions at B. These collisions make the transmission toward B problematic. Although virtual carrier sensing which is based on a twoway handshaking RTS-CTS will help to alleviate the hidden station problem, the hidden station

4 problem still persist in IEEE ad hoc networks. This is due to the fact that the power needed for interrupting a packet reception is much lower than that of delivering a packet successfully. Therefore, the interference range is always larger than the transmission range. An exposed terminal make the victim node delay the transmission because of the victim node is in the interference or transmission range. In Figure, we show a typical scenario where the exposed terminal problem occurs. Let us assume that A and C are within B s transmission range, and A is outside C s transmission range. Let us assume that C is transmitting to D, and B has a frame to be transmitted to A. According to the carrier sense mechanism, B senses a busy channel because of C s transmission. Therefore, station B will refrain from transmitting to A, although this transmission would not cause interference at D. The exposed station problem may result in a reduction of channel utilization. The exposed terminal scenario is like hidden terminal scenario only with the difference discussion perspective. In Fig.1 right graph, node C is exposed terminal to node B, but on the other hand, it is also a hidden terminal to node A. 3. Analysis of the Ratio of Hidden Terminal In this section, we analyze the hidden terminal ratio or probability in MANETs. At first three radio ranges related to a wireless radio is clarified. Transmission Range is the range within which a packet is successfully received if there is no interference from other radios. Carrier Sensing Range is the range within which a transmitter triggers carrier sense detection. In IEEE MAC, a transmitter only starts a transmission when it senses the media free. Interference Range is the range within which stations in receive mode will be interfered by an unrelated transmitter and thus suffer a loss. Current implementation always has the same value of carrier sensing range and interference range.

5 In this paper, the exposed terminal is considered as a part of hidden terminal problem. Therefore, we only discuss the hidden terminal problem. We classify the hidden terminal into two types. If the hidden terminal is sending node, we call it sending hidden node. Thus, if the hidden terminal is receiver node, we call it receiving hidden terminal. Fig. depicts the hidden terminal position analysis. Given three nodes: A, B, C, their distance is denote by AB =x, AC =a, BC =b. Here x, a, b>0. If x< R t, a> R s, R t <b< R s, Then C is hidden terminal to A. C is also exposed terminal to B. R t : Transmission range R s : Sensing range or Interference range Now we derive how possible the node C will become hidden terminal. If circle Θ A is transmission range of A and circle Θ B is the transmission range of B, then C is in the circle Θ B but not in the circle Θ A for becoming a hidden terminal. Therefore, the total terminal in the Θ B Θ A Θ B, denote it as H (x). cos θ = x Rtx (1) θ 1 H ( x) = π * Rs *( π * Rs * *(* Rs *sin θ )* ) () π x Using (1) replace θ in (), the result is x 1 H ( x) = π * Rs * Rs arccos( ) + 4Rs x Rs 4 In IEEE 80.11, it always has R t =50m. Obviously understanding, if the distance of two nodes (A and B) is near, hidden terminal will be low possibility because one node sensing the

6 hidden terminal the other will also sensing the hidden terminal. From the mathematic analysis, if x= R t, in other works if x = 50m, H (x) has the maximized value: H ( 50) = 1.91 Rs. In IEEE 80.11, it always has R s =650m, if there are n nodes in the X*Y plane, then for given a pair of nodes A and B, the maximized possible number of its hidden terminal is: Number s max. (n - )*1.91R = X *Y When X=Y and R s =650m, maximized ratio of hidden terminal to one pair nodes in the Numbermax (n - )1.91 Rs 1.91* 650 MANETs is: Ratiomax = = n n * X *Y X. Fig.4 depicts the maximized ratio of hidden terminal to one pair node (one flow) with distance of 50m in X*X mobile plane. It shows if the mobile plane is lower than 1000m, the ratio of hidden terminal is very high (about 0.8 to 1) when the distance of two node in the flow is 50m. If we define the security threshold value of 0.5, the minimized plane of mobile is about 1300mX1300m. 4. Simulations and Discussion 4.1. Basic Simulation Information In this section we will discuss the impact of hidden terminal to the TCP performance. NS.8 [14] is used in our simulation. Simulation parameters are as follows: propagation mode is TwoRayGround, omni antenna, 50 packets for Interface Queue length and DROPTAIL for queue management. Routing protocol is AODV. Largest moving plane is 1500mX1500m. Height of antenna is 1.5m. Transmission distance is 50m, and signal interference or censoring distance is 550m. The signal transmission rate is M. Other simulation parameters are given in Tab.1.

7 4.. Simulation Analysis of the Hidden Terminal Scenario In the first simulation there are 4 nodes. Distance between node0 and node1 is 00m and keep static. Distance between node and node3 is kept 00m. At the beginning distance between node1 and node is 50m. From 50s to 600s node and node3 moves together to right at the same speed 1m/s. The purpose of this design is for that the simulation time is equal to the distance between node1 and node. TCP flow is sending from node0 to node1 and UDP flow is sending from node to node3 with the rate of 0.mb. TCP Newreno flow starts from 5s and ends in 610s. UDP flow starts from 50s and ends in 600s. Fig.4 gives the simulation scenario. Fig.5 depicts the dynamics of packet dropped event as the function of time. These packets are dropped at MAC layer due to the MAC packet collision (COL). The graph shows that during 350s to 550s, the MAC layer collision becomes dramatically. It shows that hidden terminal will produce many packet collisions in MAC layer. From 50s to 350s, the distance between node0 and node is lower than 550m. Node0 is in the sensing rage of node. Node0 and node can sense each other and coordinate the transmission, so in this time span the collision is none. From 350s to 550s, distance between node0 to node is larger than 550m, and the distance between node1 and node is lower than 550m. It is typical hidden terminal scenario, in which node1 out of the sensing range of node and node1 is in the interference range of node. Node and node0 cannot coordinate each other and so node go on sending packets to node3, at same time node0 go on sending packets to node1, which makes collision at node1. Our analysis of simulation trace file confirms that the collision happens at

8 node1. After 550s the distance between node1 and node are larger than 550m. The network becomes two repartitions and node will not interference node1, so the packet collision is zero. Fig.6 shows the impacts of hidden terminal problem to TCP performance. Fig.7 depicts retransmission retry times exceeded drop events (RET) as function of time in MAC layer. In Fig.7 there are about 4 times long RET drop events in 350s to 550s. RET event means the MAC layer retry times exceed the optional times (After sending 7 times of RTS packets there are still no CTS response back and after sending DATA packet for 4 times and no ACK back). These RET dropping events lead to the TCP timeout event. A RET event may result in the upper layer protocol TCP timeout if the retransmission packet is also lost. In Fig.6 there are 4 times of Slow- Start phase because of the RTO, in which the congestion window size is dropping to 1 packet (MSS). After 350s the hidden terminal occurs, the loss of MAC layer packets increases, then TCP always go into Slow-Stare phase due to RTO. We change the direction of UDP flow in simulation scenario I, and other parameters are kept the same. Thus UDP flow is from node3 to node, not from node to node3. It is a scenario of receiving hidden terminal. It has the same results Impact of UDP Hidden Terminal to TCP Performance In this set of simulations, we use the static scenario to show the TCP performance at 351s in the mobile scenario. In other words, node and node3 are static and have the distance of 351m. Distance between node0 and node1 is 00m. Distance between node and node3 is 00m. TCP flow is from 5s to 160s from node0 to node1, and UDP flow is from 30s to 60s, 90s to 10s from node to node3 with the rate of 0.1mb. Fig.8 shows the simulation scenario II.

9 Fig.9 show the results. The results show that the TCP performance will drop to its 80% when only 0.1mb UDP traffic comes out from the hidden terminal. Changing the direction of UDP flow, it becomes the receiving hidden terminal problem. The result shows the decreasing of the TCP goodput of TCP is more (TCP is dropped to 0%). It shows that in UDP flow the receiving hidden terminal is more harmful to TCP performance than sending hidden terminal. We also do the simulation with higher UDP rate, we find if we add the rate of UDP flow, the TCP goodput will be dropped more Impact of TCP Hidden Terminal to TCP Performance In this set of simulations, we change the traffics between node and node3 from UDP to TCP and other parameters are kept same as simulation scenario II. Fig.10 and Fig.11 show the results. The results show that if the TCP starts from the hidden terminal node, it will grab the channel and shut out the competing TCP flow. In receiving hidden terminal problem, the channel will share between two flows and the fairness will be better. It shows that in TCP flow the sending hidden terminal is more harmful to other TCP performance than receiving hidden terminal. 5. Related Works Some researchers propose and analyze the design of MAC Protocol (RTS/CTS) and IEEE 80.11MAC utilizes these mechanisms [,3]. The performance of RTS/CTS is analyzed in paper [4,5] using Markov model.

10 The impact of multi-hops to TCP is researched in paper [6,7], they give the result that TCP performance deduction with the hops increasing is due to the contention of MAC layer, thus they suggest to set the TCP congestion window limit to control the channel contention. They also [8] think the mobility of nodes is the major reason of TCP performance decreasing in ad hoc networks. Some researchers try to resolve the fairness problem in MAC layer to improve the TCP performance [9,10]. The problem of large interference range has been realized in paper [11,1] and they give analysis of the network capacity. Altman [13] gives a proposal of set delayed ACK threshold to 3 or higher to improve the TCP performance but not discuss stability problem. X. Wang emphasizes the TCP fairness issues in [14]. Gopal [15] gives some research of simultaneoussend problem. 6. Conclusions Hidden terminal is classified as the sending hidden terminal and receiving hidden terminal. In the same rate, UDP receiving hidden terminal will be more harmful to the TCP performance than UDP sending hidden terminal. TCP sending hidden terminal will shut down the other TCP flow, however in contrast the receiving hidden terminal is more TCP-friendly to the other TCP flow. Using the quantitive analysis, the ratio of hidden terminals in MANETs is also given. We recommend the mobile plane is 1300mX1300m. Future work is to research for the improvement scheme to the MAC protocol or the cross-layer scheme to avoid the hidden terminal problems. References [1] IEEE, IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems Specific Requirements Part 11: Wireless LAN MAC and PHY Specifications, IEEE Std , IEEE, New York, 1999 [] V. Bharghavan, A. Demers, S. Shenker, and L.Zhang, MACAW: A Media Access Protocol for Wireless LANs, ACM SIGCOMM94, pp. 1-5, 1994

11 [3] P. Karn, MACA- a New Channel Access Method for Packet Radio in Amateur Radio 9th Computer Networking Conference, pp , September 1990 [4] Y. Wang and J.J. Garcia-Luna-Aceves, Collision Avoidance in Multi-Hop Ad Hoc Networks, in IEEE/ACM Intl. Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS0), 00 [5] P. Chatzimisios, V. Vitsas, and A.C. Boucouvalas, Throughput and Delay Analysis of IEEE Protocol, in Proc. Of 5th IEEE International Workshop on Networked Applications, pp , 00 [6] Z. Fu, P. Zerfos, H. Luo, S. Lu, L. Zhang, and M. Gerla, The impact of multihop wireless channel on TCP throughput and loss, IEEE INFOCOM003, San Francisco, March 003 [7] Z. Fu, H. Luo, P. Zerfos, L. Zhang and M. Gerla, The impact of multihop wireless Channel on TCP Performance, IEEE Transactions on Mobile Computing, Vol.4 No., March/April 005 [8] Z. Fu, X.Meng, and S. Lu, How bad TCP can perform in mobile ad-hoc networks, IEEE Symposium on Computers and Communications, Italy, Jul. 00 [9] E. Royer, S. J. Lee and C. Perkins, The effects of MAC protocols on ad hoc network communication, IEEE WCNC, Chicago, IL, Sep. 000 [10] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, Performance of reliable transport protocol over IEEE wireless LAN: analysis and enhancement, IEEE INFOCOM 00 [11] J. Li, C. Blake, D. Couto, H. Lee, and R. Morris, Capacity of ad hoc wireless networks, Proceeding of ACM MobiCom01, Jul. 001 [1] S. Xu and T. Saadawi, Does the IEEE MAC protocol work well in multihop wireless ad hoc networks? IEEE Communications Magazine, vol. 39, no. 6, Jun [13] Eitan Altman, Tania Jimenez, Novel Delayed ACK Techniques for Improving TCP Performance in Multihop Wireless Networks Personal Wireless Communications 03, Venice Italy [14] Xin Wang and Koushik Kar, Throughput Modeling and Fairness Issues In CSMA/CA Based Ad-Hoc Networks, INFOCOM05 [15] Sumathi Gopal, Dipankar Raychaudhuri, Experimental Evaluation of the TCP Simultaneous-Send Problem in Wireless Local Area Networks, SIGCOMM05 Workshops, August -6, 005 [16] The Network Simulator NS-, A B C A B C D Fig. 1. Hidden Terminal problem (left graph) and Exposed Terminal problem (right graph) Rs θ a b A x B C Fig.. Hidden Terminal location analysis

12 Fig. 3. The ratio of hidden terminal for the given plane size Tab. 1. Simulation Parameter Values Parameters Value Time slot 0us DIFS 50us SIFS 10us RTS length 160bits CWmin 31 CWmax 103 UDP length 51 MAC header length 144bits 50m m 00m Fig. 4. Simulation scenario I Fig. 5. MAC packets dropped due to collision as the function of time Fig. 6. TCP congestion window dynamics as the function of time Fig. 7 MAC RET drop event as the function of time

13 351m m 00m Fig. 8. Simulation scenario II Fig. 9. TCP goodput as the function of time in sending hidden terminal problem (left graph) and receiving hidden terminal problem (right graph) Fig. 10. TCP goodput from node0 to node1 and TCP goodput from node to node3 in sending hidden terminal problem Fig. 11. TCP goodput from node0 to node1 and TCP goodput from node to node3 in receiving hidden terminal problem

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Innovative Channel Release Schemes for Mobile ad hoc Networks

Innovative Channel Release Schemes for Mobile ad hoc Networks Innovative Channel Release Schemes for Mobile ad hoc Networks N. Nakamura,D.Chakraborty, A. Chayabejara, G. Kitagata, T. Suganuma, G. Chakraborty* and N. Shiratori Research Institute of Electrical Communication,

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks

An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks An Efficient Backoff Algorithm for QoS Guaranteeing in Wireless Networks Xinhua Liu, Guojun Ma, HaiLan Kuang, Fangmin Li School of Information Engineering, Wuhan University of Technology, Wuhan, 430070

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet

Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet Akihisa Kojima and Susumu Ishihara Graduate School of Engineering, Shizuoka University Graduate

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Interactions Between TCP and the IEEE MAC Protocol

Interactions Between TCP and the IEEE MAC Protocol Interactions Between TCP and the IEEE 82.11 MAC Protocol Rui Jiang Vikram Gupta Computer Science and Engineering Department University of California, Riverside Chinya V. Ravishankar Abstract The IEEE 82.11x

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Dimitri Marandin Chair for Telecommunications, Electrical Engineering Department Technical University of Dresden, Dresden, Germany

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Performance Evaluation of e over Multihop WiFi Mesh Networks

Performance Evaluation of e over Multihop WiFi Mesh Networks Performance Evaluation of 802.11e over Multihop WiFi Mesh Networks Kuo-Lun Hua and Ray-Guang Cheng Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks

EMAC: An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks : An Asynchronous Routing-Enhanced MAC Protocol in Multi-hop Wireless Networks Shu Du Yanjun Sun David B. Johnson Systems and Applications R&D Center, Texas Instruments, Dallas, TX, USA Department of Computer

More information

Improving TCP Performance for Multihop Wireless Networks*

Improving TCP Performance for Multihop Wireless Networks* Improving TCP Performance for Multihop Wireless Networks* Sherif M. ElRakabawy, Christoph Lindemann University of Dortmund Department of Computer Science August-Schmidt-Str. 1 447 Dortmund Germany http://mobicom.cs.uni-dortmund.de/

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

Optimization Approach for Throughput Analysis of Multi-hop Wireless Networks

Optimization Approach for Throughput Analysis of Multi-hop Wireless Networks Optimization Approach for Throughput Analysis of Multi-hop Wireless Networks Chaegwon Lim Ministry of Science, ICT, and Future Planning Republic of Korea Chong-Ho Choi Seoul National University Seoul,

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Investigation of the TCP Simultaneous-Send Problem in Wireless Local Area Networks

Investigation of the TCP Simultaneous-Send Problem in Wireless Local Area Networks Investigation of the TCP Simultaneous-Send Problem in 8. Wireless Local Area Networks Sumathi Gopal Sanjoy Paul Dipankar Raychaudhuri WINLAB, Rutgers University Bell Labs, Lucent Technologies WINLAB, Rutgers

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Implicit MAC Acknowledgment: An Optimization to

Implicit MAC Acknowledgment: An Optimization to Implicit MAC Acknowledgment: An Optimization to 802.11 Romit Roy Choudhury Abrita Chakravarty Tetsuro Ueda University of Illinois at Urbana-Champaign Infosys Technologies, Pune, India ATR Adaptive Communications

More information

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

Effectiveness of DSDV Protocol Under Hidden Node Environment

Effectiveness of DSDV Protocol Under Hidden Node Environment Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

ADAPTING MAC FOR PERFORMANCE OPTIMIZATION OF MANET USING CROSS LAYER INTERACTION

ADAPTING MAC FOR PERFORMANCE OPTIMIZATION OF MANET USING CROSS LAYER INTERACTION ADAPTING MAC 82.11 FOR PERFORMANCE OPTIMIZATION OF MANET USING CROSS LAYER INTERACTION Gaurav Bhatia 1 and Vivek Kumar 2 gbhatia13@gmail.com 1, vivekdcg@gkvharidwar.org 2 Research Scholar 1, Supervisor

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks?

Does IEEE MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Abstract: Does IEEE 802.11 MAC Protocol Work Well in Multi-hop Wireless Ad Hoc Networks? Shugong Xu Tarek Saadawi Dept. of Electrical Engineering, City University of New York, City College, New York, NY

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Mahasweta

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Jiaqing (James) Song songs@acm.org Spring 2002 Table of Contents Introduction to WLAN Performance enhancement Implementation with OPNET

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Throughput Analysis of TCP in Multi-Hop Wireless Networks with IEEE MAC

Throughput Analysis of TCP in Multi-Hop Wireless Networks with IEEE MAC Throughput Analysis of TCP in Multi-Hop Wireless Networks with IEEE 82.11 MAC Arzad A. Kherani INRIA, 24 Route Des Lucioles-BP 93, Sophia Antipolis, France 692. Email: alam@sophia.inria.fr Rajeev Shorey

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Demo Plan Jiaqing (James) Song songs@acm.org Spring 2002 Contents of Demo OPNET WLAN Models PHY Characteristics WLAN Parameters Adaptive

More information

MAC RELIABLE BROADCAST IN AD HOC NETWORKS

MAC RELIABLE BROADCAST IN AD HOC NETWORKS MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005

Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID

More information