Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Size: px
Start display at page:

Download "Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs"

Transcription

1 Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*, Jean-Pierre Ebert*, Adam Wolisz*# * Technical University Berlin, Electrical Engineering Department Einsteinufer Berlin, Germany # GMD Fokus - STEP Hardenbergplatz 2, Berlin [ jost woesner ebert wolisz]@ftsu00.ee.tu-berlin.de Abstract The distributed coordination function that is used as the access scheme for asynchronous traffic within the upcoming standard for wireless LANs IEEE optionally applies the RTS/CTS message exchange to solve the hidden terminal scenario. In this paper, following a general discussion of the mechanism and its problems, we show the effectiveness or lack thereof of this mechanism in various cases like hidden terminals and fully meshed, optional (distributed) use of RTS/CTS and the dependencies from various parameters like physical preambles and packet sizes. We conclude this paper with a discussion of the results drawn from the simulations and an outline of problems that have yet to be investigated. 1. Introduction Wireless LANs (WLANs) are expected to be a major growth factor for the network industry in the upcoming years. They will play their part in the network architecture as a provider for easy and unconstrained access to the wired infrastructure - an extension of the wired network with a wireless last link to attach the large number of mobile data communication terminals (from high performance laptops to small communication devices maybe as small as pagers). Especially for such a technology that is calling for mobility of equipment across borders of any kind it is important to provide a well defined i.e. standardized interface between the elements of the architecture to avoid unnecessary limitations of the mobility due to technical interface boundaries. Therefore standardization is currently under work for the IEEE standard specifying physical layer (PHY) and media access control (MAC) for wireless LANs [1] as well as for the ETSI 2 HIPERLAN [2] standard with the same task. 1. Institute of Electrical and Electronics Engineers, Inc. 2. European Telecommunications Standards Institute

2 The IEEE working group has selected a proposal called DFWMAC 1 as the draft standard. DFWMAC integrates two coordination functions - a point coordination function for synchronous data transmission and a distributed coordination function for asynchronous data. These two modes share the mediums bandwidth in a time multiplexed manner organized in a superframe structure. The distributed coordination function shares access to the medium based on a CSMA/CA scheme that is extended with a RTS/CTS message exchange to improve performance in two aspects. If collisions occur, they occur with smaller packets, therefore the lost piece of bandwidth is smaller compared to a collision of long packets. The main purpose for the integration of the mechanism into DFWMAC however is the solution of the hidden terminal problem: The successful exchange of small messages - RTS (Request To Send) sent by the sender and CTS (Clear To Send) - reserves the area within range of the receiver and the sender for the intended transmission guaranteeing undisturbed media for the longer data packet. According to the draft standard [1] this mechanism is optionally applied whereas the rules of application of this exchange - never used, only used under certain circumstances or constantly used - are set on a per-station-basis. In this paper we present the results of our simulative analysis on the RTS/CTS message exchange, the effects in the hidden terminal case and in the fully meshed case, defining the dependencies and areas of useful application and showing its effects on the overall network performance when its application strategies are not harmonized throughout the network. Section 2 of this paper gives an overview of the hidden terminal scenario in wireless LANs and how this special problem is addressed in DFWMAC, section 3 presents simulations on the RTS/CTS mechanism in the DFWMAC standard and discusses the problems arising from it, section 4 finishes this paper with conclusions and an outlook on further problems that have to be addressed. 2. RTS/CTS operation in DFWMAC Radio networks create a problem due to their specific nature: Carrier sensing is difficult due to the hidden terminal scenario where collisions cannot be securely detected at the sending stations. This scenario is explained in Figure 1: if station B is sending to station C the medium appears used only for the stations located within the range of station B - other stations cannot sense a signal and consider the medium idle. Therefore station D might start a transmission since it does not notice B s ongoing transmission. However since the receiving station C is within range of B and D and thus receives two signals at once it will not be able to clearly understand either of the two transmission (whether destined for it or not). This collision however cannot be detected at the sending station B unless it notices the lacking acknowledgment from station C after a certain time-out. 1. DFWMAC - Distributed Foundation Wireless Medium Access Control RTS/CTS Analysis Page 2

3 . RTS A B CTS C D = Area of reception for Signals from Station B = Area of reception for Signals from Station C = Area of reception for Signals from Station B and Station C Figure 1:Hidden Terminal Situation To solve this situation the RTS/CTS mechanism, developed in [3] and analyzed in [4], has been integrated in the DFWMAC in the following fashion: Each station seeking access to the medium selects a random slot within the contention window. The station with the earliest slot wins the competition and may start transmitting. Stations with a later slot number hear the other station transmitting and refrain from sending ([1] and [5]). When the RTS/CTS mechanism is applied, the winning station does not send data packets right away but sends a RTS packet to the receiving station, that responds with a CTS packet. If a station captures a RTS packet from another station and it is not the destination of the RTS packet it reads the indended transmission duration from the RTS packet and stays silent for that time (this is done by setting the Network Allocation Vector NAV). The same happens if only a CTS packet is received i.e. by a station outside of the transmission range of the sender but within the range of the receiver. This guarantees that all stations within range of either sender or receiver have knowledge of the transmission as well as of the duration of it. DIFS Source RTS SIFS SIFS DATA DIFS Destination Other Stations CTS NAV (RTS) NAV (CTS) ACK DIFS Contention Window next MPDU Defer Access Figure 2:RTS/CTS mechanism Backoff after Defer RTS/CTS Analysis Page 3

4 To sum up the effects of the RTS/CTS mechanism, we can say, that it increases bandwidth efficiency by its reduced collision probability since the ongoing transmission has been made known everywhere within the range of it increases bandwidth efficiency since if collisions occur they do not occur with the long data packets but with the relative small control packets decreases bandwidth efficiency since it transmits two additional packets without any payload decreases bandwidth efficiency since it reserves geographical space for its transmission where or when it might actually not need it. Due to the above listed trade-offs of the RTS/CTS mechanism, the DFWMAC draft standard allows its usage but does not demand it. Usage policy is set on a per-station-basis with the help of a manageable object RTS_Threshold that indicates the payload length under which the data frames should be sent without the RTS/CTS prefix. This parameter is not fixed in the draft standard and has to be set seperatly by each station. The packet size is the only parameter that is used to decide whether the mechanism is applied, however we will show in the simulations presented below, that there are several more factors relevant to guarantee efficiency gain. We identified the following elements: configuration and geometry and the physical preamble length, but there might be further dependencies. 3. Discussing the RTS/CTS Mechanism in DFWMAC In order to analyze the behavior of the DFWMAC we simulated a possible network cell. We chose Ptolemy [6] as our simulation tool for several reasons: its an object oriented general purpose simulation tool with many connectable simulation environments (discrete event, synchronous data flow, concurrent processes) for several different simulation types. It allows simple modelling, has a rich library and a big number of users, allowing exchange of experience over a dedicated newsgroup. We simulated a WLAN consisting of 8 stations using DFWMAC s distributed coordination function as the access scheme with a raw physical throughput of 2 Mbit/s. The channel and packet source model is basically the same as it is described in [7], i.e. Poisson distributed packet sources in a wireless channel model. In addition to that we simulated the signal run time, which can be left out if one only considers a range of a microcell, but which becomes considerable at distances of 300 m and more. Several parameters had to be set to a certain value for our simulations since they are not (yet) defined in the draft standard: The contention window size was set to 32 slots, lasting 4µs each, the physical preamble was set to 30 bytes unless other values are explicitly mentioned, 16 RTS packets transmission attempts with missing CTS response and 4 data packet transmissions with missing acknowledgment response are sent out before the transmission is cancelled and the packet is dropped. RTS/CTS Analysis Page 4

5 Originally, the RTS/CTS mechanism was introduced to solve the hidden terminal problem. In result our first simulations intended to show the positive effect of this mechanism in this case. In further simulations we evaluated the use of RTS/CTS in a fully meshed network (i.e. without hidden terminals) and special values for certain parameters RTS/CTS in the hidden terminal scenario To show the effect of the RTS/CTS mechanism, we simulated the following scenario: There are 8 stations in a cell, where station 1 is hidden to stations 2 and 3, respectively. All of the outer stations (1,2 and 3) try to send data to the inner, i.e. audible to all, stations. The destinations of data traffic are shown in Figure 3. Meter Figure 3:Map of the stations in the hidden terminal simulation Meter The result of these simulations was that using the RTS/CTS does not completely solve the hidden terminal problem, even though significant improvements can be achieved. The breakdown of inbound data traffic in the case of higher load stems from the fact that the mutually hidden stations become synchronized by an earlier data exchange in the area between them. In result, they start their backoff counters at the same time but they are unable to detect the begin of transmission of the other station. Figure 4 shows the through- RTS/CTS Analysis Page 5

6 put achieved by the different stations when RTS/CTS is permanently switched off. The relevant differences are clearly visible in the higher load range. The stations that are hidden to other stations hardly get any packets through due to the above mentioned synchronization effect. The stations that attempt to send towards the hidden stations have significantly lower throughput than the two stations 5 and 7 that only send to non-hidden stations. The first group successfully gets packets through, however many acknowledgment packets are destroyed by traffic from the hidden stations. Throughput per station in % stations 5,7 stations 4,6 station 8 stations 1,2,3 Offered Load per station in % Figure 4:Throughput per Station, Hidden Terminals, RTS/CTS off Figure 5 shows the same setup when RTS/CTS is permanently used. This figure shows clearly that still the hidden terminal scenario is not solved: Station 1 still hardly gets any packets through, but its throughput is improved compared to the figure without RTS/ CTS. The same goes for stations 2 and 3 - all of the hidden stations benefit from the captured CTS packets. The non-hidden terminals all achieve the same (high) throughput due to the fact that outbound traffic is protected by the RTS packets. RTS/CTS Analysis Page 6

7 Throughput per station in % all other stations stations 2,3 station 1 Offered Load per station in % Figure 5:Throughput per station, Hidden Terminals, RTS/CTS on 3.2. RTS/CTS in a fully meshed network In the above paragraph we showed the performance gain that can be achieved by applying the RTS/CTS mechanism in the case with hidden terminals. For the fully meshed case we followed several different goals in our simulations: we showed that there are situations where application of the mechanism has significant positive effects as well as there are situations with significant negative effects thus proving that there cannot be an overall same strategy on the usage policy we then tried to analyze the relevant factors that determine the efficiency of the mechanism under fixed non-extreme circumstances we defined a range of values for useful application of RTS/CTS (RTS_Threshold parameter) we investigated asymmetric usage policies of the mechanism. Our first two simulations were meant to show extreme situations, one resulting in significant negative effect in using RTS/CTS, one resulting in significant negative effects RTS/CTS Analysis Page 7

8 when NOT using it, both compared to a realistic scenario. The first situation was determined by a short packet length of only 64 byte payload, while the PHY preamble was set to 30 bytes. Since observations of Ethernet traffic show that a very large number of packets is shorter than 100 byte, this situation can actually be considered realistic. Both figures show decreasing performance - lower throughput and higher access delay due to the higher overhead of the RTS/CTS extension. Throughput per station in % Not using RTS/CTS Using RTS/CTS Offered Load in % Figure 6:Negative effect on throughput, if packet size is small Access Delay in ms Using RTS/CTS Not using RTS/CTS Offered Load in % Figure 7:Negative effect on access delay, if packet size is small RTS/CTS Analysis Page 8

9 For the following simulations we used packet sizes from an Ethernet trace (Leland trace, [8]) i.e. packet sizes are distributed as in real ethernet traffic with an average packet size of 682 byte. It shows that using the RTS/CTS mechanism permanently in this case is significantly better than not using it. Throughput in Kbyte/s Using RTS/CTS Not using RTS/CTS Offered Load in % Figure 8:Positive effect on throughput, if packet size is larger (mean=682 byte) Access Delay in ms Not using RTS/CTS Using RTS/CTS Offered Load in % Figure 9:Positive effect on access delay, if packet size is larger (mean=682 byte) RTS/CTS Analysis Page 9

10 In the same scenario as above we determined the gain or loss of throughput and delay versus load, if RTS/CTS is used, depending on the packet size. Since the packet size on the wireless channel consists of the MAC-layer packet size and the physical layers preamble the length of this latter part has to be taken into account when determining the RTS_Threshold parameter. Our simulations gave larger best values for RTS_Treshold for larger physical preambles. Since this physical preamble has different lengths depending on the channel used - for the defined physical layers in the specification those values are 128 bits with a variable number of stuff bits for 2.4GHz FHSS 1 channel, 192 bits for the 2.4GHz DSSS 2 channel and between 96 and 112 slots of 250ns length plus 32 bits for the baseband infrared channel - therefore this value has to be taken into account when configuring the RTS_Threshold parameter. This gets even more difficult in the case of the 2.4GHz FHSS channel as well as for the infrared channel, where no fixed length is added but a variable number of bits. Total throughput in % RTS/CTS on RTS/CTS off Offered Load in % Figure 10:Throughput vs. Load, PHY_preamble=0 If we assume the physical preamble to be non-existent we get the highest total throughput for RTS_threshold=64, i.e. RTS/CTS is switched on permanently since no packets are smaller than 64 bytes. 1. FHSS - Frequency Hopping Spread Spectrum 2. DSSS - Direct Sequence Spread Spectrum RTS/CTS Analysis Page 10

11 Total throughput in % RTS_threshold =256 RTS/CTS on RTS/CTS off Figure 11:Throughput vs. Load, PHY_preamble=30 bytes For a physical preamble length of 30 bytes, we achieve best results for RTS_threshold around 256 bytes. Total throughput in % Offered Load in % RTS/CTS off RTS_threshold=1024 RTS/CTS on Figure 12:Throughput vs. Load, PHY_preamble=100 bytes Offered Load in % RTS/CTS Analysis Page 11

12 For the extreme (and slightly unrealistic) case of the PHY_preamble having 100 bytes we get optimal values for RTS_threshold around 512 bytes. Summing up we can say that for the proposed PHY_preamble sizes of the draft standard we recommend, based on our simulations, a value of around 200 byte MPDU size for the RTS_threshold. This of course depends on the source model of our simulations. Since traffic on a wireless network can be expected similar to Ethernet traffic we consider our applied source model to be reasonable. The use of RTS/CTS in the DFWMAC draft standard is managed on a per-station basis. This can result in asymmetric configurations in the network, e.g. one station does never use the mechanism, all the others do. We simulated some of those asymmetric configurations to determine whether the stations behaving different than the rest might win performance at the cost of the others, whether they will loose or whether they will cause degradation of the overall network performance. It showed that there is no individual gain for a station which does for some reason not behave like the others, but that there is a small decrease in the overall performance Total throughput per group in % using RTS/CTS The strategy based on setting a fixed value for RTS_Threshold obviously does not optimize the optional use of the mechanism. We will experiment with a different approach trying to design it as a load adaptive scheme: Considering the fact that under low load connot using RTS/CTS Figure 13:Throughput vs. Load 4 Stations use RTS/CTS, 4 Stations don t 4. Conclusions % Offered Load per group RTS/CTS Analysis Page 12

13 dition in the network the few collisions caused by the hidden terminal scenario do not harm the overall performance as much as under high load condition, it seems to be reasonable only to use RTS/CTS when load is high. However it is not trivial to get the knowledge about current load to the stations. One thinkable switch-on criteria could be an experienced collision: once a data packet collided the next attempt would have to be preceded by a RTS/CTS exchange (possibly this step to more secure transmission should only take place after two or more collided attempts). This strategy however leaves it open when the station should switch back to non-rts/cts mode - after each successful transmission of a data packet, after a certain silence period, after a certain time period or other. As we have shown several factors have significant influence on the efficiency with which the RTS/CTS mechanism can be applied in the context of DFWMAC. At current standing we cannot advise for or against its use. This is especially true considering further uncertainties e.g.what happens if PCF is also used, i.e. DCF is only partly active? what happens if considerably different signal strength levels are sent out from different stations (e.g. when the battery power is low in one station) and therefore the station can hear all stations but is not heard by all of them? Another topic for further work could be the exploitation of the hidden terminal scenario - since the collision can only occur at the receiving side of the communication it is not necessary to reserve space around the sending side. A station only hearing the RTS packet and the data packets but not the CTS packet can assume, that it is out of range of the receiving station and thus not disturbing the ongoing communication. It could therefore start communication with another station if that station is able to receive the signal as well undisturbed by the other ongoing communication. These problems will be the subject for our future activities in this area. References [1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Draft Standard IEEE , P802.11/D1; The editors of IEEE [2] HIPERLAN Functional Specification Section 6 MAC Layer, Draft Version 0.6, ETSI Secretariat, December 1994 [3] MACA - A new Channel Access Method for Packet Radio, P. Karn, ARRL/CRRL Amateur Radio 9th Computer Networking Conference, Sept [4] MACAW: A Media Access Protocol for Wireless LAN s; Bharghavan V., Demers A., Shenker S., Zhang L., SIGCOM 94; macaw-cr.ps [5] Modified Backoff Algorithms for DFWMAC`s Distributed Coordination Function; Woesner H., Weinmiller J., Ebert J-P., Wolisz A.; submitted to 2. ITG-Fachtagung RTS/CTS Analysis Page 13

14 Mobile Kommunikation 95; ITG.ps.Z [6] PTOLEMY, anonymous ftp site: ftp.ptolemy.eecs.berkeley.edu, www: ptolemy.eecs.berkeley.edu, Copyright The Regents of the University of California [7] A Wireless MAC Protocol comparison, W. Diepstraten; IEEE working paper P /51, May 1992 [8] W. Leland et al.: On the Self-similar nature of Ethernet traffic (extended version), IEEE Transactions on Networking, Vol 2, No 1, Feb 1994 RTS/CTS Analysis Page 14

Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free

Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free Analyzing and Improving the IEEE 802.11-MAC Protocol for Wireless LANs Jost Weinmiller, Hagen Woesner, Adam Wolisz Electrical Engineering Department Technical University Berlin, Sekr. FT5 Einsteinufer

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Hands-On Exercises: IEEE Standard

Hands-On Exercises: IEEE Standard Hands-On Exercises: IEEE 802.11 Standard Mohammad Hossein Manshaei and Jean-Pierre Hubaux {hossein.manshaei,jean-pierre.hubaux}@epfl.ch Laboratory for Computer Communications and Applications (LCA) March

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless LAN. Access Point. Provides network connectivity over wireless media LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

WLAN Performance Aspects

WLAN Performance Aspects Mobile Networks Module C- Part 1 WLAN Performance Aspects Mohammad Hossein Manshaei Jean-Pierre Hubaux http://mobnet.epfl.ch 1 Performance Evaluation of IEEE 802.11(DCF) Real Experimentations HoE on IEEE

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Efficient Power MAC Protocol in Ad-hoc Network s

Efficient Power MAC Protocol in Ad-hoc Network s Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

PERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE NETWORKS WITH OTHER NETWORKS

PERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE NETWORKS WITH OTHER NETWORKS PERFORMANCE ANALYSIS OF INTERCONNECTIONS OF IEEE 802.11 NETWORKS WITH OTHER NETWORKS Marek Natkaniec Department of Telecommunications University of Mining and Metallurgy 30-059 Cracow, Poland E-mail: natkanie@kt.agh.edu.pl.

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Effect of Hidden Terminals on the Performance of IEEE MAC Protocol

Effect of Hidden Terminals on the Performance of IEEE MAC Protocol Effect of Hidden Terminals on the Performance of IEEE 8.11 MAC Protocol Sumit Khurana, Anurag Kahol, Anura P. Jayasumana Colorado State University Ft. Collins, Colorado, U.S.A. fkhurana, kaholg@cs.colostate.edu,

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information