An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

Size: px
Start display at page:

Download "An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks"

Transcription

1 An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore, India. 2 Department of Computer Science, Sri Padmavathi Mahila Visvavidyalayam, Tirupathi, India. Abstract. In Underwater Acoustic Sensor Networks (UASN) designing Medium Access Control (MAC) protocol is a challenging issue. This is due to low bandwidth and high propagation delay in UASN. This paper proposes a MAC protocol for UASN called Aloha with Virtual Back off Algorithm (Aloha- V). The VBA approach is the collision avoidance mechanism for wireless networks. In this proposed work we use VBA with non-counter sharing. The Aloha-V MAC protocol reduces collision probability thereby improves the system throughput by restricting the number of transmissions carried out by the node. The Aloha-V protocol is compared with the existing underwater Aloha protocol. The simulation results show that the proposed method reduces the number of collisions and significantly increases the throughput compared to classical underwater Aloha protocol. Keywords: Underwater Acoustic Sensor Networks, MAC, Aloha, VBA, collision. INTRODUCTION In recent times, Underwater Acoustic Sensor Networks (UASN) has been playing an important role in underwater communications. UASN supports many applications like undersea exploration, oceanography data collection, water pollution monitoring, disaster prevention and so on. Underwater sensor networks are a collection of sensors. Using this, vehicles are deployed to perform cooperative observation tasks over a given region [1]. Compared to terrestrial sensor networks, UASN is different in terms of low bandwidth, high propagation delay and high bit error rate. So designing a MAC protocol for UASN is a challenging task. The main task of MAC protocol is to avoid data packet collision and reduces the number of retransmissions to improve throughput. In general, MAC protocols are classified into contention free and contention based protocols. The contention free protocols like Time division multiple access (TDMA) [2], Frequency division multiple access (FDMA) [3] are not suitable for UASN due to large and random deploying setting with distributed control and burst data [4]. On the other hand, the contention based protocol- Carrier sense multiple access (CSMA) too does not perform well in UWASN [5]. Compared to above mentioned MAC protocols, Aloha [6] is simple and less complex. Aloha is a contention based MAC protocol. Due to long propagation delay and low bandwidth in acoustic signal, the Aloha MAC is more suitable. The problem with Aloha is that the packet collision rate is high. VBA [7] proposed the solution for packet collision in a wireless network. In VBA, each node is limited to access the channel. The number of contenting nodes is reduced and the collision chances also reduced in VBA. So it improves the throughput of the network. Hence, in this paper, we propose Aloha-V, which reduces the data packet collisions and improve throughput. The rest of the paper is organized as follows. Section 2 briefly explains the related works on MAC protocols for UASN. Section 3 gives a system model for the proposed method and section 4 discusses the proposed MAC protocol. Section 5 shows the results and finally section 6 concludes this paper. RELATED WORK The existing MAC protocols for terrestrial sensor networks are not suitable for UASN due to the peculiar characteristic of acoustic signals. In this section, we discuss the Aloha and its variant protocols. In pure Aloha, when the nodes have a packet to transmit, it is sent immediately. If the receiver successfully receives the packet it sends an acknowledgement to sender. And when the sender receives the acknowledgement, the transmission is successful. If more than two nodes transmit a packet at the same time a collision occurs, which will lead to retransmission. The other each node can send the packet only to the beginning of the slot. In [8], simple mathematical analysis and simulations for pure Aloha and slotted Aloha in underwater situations are presented. The results show that the performance of Aloha and S-Aloha is same under heavy traffic. In [9], the paper proposes two variants of Aloha protocols, namely, Aloha with Collision Avoidance (Aloha CA) and Aloha with Avoidance Notification (Aloha AN). Both the protocols utilize overhearing concept. The packet has two segments- one for header and other data. The header segment contains essential information. Each node maintains a local database table to store overhearing information from neighboring nodes. This table is utilized by the node, before transmitting to ensure that no collision with other nodes occurs. With Aloha-CA it needs less amount of memory and control messages. In Aloha AN, the node first transmits small advance notification packet (NTF) which has a normal header segment. The lag time is the waiting time between the NTF and data packet and is used by the node to extract information from multiple NTF packets. This is useful for the node to avoid collisions and the Aloha AN needs more resources. The combination of Aloha and handshaking protocol for underwater sensor networks is presented in [10]. The proposed MAC protocol is utilized to explore the advantages of both the Aloha and handshaking 7251

2 protocols. The authors present a mathematical model to reduce end-to-end delay and increase the throughput. The authors in [11], consider the advantages of Aloha and Multiple Access with Collision Avoidance (MACA) protocols. If the load is low, it uses aloha method. If the load is high, it uses MACA protocol. Hence this protocol performs better than Aloha protocol. In [13], the authors investigate the impact of spatial temporal uncertainty in underwater networks. From the analysis given, it states that the S-Aloha is significantly affected by the spatial dimension of uncertainty. So they propose a guard band to add to transmission slots in S-Aloha to improve the performance. In [14], the authors propose a Backoff tuning for Aloha protocol. Backoff is the waiting time also known as Contention Window (CW). The CW plays an importance role in collision avoidance. Here, the Backoff tuning mechanism is utilized to maximize the throughput of Aloha protocol. Each node in the network dynamically adjusts their CW to reduce collision and improve throughput of the network. Authors of [15] explained the Aloha protocol performance in underwater sensor networks. It also presents the theoretical analysis of frame collision probability and throughput efficiency. This paper proposes two variants of enhanced S-Aloha protocols to reduce the impact of propagation delay in underwater sensor networks. In [16] the authors have proposed an analytical model for Aloha protocol in multi hop underwater acoustic networks. The proposed model is identified and validated here. The paper [17] discusses the busy terminal problem in underwater sensor networks. The authors developed a theoretical model for Aloha to analyze the successful transmission probability. And also develop a nodal throughput model which can increase the nodal throughput. In [12] the authors present a variation of Aloha called slotted Aloha. In this paper, the authors presented a model for analyzing slotted Aloha variants. SYSTEM MODEL The goal of the defined method is to reduce collisions by controlling the number of transmission attempts by the nodes. The number of transmission attempts is controlled by the sequence number to access the channel. The system is set up in such a way that all the nodes approach a sink node in one hop communication. Assume there are n nodes and these nodes are communicating with the sink node as shown in Figure 1. Figure 1. System model Let us evaluate the collision probability of Aloha-V protocol. Let be the probability of successful access to the channel. Then the probability of unsuccessful access to the channel is (1) Let be the sequence number and limits the number of successful and unsuccessful attempts. The relationship between probability and sequence number is given in [7] as, And From equation (2), increasing the sequence number, increasing the successful channel access and equation (3), increasing the sequence number, reduces the unsuccessful channel access. ALOHA-V: ALOHA WITH VIRTUAL BACKOFF ALGORITHM In this section, we present an overview of Aloha for UASN and VBA. Then we propose our MAC protocol for UASN. Overview of ALOHA Aloha [18] is a contention based MAC protocol for UASN. In Aloha, the sending process is as follows: the node generates a packet; it sends immediately and waits for an ACK packet. If it receives the ACK packet, then the transmission is successful. In case the node does not receive an ACK packet, there is a chance for collisions or link errors. In this case, the node retransmits the packet. If the retransmit reaches the maximum limit, the node drops the packet. In the receiving process, the node listens to the channel for data packet and sends the ACK packet as a reply. (2) (3) Overview of VBA The VBA methodology in [7] is used to improve the throughput as well as reducing the number of collisions in wireless networks. In VBA, the nodes have limits to access the channel, so the number of collisions is reduced. Each node in VBA maintains a counter, when the nodes want to transmit 7252

3 the data it senses the channel, and if the channel is free, the node checks the counter value and if it is less than or equal to the sequence number, then the channel is accessed and increment the counter. Otherwise the channel access is deferred, and the counter is incremented. Two variances of VBA are presented: one is a VBA-CS (virtual backoff with counter sharing) and VBA-NCS (VBA with non-counter sharing). [7] Proposed work The Aloha is a simple MAC protocol. The main drawback of the Aloha is that there are more data packet collisions. The lack of collision avoidance method in Aloha leads to increasing in collisions. The advantage of VBA method is to reduce the number of collisions. Hence we propose a new MAC protocol for UASN which is the combination of Aloha with VBA method. In Aloha-V (see algorithm 1), each sensor node in the underwater environment maintains a counter for counting the number of times it transmits the data. Initially, all the node s counter values are zero. The sequence number is used to limit the number of transmissions to the nodes. The value of the sequence number is an integer value. If a node is ready to transmit a packet, first it checks its counter value with the sequence number. If the counter value is less than or equal to the sequence number, then the node sends the data packet and waits for acknowledgement (ACK) packet from the receiver. Algorithm 1: Aloha V Input: Sequence Number(k), Number of nodes(n); Output: Channel access for i in 1 to n do initialize counter[i] to 0 end for for i in 1 to n do while channel access[i] do if counter[i] is not equal to k then access channel; else defer access; end if increment counter[i] end while end for Simulation settings We study the performance of Aloha V protocol using Aqua Sim [18], a NS-2 based simulator. We compare the performance of Aloha-V protocol with Aloha protocol. The nodes employ half duplex mode with omnidirectional antenna for data transmission. We deployed all nodes in a random manner and with one hop distance. Each node can hear the transmission of other nodes. In our simulation, one node acts as a receiver while the remaining nodes are senders. The receiver node is placed in the center of the network environment. All the sender nodes have data to transmit to the receiver. The data packet generation of nodes follows the passion process with data rate λ. The simulation parameters are given in table I. Simulation parameter Channel Propagation Number of nodes Topology area Propagation speed Transmission range Sequence number Transmission power Reception power Table 1: Simulation Parameters Value Underwater channel Underwater propagation m * 500m 1500 m/s 100m 5 3 W 0.75 W Performance Metrics In our study, we consider the following metrics: throughput, and number of packet collision. The throughput is the ratio of total number of bytes received successfully to the simulation time. The number of collisions is the total number of packet collision during the simulation. Simulation results Effect of varying the Traffic In this set of simulations, the traffic rate is varied from 0.02 to 0.2 packets per second (pkt/s). The simulation time is 1000 s and the modem bit rate is 10kbps. The receiver successfully receives the data packet, it replies with an ACK packet. The transmissions did successfully, the node increment its counter value. Otherwise, the node waits for some random amount of time, and then resends the packet up to the maximum limit. Once the limit is reached, the node drops the packet. The number of transmissions per node will be limited by the sequence number K. PERFORMANCE ANALYSIS In this section, we analyze the performance of Aloha V protocol and compare Aloha-V protocol with existing underwater Aloha protocol. Figure 2: Throughput versus Traffic rate 7253

4 The throughput performance is given in Figure 2. This graph is plotted different traffic rate with throughput. The results depict that the throughput of Aloha-V is higher than Aloha. The traffic rate is 0.18 (pkt/s) both the Aloha-V and Aloha getting highest throughput. Figure 5: Number of collision versus Bit rate In Figure 5, the graph plotted is the bit rate versus the number of collisions. In Aloha V, the collision is controlled by sequence number. From the result, it is known that Aloha V reduces the number of collisions compared to Aloha. Figure 3: Number of collisions versus Traffic rate The Figure 3 shows the performance of traffic rate with number of collisions. The absence of a collision avoidance mechanism in Aloha, the number of collisions increased. From the graph, the number of collisions in Aloha-V is very less compared to Aloha. At traffic rate 0.2 kbps the number of collisions in Aloha is 4099 and Aloha V is CONCLUSION This paper describes the collision avoidance technique in underwater sensor networks. We proposed Aloha V protocol which reduces collisions during data transmission. This protocol executes Aloha protocol with existing Virtual Backoff Algorithm with non-counter sharing. The proposed method reduces the number of collisions that occur in UASN and to increase the throughput of the network. From the simulation results, the Aloha V performed better in terms of high throughput and low packet collisions compared to the existing Aloha protocol. REFERENCES Figure 4: Throughput versus with Bit rate Effect of varying the Bit rate The graph plotted with Bit rate versus throughput is given in figure 4. In this simulation, the bit rate is varied from 20 to 65 kbps to evaluate the performance of the proposed protocol. It is depicted that the throughput of Aloha V is outperform with Aloha protocol. The sequence number is limited to access the channel so the throughput of the Aloha V is increased compared to Aloha. [1] Akyildiz, I. F., Pompili, D., & Melodia, T. (2005). Underwater acoustic sensor networks: research challenges. Ad hoc networks, 3(3), [2] Chen, Y. D., Lien, C. Y., Chuang, S. W., & Shih, K. P. (2011, June). DSSS: a TDMA-based MAC protocol with dynamic slot scheduling strategy for underwater acoustic sensor networks. In OCEANS, 2011 IEEE-Spain (pp. 1-6). IEEE. [3] Cheng, X., Qu, F., & Yang, L. (2011, August). Single carrier FDMA over underwater acoustic channels. In Communications and Networking in China (CHINACOM), th International ICST Conference on (pp ). IEEE. [4] De, S., Mandal, P., & Chakraborty, S. S. (2011). On the characterization of Aloha in underwater wireless networks. Mathematical and Computer Modelling, 53(11), [5] Xiao, Y., Zhang, Y., Gibson, J. H., Xie, G. G., & Chen, H. (2011). Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks. Cluster Computing, 14(1),

5 [6] Abramson, N. (1970, November). THE ALOHA SYSTEM: another alternative for computer communications. In Proceedings of the November 17-19, 1970, fall joint computer conference (pp ). ACM. [7] Krishna, P. V., Misra, S., Obaidat, M. S., & Saritha, V. (2010). Virtual backoff algorithm: An enhancement to medium-access control to improve the performance of wireless networks. Vehicular Technology, IEEE Transactions on, 59(3), [8] Vieira, L. F. M., Kong, J., Lee, U., & Gerla, M. (2006). Analysis of aloha protocols for underwater acoustic sensor networks. Extended abstract from WUWNet, 6. [9] Chirdchoo, N., Soh, W. S., & Chua, K. C. (2007, May). Aloha-based MAC protocols with collision avoidance for underwater acoustic networks. In INFOCOM th IEEE International Conference on Computer Communications. IEEE (pp ). IEEE. [10] Shin, S. W., Yun, N. Y., Lee, J. Y., Park, S. H., & Kim, C. (2012, December). AHU (ALOHA & Handshaking Union): A MAC Protocol for Underwater MANETs. In Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on (pp ). IEEE. [11] Lu, L. I., Zhong, L. I. U., & Ke, L. I. (2009, November). Design of MAC Protocols for Underwater Acoustic Ad Hoc Networks. In Web Information Systems and Mining, WISM International Conference on (pp ). IEEE. [12] Zhang, Y. (2014, February). Performance of p- persistent slotted Aloha for underwater sensor networks. In Computing, Networking and Communications (ICNC), 2014 International Conference on (pp ). IEEE. [13] Syed, A. A., Ye, W., Heidemann, J., & Krishnamachari, B. (2007, September). Understanding spatio-temporal uncertainty in medium access with ALOHA protocols. In Proceedings of the second workshop on Underwater networks (pp ). ACM. [14] Yao, N., Peng, Z., Zuba, M., & Cui, J. H. (2011, August). Improving aloha via backoff tuning in underwater sensor networks. In Communications and Networking in China (CHINACOM), th International ICST Conference on (pp ). IEEE. [15] Zhou, Y., Chen, K., He, J., & Guan, H. (2011, May). Enhanced slotted Aloha protocols for underwater sensor networks with large propagation delay. In Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd (pp. 1-5). IEEE. [16] Yu, H., Yao, N., Cai, S., & Han, Q. (2013). Analyzing the performance of Aloha in string multihop underwater acoustic sensor networks. EURASIP Journal on Wireless Communications and Networking, 2013(1), [17] Zhu, Y., Cui, J. H., Peng, Z., & Zhou, Z. (2014, November). Busy Terminal Problem and Implications for MAC Protocols in Underwater Acoustic Networks. In Proceedings of the International Conference on Underwater Networks & Systems (p. 1). ACM. [18] Xie, P., Zhou, Z., Peng, Z., Yan, H., Hu, T., Cui, J. H., & Zhou, S. (2009, October). Aqua-Sim: an NS-2 based simulator for underwater sensor networks. In OCEANS 2009, MTS/IEEE Biloxi-Marine Technology for Our Future: Global and Local Challenges (pp. 1-7). IEEE. 7255

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Cross-layer Energy Minimization for Underwater ALOHA Networks

Cross-layer Energy Minimization for Underwater ALOHA Networks Cross-layer Energy Minimization for Underwater ALOHA Networks Mehmet Koseoglu, Ezhan Karasan, Member, IEEE, Lin Chen, Member, IEEE Abstract Underwater networks suffer from energy efficiency challenges

More information

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Manijeh Keshtgary Reza Mohammadi Mohammad Mahmoudi Mohammad Reza Mansouri ABSTRACT Underwater

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

MAC Protocol Implementation on Atmel AVR for Underwater Communication

MAC Protocol Implementation on Atmel AVR for Underwater Communication MAC Protocol Implementation on Atmel AVR for Underwater Communication - Final Report- Shaolin Peng speng2@ncsu.edu Introduction Underwater acoustic communication is widely used in many areas to collect

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Choosing the Packet Size in Multi-hop Underwater Networks

Choosing the Packet Size in Multi-hop Underwater Networks Choosing the Packet Size in Multi-hop Underwater Networks Stefano Basagni, Chiara Petrioli, Roberto Petroccia and Milica Stojanovic ECE Department Northeastern University {basagni, millitsa}@ece.neu.edu

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network

Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network Soo Young Shin and Soo Hyun Park Graduate School of BIT, Kookmin University, Seoul, Korea sy-shin@kookmin.ac.kr, shpark21@kookmin.ac.kr

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Yashar M. Aval, Yu Han, Andrew Tu, Stefano Basagni, Milica Stojanovic and Yunsi Fei Department

More information

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Yashar M. Aval, Yu Han, Andrew Tu, Stefano Basagni, Milica Stojanovic and Yunsi Fei Department

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks Mingsheng Gao Computing Laboratory National University of Singapore mingsh.gao@gmail.com Hui Jiang Department of Computer Science

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES P. Vijayalakshmi and V. Rajendran Department of Electronics and Communication Engineering, VELS University,

More information

PERFORMANCE ASSESSMENT OF MAC LAYER PROTOCOLS IN POLLUTION MONITORING SYSTEM BASED ON UNDERWATER WIRELESS SENSOR NETWORKS

PERFORMANCE ASSESSMENT OF MAC LAYER PROTOCOLS IN POLLUTION MONITORING SYSTEM BASED ON UNDERWATER WIRELESS SENSOR NETWORKS Volume 4, No. 3, March 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info PERFORMANCE ASSESSMENT OF MAC LAYER PROTOCOLS IN POLLUTION MONITORING SYSTEM

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols

Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols Understanding Spatio-emporal Uncertainty in Medium Access with ALOHA Protocols Affan Syed Wei Ye Bhaskar Krishnamachari John Heidemann University of Southern California Abstract he goal of this paper is

More information

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Article An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Faisal Alfouzan *, Alireza Shahrabi, Seyed Mohammad Ghoreyshi and Tuleen Boutaleb School of Engineering and Built Environment,

More information

A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks Sensors 2013, 13, 15006-15025; doi:10.3390/s131115006 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater

More information

Multiplexing Data and Control Channels in Random Access Underwater Networks

Multiplexing Data and Control Channels in Random Access Underwater Networks Multiplexing Data and Control Channels in Random Access Underwater Networks Stefano Basagni ECE Department Northeastern University basagni@ece.neu.edu Chiara Petrioli and Roberto Petroccia Dipartimento

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

Toward Practical MAC Design for Underwater Acoustic Networks

Toward Practical MAC Design for Underwater Acoustic Networks Toward Practical MAC Design for Underwater Acoustic Networks Yibo Zhu, Zaihan Jiang, Zheng Peng, Michael Zuba, Jun-Hong Cui and Huifang Chen Department of Computer Science and Engineering, University of

More information

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Haining Mo, Zheng Peng, Zhong Zhou, Michael Zuba, Zaihan Jiang 2, and Jun-Hong

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor IJCTA, 9(12), 2016, pp. 5727-5731 International Science Press 5727 An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor Networ orks *L. Sivagami **J.Martin Leo Manickam, Member, IEEE

More information

Distributed Scheduling and Routing in Underwater Wireless Networks

Distributed Scheduling and Routing in Underwater Wireless Networks Distributed Scheduling and Routing in Underwater Wireless Networks Kurtis Kredo II Electrical and Computer Engineering Dept. California State University, Chico kkredo@csuchico.edu Prasant Mohapatra Computer

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks A Medium Access Control Protocol for Underwater Wireless Networks Kurtis B. Kredo II Electrical and Computer Engineering Dept. University of California, Davis kbkredo@ucdavis.edu Prasant Mohapatra Computer

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Improving Performance of TCP with Efficient MIMO-based MAC

Improving Performance of TCP with Efficient MIMO-based MAC Improving Performance of TCP with Efficient MIMO-based MAC Ankit Jindal and Anirudha Sahoo Department of Computer Science and Engineering Indian Institute of Technology, Bombay, Powai, Mumbai, India 400076.

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test Haining Mo, Ahmet Can Mingir, Hesham Alhumyani, Yusuf Albayram, and Jun-Hong Cui Computer Science & Engineering Department,

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE 802.15.4 PROTOCOL USING CSMA-CA ALGORITHM DHARA K V 1, RAJAN S 2 1ME-Applied Electronics, Department of ECE, Velalar College of Engineering and Technology,

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks

Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks 34 International Journal of Information Processing Systems, Vol.2, No.1, March 2006 Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless

More information