CHAPTER 5 PROPAGATION DELAY

Size: px
Start display at page:

Download "CHAPTER 5 PROPAGATION DELAY"

Transcription

1 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges, such as signal attenuation and propagation delay. Technology brings a broad range of applications for underwater sensor networks. UWSNs have new research paradigm that poses exciting challenges since intrinsic properties of the underwater environments but they suffer, (a) Large propagation delay The propagation speed of acoustic signals in under water has about 1.5 x 10 3 m/s. (b) Node mobility Underwater sensor network moves with the sea water current (up to 1 to 3 m/sec). (c) High error probability of acoustic underwater channels The underwater acoustic channels have very low bandwidth capacity (of the order of KHz) that depends on frequency and transmission range, suffers high bit rate error due to involving propagation delay. As the terrestrial communication based on Radio Frequency (RF) communication, all of these technologies assumed that propagation latency is negligible and have effectively factored out of design consideration. Under water communication generally used in acoustic technology communication. There are lot of basic differences between RF frequency and acoustic waves, such propagation delay as large and sensor node mobility due to current water. Thus, the protocol for terrestrial sensor network could not be directly applied to underwater acoustic sensor networks. Because underwater circumference is much varied from terrestrial and some of challenges need to address, while using

2 99 sensor networks as an effective communication technology for underwater level. Due to salty water and have high density, electromagnetic and optical waves cannot be transmitted for long distances in the ocean because of scattering, high attenuation and absorption effect. Acoustic communication can be used to dilute this problem, better means of data transfer which provides such a circumference. Hence, available propagation speed is compared from the speed of light to speed of sound that is five orders of magnitude slower, i.e m/sec, which brings long propagation latency and propagation delay. Also, they consume more power and replacement of sensor node s battery is not so easy since the underwater sensor nodes larger in size. Underwater applications require multihop network where sensor nodes forward data to one of more sink node has located at the terrestrial level. Moreover, facing many challenges in under water wireless sensor network for the applicable of emerging application, necessary to solve the propagation delay in under water wireless sensor networks. The aim of this research work have to understand the impact of propagation delay on medium access with ALOHA protocols as the case study. First, consider that the area-dependent propagation delay has a fundamental impact on the slotted ALOHA since a packet receiving time at the receiver depends not only on its forward time but also on its relative propagation delay to the receiver. Moreover, that both dimensions of uncertainty need to handled at the same time. Then, investigate the propagation delay tolerant ALOHA protocol, to improve the performance of the slotted ALOHA by adding guard bands. That the performance of classical slotted ALOHA deteriorate in an underwater setting where transmissions from one slot can overlap with future slots. Referred to their scheme as the propagation delay tolerant ALOHA protocol. In this chapter, discussed about ALOHA protocol, the guard-band in each slot is designed, to overcome collisions between packets of different senders forwarded in consecutive time slots. It is necessary to reducing collisions between the data packets while increasing the guard-band but it also increases

3 100 the length of each time slot and generally reducing the achievable throughput of the sensor node. To get the maximum achievable throughput has equated an optimization problem and thus it is essential to selection of the appropriate guard-band length. Moreover, analyzed analytically, the throughput of the ALOHA protocol given a guard band, a congested load and the maximum propagation delay. And also achieved a number of interesting and useful properties concerning the performance of the ALOHA protocol with guard band. 5.1 ALOHA with Space-time Basic class of ALOHA is the MAC protocols that do not try to prevent of data packet collision. The protocol works as follows, every network that has sent the data. If the collision occurred while two sensor nodes forwarding the data packets at the same time slot. ALOHA have improved by having discrete timeslots, in case of retransmission happening at the sensor nodes. The sensor network have no long send packets at anytime but just at the beginning of a timeslot and thus chances of collision reduced. In this version referenced as Slotted ALOHA. This chapter, focused on the impact of the long propagation delay of acoustic signals on those protocols. ALOHA in ground communication, that a packet sending time t will collide with other packets are sending in time [t- 1, t+1]. This can visualize in Figure (5.1). The figure shows three stations that have to send the packets. The first packet after time t - 1, the second at time t and the third before time t + 1. Overlap packet since all the part of another transmission failures, in underwater acoustic communication have looked at ALOHA using a similar approach. Then forwarding of a packet is successful and if the packet does not collide with another packet at the sink node. The difference that propagation delay to emphasize can cause look at an intuitive example. It is based on the similar transmission explained in Figure (5.1). And took the time t- 1, the first node forwards the message. At time t, the second node again forwards the

4 101 message. Moreover, also the first message keeps propagating. Both signals have eventually met, form constructive and destructive waves. After that, the signals have kept going in that direction. At time t + 1, the signals send by node 2 will continue to propagate and the signal from message sent by node 1 have reached node 2. Since the message reaches node 2 without collision, the message is considered to be successful. Note that if it radio signals, this would result in a collision. Figure 5.1 Collision of ALOHA ALOHA with Time Uncertainty First analyzed of pure and slotted ALOHA protocol, where sensor nodes immediately forwarding message packets. Thus only considering temporal uncertainty, assuming collisions with respect on the transmission time alone. As the collisions takes place among the sensor nodes, then forwards the messages simultaneously, and that matter only at an intended receiver, this analysis has an implied assumption of no propagation delay. If propagation delay is significant, this analysis then requires assuming transmitter as equal distance at the receiver end. And then further assumptions made the large number of sensor nodes, with all arriving packets served at a new node and packets forwarded immediately into the sensor network. The data packets that collide and are filled with buffered block, making sensor nodes backlogged. Such backlogged sensor nodes

5 102 retransmit after an exponential propagation delay. The total offered load to the network has the combination of the Poisson arrival and backlogged exponential retransmissions. In this results have the combined Poisson packet arrival process (with mean ) to the sensor network having normalized throughput (expected packet /unit time) where represents the number of backlogged nodes in the network. The vulnerability interval (VI) defined as the time interval relative to a sender s transmission within the sensor nodes transmission made the collision. Assuming packet transmission time, Figure (5.2) shows that the is equal to. On the other hand, the transmission allows slotted ALOHA transmission only at the start of synchronized slots of length. As shown in the Figure (5.3) ensured synchronization that only hindering packets that arrive in slot 0 have result in a packet collision. Thus reduces the from to and preventing any cross-slot overlap. As this analysis using the concept of vulnerability interval shows that slotted ALOHA achieved maximum normalized throughput of 1/e with of 1 packet per slot, while pure ALOHA achieves its maximum of 1/2e at 0.5 packets / slot. Figure 5.2 ALOHA

6 Slotted ALOHA Slotted ALOHA is a minor modified version of ALOHA, discrete time slots introduced and then time slots divided into equal length slots. The data message is sent only at the initial stage of the time slot. In case of giving a formal, to present an intuitive explanation of the performance of Slotted ALOHA in under water area. To synchronize the sensor nodes so that they could implement Slotted ALOHA and assumed that there is ways again have to consider the propagation delay. Instead of looking at the time to send the packet and have to look at the time the packet received at each node. There is no guarantee that they will arrive in time slots although the sensor nodes send the messages in pre-defined time slots. Therefore, Slotted ALOHA in underwater has no effect different from ALOHA except the cases where the propagation delay has the multiple of time slot interval. When divided by the sound speed, in other words, the distance between sensor nodes, results in an integer of time slots. All the sensor nodes randomly placed that the probability, in this scenario is zero. Figure 5.3 Slotted ALOHA

7 Space time Acoustic underwater wireless sensor networks characterized by increased uncertainty in medium access, due not only when data sent, but also due to significantly different propagation delays from spatially diverse transmitters, this is known as space time uncertainty. In this chapter summarized the concept of space-time uncertainty with regards to medium access. Propagation delay is negligible while channel states in short-range RF frequency networks have estimated quickly. The area of the receiver and potential interferers makes the large propagation delay of acoustic media and it is essential for also considered. The distance between sensor node forwards into uncertainty of current global channel status of Space-Time Uncertainty. Presents the systematic description of this principle and its impact on contention based medium access. Consider the Figures (5.4&5.5) the two concurrent transmissions from A and E is received separately at nodes B and D have collided at node C. Figure 5.4 Space-time uncertainty - without collision

8 105 Figure 5.5 Space-time uncertainty - collision at node B In this scenario, that packet dropping collision and packet reception in slow sensor networks depends on both transmission time and receiver location area. When the similar collision of sensor nodes where this space-time uncertainty have also viewed as a duality. Although, in principle, this uncertainty occurs in all communication, it is only significant where propagation delay is very high. 5.2 Analytical Analysis of Propagation Delay Analyzed the normalized throughput of the ALOHA protocol and addition of additional guard band beyond the transmission time in time slots, so the Space-time uncertainty have handled and minimizing the propagation delay in the underwater level. It has needed to tolerate the large propagation delay, these additional guard band added to ensure a single slot overlap at the receiver end. First look at the time slot, hence each time slot contains the transmission time and a guard band following the former. Since the guard band of the size of maximum propagation time should eliminate all the collision between different time slots, it does not make sense to have the guard band whose size is more than only decreasing the throughput without any gain. In this

9 106 modification to slotted ALOHA, sensor nodes still transmit only at the start of globally synchronized slots. Underwater time synchronization protocol have achieved using Global time synchronization. Hence, using the normalized factor in expressing the size of guard band. The slot duration, however, has increased from, where represents the fraction of maximum propagation delay ( ) that sensor nodes wait after finishing their transmission as shown in the Figure (5.6). Hence, is the guard band and considered as the normalized guard band. Choosing ensures that no overlap at the receiver, unless data packets forwarded in the same slot, the guaranteed that slotted ALOHA is generally designed to achieve when the delay is not important. However, this value of results in a long wait time after each packet that has increase the packet transmission latency and bandwidth overhead. When there remains the possibility that some sensor node pairs still have the vulnerability interval of duration of two slots. Therefore, the value of reducing lowers the bandwidth overhead but increasing probability of collision among the sensor nodes. Based on the distance between two sensor node pairs is generally smaller than the maximum propagation delay and vary to evaluate the trade-off between bandwidth overhead and probability of collision. The speed of propagation, the communication has a positive finite constant regardless of the area in the sensor network, so that the maximum propagation time is from the receiver to the farthest transmitter. The transmission rate is constant for every transmitter and also the data packet size is constant so that the transmission time for a packet has constant. Only a proper scaling is needed for some notations, particularly to cope with the general transmission time. Hence, the normalized maximum propagation delay a to the transmission time is.

10 Slotted ALOHA Figure 5.6 Timing diagram of Packet transmission To analyzed the normalized throughput, and derived the expected number of successful packet receptions in a particular time slot. Moreover, then using the linearity of expectations and probabilities of conditional to calculate the expected number of data packets delivered from the source node. Let the indicator variable i i denote whether or not the receiver receives the packet from i-th transmitter successfully in the time slot. { Where r denotes receiving packets { } { } Where N denotes random variable of the successful reception. denotes the event that no collision occurs given that i- th sender transmits.

11 Without Collision Probability The packet collision depends not only on the temporal uncertainly, but also on the special uncertainty. If more than one sensor node forwarding data packets in the same time slot, the data packets collide with each other regardless of the area of their transmitters (when a < 1). If two data packets are transmitted in various time slots collisions have occurred and depending on their sender s area. The former collision has intra-timeslot collision and the latter inter-timeslot collision. It turns out of the system have at most three collision regions for each and every transmitter, one for the intra-timeslot collision and two for the inter-timeslot collision. Let us suppose an arbitrary transmitter which has the normalized time distance of and have identified the regions. The region such that a data packet sent from would collide with a data packet if it has sent in the previous consecutive time slot by the node in the region, known as the first collision region. Similarly, the data packet from would collide with a data packet sent in the same time slot by another sensor node in the second region, and the third region has for the collision with a packet in the next consecutive time slot. Moreover, then denote the three collision region by respectively, generally these three region depends on the distance of the source transmitter from the receiver. Moreover, they also depends on the normalized guard band (β). Consider a simple sensor network with two sensor nodes A and B and one receiver R. The node A locates right next to R while node B is very far from R and the size of guard band has small enough. Then, if node B transmits in the i-th time slot, R would receive last part of the packet in the beginning of the (i + 1)-th slot, produced collision with the packet transmitted in the (i + 1)- th slot by node A although the two data packets are sent in different time slots. The time diagram in Figure (5.3) visually shows this situation, where is the normalized propagation time distance of { } from R defined. The normalized guard band size β is less than 1 and. However, if

12 109, without collision between data packets in different time slots. Therefore, that the collision depends on sensor nodes area and two packets transmitted in different time slots have experience collision between each other. Definition 1 The propagation delay of sender X from the receiver is the propagation time from the receiver to X divided by the maximum propagation time in the network. i.e., where d is the distance between sources and sink node. The probability of without collision given a data packet sent by an arbitrary i-th sender is then as follows conditioning on the s normalized time distance, after calculation note that the regions have expressed in terms of normalized time distance and guard band. The region is where the normalized time distance from the receiver has at least but no more than 1. That is, { }, where denotes the normalized time distance of the point P from the receiver. Similarly, have { }, and { }. Figure (5.7) visually presents the regions. { } { } { } Where is the area of, is the probability density function of the normalized time distance of from the receiver given that transmits, and is the noted representation of the event that without collision occurs given transmits and its normalized distance from the receiver is. The last equation holds because the area of the sensor node independent of the data packet transmission and the probability of without collision of a specific

13 110 data packet depend on the area of its transmitter. The three collision regions as shown in the Figure (5.7) areas affect the probability. Figure 5.7 Network Collision { } {{ }} Where Nn, Nc, and Np denote the number of other transmitters in the collision regions respectively. Note that (i) since the intra timeslot collision region is the whole area assumption and (ii) there are (n 1) other transmitters in total since focused on one specific transmitter s success. The probability of conditional turns, without collision turns out of involve the binomial series as follows. { } { } } { } ( ) { } Substituting equation (5.10) in the equation (5.6) and can obtained the equation for the probability of no collision which have evaluated easily with the numerical method. Thus, the equation for probability of without collision does

14 111 not involve the maximum propagation delay implying the probability is independent of iso that the success rate is also independent of. Suppose a network of sensor nodes with fixed spatial area of sensor nodes, a fixed transmission probability in a time slot for each node i, and a transmission time T for a packet. Then, maximum propagation time is independent of the success rate f of the network as long as. In other words, propagation speed is independent. The number of sensor nodes in each of, and is constant regardless of the propagation speed, and so the probability of without collision of the i-th transmitter is constant. Therefore, { } 5.3 Performance Analysis of UWSNs The network has one receiver and 200 nodes of transmitters which are deployed in the 2-D disk area with the measurements of 5x5m 2. Table 5.1 Characterization of UWSN model Symbols a p N Nc β T F S Definition Propagation time Normalized maximum propagation delay Probability in each time slot Number of successful reception Event no collision Guard band Normalized time distance Transmission time Success rate Throughput Propagation speed

15 112 Table 5.2 Parameters list of UWSNs Symbols Definition Value N Number of nodes Transmitting power -20dbM - Transmission rate 250kbps - Packet length 125bytes T Transmission time 1s/kbps The receiver locates at the center of the disk area and the transmitters deployed uniformly at random in the area, maximum transmission range is 30m long. The speed of propagation in communication has positive finite fixed regardless of the area in the sensor network, so that the maximum propagation time from the receiver to the farthest transmitter has a positive finite constant. The rate transmission has fixed for each transmitter i.e. 250Kbps. The packet size is fixed so that, along with the fixed rate of transmission, the transmission time for a packet is constant T. The traffic in the network has I.I.D. Bernoulli, so that a transmitter forwards the packet to the receiver with probability p in each time slot. The transmission time T is less than the maximum propagation time. And also consider the throughput S in packets per packet length. Since the expected number of packet receptions are successful in a time slot, independent of the propagation time as long as it is positive finite, S have expressed after introducing a new variable as follows as the ratio of the maximum propagation delay to the transmission time of a packet. { } Using the numerical evaluation of Equation (5.12). Characteristics of the throughput depending on the size of guard band in the Figure (5.8)) the relative maximum propagation delay t is fixed, but the number of nodes N is

16 113 varying from 20 to 100 with the interval of 20. In the Figure (5.9) implies, fixed N but t is varying from 0.2 to 1 sec with the interval of 0.2 sec. These graphs shows that the throughput responds to the variables, the optimizer β values are similar of the case but different in the other case. Analyzed the results of optimal throughput of propagation delay- ALOHA obtained in previous section to observe the effect of guard band and network delay regime. Furthermore, for comparison and simulate propagation delay-aloha to verify the correctness of analysis. Moreover, then first introduce the notations of the simulation used for comparison and then focus on the results. Figure 5.8 Throughput of packets Simulation using a custom-built, packet-level simulator designed for UWSN MAC model. Simulation scenario consists of a single receiver that does not transmit with nodes randomly deployed in a circular region with a radius equal to the maximum propagation delay. Sensor nodes and the single packet buffer transmit based on an offered load to the network modeled as a Poisson

17 114 process, with mean ranging from 0 to 3 packets/transmission time, packets successfully received at the designated receiver and it has observed. Moreover, choose a single receiver to parallel, analysis of protocol behavior but have verified that the results holding with packets reception at other nodes in the network. Figure 5.9 Number of Successful packets Protocol performance evaluated through throughput normalized to the channel bandwidth. Simulations were run with 200 nodes unless otherwise noted. Moreover, analysis, then used a packet length of 125 bytes, resulting in a transmission time of 1 second (at 1kb/s) to normalized throughput. Moreover, also assumed a constant speed of sound as 1500m/s. After altering the maximum range to simulate different delay regimes. Each simulation data point is the averaged result of 25 simulation runs with error bars showing 95% confidence intervals. Look at the maximum achievable throughput (throughput capacity) that propagation delay-aloha have achieved (at an optimal offered load) as a

18 115 function of guard band length, which is a fraction of the maximum propagation delay. Figure (5.10(a)) represents the function of as the throughput capacity for a fixed N (200 nodes) using numerical methods for maximizing over p. Moreover, the graph, response for different delay regimes characterized by different values of a. Figure (5.10(b)) shows the graph for the same notations. However, here instead of using analysis and derive the results from empirical data collected from simulations. As the results from both simulation and analysis complement each other. Both results shows that throughput capacity of a network have increased by using propagation delay- ALOHA and that the benefit of the guard band highly correlated to its size and the delay regime in which the network is operating. Figure 5.10a Throughput (Analytical results)

19 116 Figure 5.10b Throughput (simulation results) Then observed two trends as increases. First, with very small a = (e.g in simulation results) and shows the throughput increases (approaching the optimum) as larger guard band used due to a decreased inter-timeslot collision probability. Conversely, with large a (e.g. equal to 1 when the propagation delay equals transmission time), the throughput becomes insensitive to the use of guard band. Furthermore, simulation result shows that for any value of a beyond 1, the benefit of choosing additional guard time diminishes. Thus, choosing a packet length that normalizes the propagation delay to an appropriate value is essential to yield the benefits of propagation delay-aloha. Varying the value of a, to observe, how the throughput capacity is affected by propagation delay in propagation delay-aloha. As per the result of Figure (5.11a) gives, that throughput capacity as a function of the normalized maximum propagation delay a when the guard band β is given and fixed. They are obtained for N =50 maximizing in equation (5.7) over p with given β and a.

20 117 Comparing the results, and have the same graph generated from simulation results in the Figure (5.11b). The response using different values of β. It has seen that a fixed value of β might lead to a suboptimal throughput. When β=0.5, propagation delay-aloha is closest to the β-optimal curve when a is near 1 but the gap increases as a goes to 0. Conversely, for β=1 propagation delay-aloha is closest to the β -optimal curve for smaller values of a but becomes inefficient as a approaches 1. Although the throughput decreases monotonically with increasing values of a, it is observed very little sensitivity to a with smaller β values. This insensitivity is due to limited collision prevention provided by the shorter guard band. Also, the monotonically decreasing slope increases with β causing throughput to become more sensitive to a. Figure 5.11a Maximum throughput (Analytical results) Simulation and analytical results from the Figure (5.11a & 5.11b) shows that propagation delay-aloha achieved about 19% (when a= 1) to 90%. When a = 0, improvement on throughput over slotted ALOHA in an underwater

21 118 environment. Figure (5.11a&b) represents the normalized throughput regarding the maximum propagation delay a. Moreover, the maximum throughput changes in terms of the guard band. From the numerical analysis that, given a guard band in [0, 1], the maximum throughput have been obtained with (hence, a = ). Figure 5.11b Maximum throughput (Simulation results) Table 5.3 Consolidated results for propagation delay Propagation delay in sec PD Analytical Normalized Throughput PD Simulation Normalized Throughput β =1s β =.5s β =.1s β =1s β =.5s β =.1s

22 Summary In this chapter, have exploring the impact of spatio-temporal uncertainty on under water wireless Sensor Network MAC protocols. For such networks, shown that the location- dependent acoustic propagation delay significantly affects MAC protocols such as slotted ALOHA. Thus, it is necessary to consider both space and time uncertainties while designing MAC protocols under varying latency environment of an acoustic UWSN. And modified slotted ALOHA by adding extra guard band in each slots. Then have investigated different metrics of performances, expected number of successful packet receptions in a guard band slot, throughput and maximum throughput. After that obtained exact equations for the number of receptions and throughput in terms of well-known functions using both analytical and protocol simulations. These results given that the throughput capacity of propagation-aloha is 19-90% better than that of simple slotted ALOHA in an underwater environment. Then shows that for the optimal throughput capacity the value of optimal changes based on operating delay regime. This argues for deploying dense, short range, multi-hop networks as opposed to sparse and long range networks currently used in underwater networks. However, this chapter of research work focused on capturing the impact of latency on ALOHA-like protocols and understanding the mechanics of underwater medium access.

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols

Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols Understanding Spatio-emporal Uncertainty in Medium Access with ALOHA Protocols Affan Syed Wei Ye Bhaskar Krishnamachari John Heidemann University of Southern California Abstract he goal of this paper is

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Article An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Faisal Alfouzan *, Alireza Shahrabi, Seyed Mohammad Ghoreyshi and Tuleen Boutaleb School of Engineering and Built Environment,

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar Papa Alioune Ly, Joel Alloh, Carl Hedari, Tom Reynaert Outline Introduction Design of the

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Simulated SA Throughput vs. p

Simulated SA Throughput vs. p Problem 1. Simulation of Slotted Aloha network (A) There are n stations in the network that are trying to transmit messages to an access point. (B) All the stations are synchronized and they are using

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

THE capabilities of mobile cellular communications may

THE capabilities of mobile cellular communications may 680 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 4, APRIL 2006 Analysis and Modeling of Upstream Throughput in Multihop Packet CDMA Cellular Networks Ali Nabi Zadeh, Member, IEEE, and Bijan Jabbari,

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract

IEEE P Wireless LANs Impact of Bluetooth on Direct Sequence. Abstract IEEE P802.11 Wireless LANs Impact of Bluetooth on 802.11 Direct Sequence Date: September 15, 1998 Author: Greg Ennis Ennis Associates 16331 Englewood Ave. Los Gatos CA 95032 USA Phone: (408) 358-5544 Fax:

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

Experiment report. Figure 1: Deployment location

Experiment report. Figure 1: Deployment location Experiment report 1. Experiment time: July 30th, 2015 2. Experiment location: receiving Node (MID3) was placed at Pocock rowing center and two source nodes (MID1, MID2) were setup in APL location. Figure

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer. Problem Set 1 1. Why do we use layering in computer networks? 2. Name the 7 OSI layers and give the corresponding functionalities for each layer. 3. Compare the network performance of the 3 Multiple Access

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

ECE 653: Computer Networks Mid Term Exam all

ECE 653: Computer Networks Mid Term Exam all ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435 Student Name ID Time Allowed: 2.0 Hours. Closed Book, Closed

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks

MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks : A Multi-Channel MAC Protocol for Wireless Sensor Networks Özlem Durmaz Incel, Pierre Jansen, Sape Mullender University of Twente Department of Computer Science Enschede, The Netherlands {durmazo, jansen,

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x ECE 358 MAC Examples Xuemin (Sherman) Shen Office: EIT 4155 Phone: x 32691 Email: xshen@bbcr.uwaterloo.ca Problem 1. Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Design and Simulation of an Underwater Acoustic Local Area Network

Design and Simulation of an Underwater Acoustic Local Area Network Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409

More information

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Spatial Correlation-Based Collaborative Medium Access Control in Wireless Sensor Networks

Spatial Correlation-Based Collaborative Medium Access Control in Wireless Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2006 Spatial Correlation-Based Collaborative Medium

More information

Splitting Algorithms

Splitting Algorithms Splitting Algorithms We have seen that slotted Aloha has maximal throughput 1/e Now we will look at more sophisticated collision resolution techniques which have higher achievable throughput These techniques

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE 802.15.4 FOR WIRELESS SENSOR NETWORK Kamaljit Singh 1, Dr. Sukhvinder Singh Bamber 2, Aman Kaushik 3 1 M.Tech,CSE Department, Baddi University of Emerging

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Performance of DSMA/CD in CDPD Networks

Performance of DSMA/CD in CDPD Networks Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data

More information