IEEE WBAN Beaconing for Wireless USB Protocol Adaptation

Size: px
Start display at page:

Download "IEEE WBAN Beaconing for Wireless USB Protocol Adaptation"

Transcription

1 IEEE WBA Beaconing for Wireless USB Protocol Adaptation Kyeong Hur 1, Won-Sung Sohn 1 *, Jae-Kyung Kim 1 and YangSun Lee 2 1* Dept. of Computer Education, Gyeongin ational University of Education, Gyesan- Dong San 59-12, 45 Gyodae-Gil, Gyeyang-Gu, Incheon, , Korea Telephone: , Fax: Dept. of Computer Engineering, Seokyeong University Seoul, Korea sohnws@ginue.ac.kr Abstract In this paper, an IEEE wireless body area networks (WBA) medium control protocol is developed to support a wireless USB (WUSB) application as a protocol adaptation layer (PAL). Even though we can avoid colliding packets using CSMA/CA, hazard of beacon collisions still remains in the WUSB over WBA networks. Further, in order to solve beacon conflict problem, we introduce a multi-channel beaconing (MCB) for avoidance of beacon collision. The proposed MCB can minimize the possibility of beacon collision by efficiently managing the multiple available channels in a hybrid manner combining proactive and reactive method. Keywords: Hierarchical MAC, Wireless USB, Wireless Body Area etworks (WBA) 1. Introduction There is a need for a standard optimized for ultra-low power devices and operation on, in or around the human body to serve a variety of applications including medical and personal entertainment. Examples of the applications served by the proposed standard are: Electroencephalogram (EEG), Electrocardiogram (ECG), Electromyography (EMG), vital signals monitoring (temperature (wearable thermometer), respiratory, wearable heart rate monitor, wearable pulse oximeter, wearable blood pressure monitor, oxygen, ph value, wearable glucose sensor, implanted glucose sensor, cardiac arrhythmia), wireless capsule endoscope (gastrointestinal), wireless capsule for drug delivery, deep brain stimulator, cortical stimulator (visual neuro-stimulator, audio neuro stimulator, Parkinson s disease, etc.), remote control of medical devices such as pacemaker, actuators, insulin pump, hearing aid (wearable and implanted), retina implants, disability assistance, such as muscle tension sensing and stimulation, wearable weighing scale, fall detection, aiding sport training. This will include body-centric solutions for future wearable computers [1]. In a similar vein, the same technology can provide effective solutions for personal entertainment as well. The existence of a body area network standard will provide opportunities to expand these product features, better healthcare and wellbeing for the users. It will therefore result in economic opportunity for technology component suppliers and equipment manufacturers. WUSB (Wireless USB) is designed to provide the same function as wired USB and supports high bandwidth (480Mb/s). High bandwidth property makes WUSB an essential technology for indoor high-speed multimedia applications such as Internet 1

2 Protocol Television (IPTV) and Personal Video Recorder (PVR) services. Also, WUSB system gets a lot of attention in home multimedia network since its low transmission power doesn t cause interference with other devices and its wide bandwidth isn t affected by interference from adjacent other devices. Recently, many researches were carried out for high-quality video transmission over UWB link. Applications like HDTV (High Definition Television) and PVR (Personal Video Recorder), generate high data rates and can easily saturate the bandwidth even at the rates provided by UWB transmissions. However, these researches can t add new service traffic in wireless channel when there are no available resources [2-6]. Figure 1 shows the situation that three adjacent WUSB clusters shares one WiMedia superframe. As shown in Figure 1, the situation that multiple WUSB clusters share one superframe can occur in several places such as office and school that can be used various PCs and office equipments. Also, multiple adjacent WUSB clusters cause the interference among WUSB clusters by device s mobility or changes in the wireless environment [4]. Figure 1. WiMedia MAC Superframe Architecture in which Multiple WUSB Clusters Operate Simultaneously The IEEE Wireless Body Area etwork (WBA) is a standard for short range, wireless communication in the vicinity of, or inside, a human body (but not limited to humans) [7]. The IEEE Wireless Body Area etwork (WBA) standard is used in or around a body. It is designed to serve advanced medical and entertainment options enabled by this standard. It will allow medical equipment manufacturers and consumer electronics manufacturers to have small, power-efficient, inexpensive solutions to be implemented for a wide range of devices. It uses existing ISM bands as well as frequency bands approved by national medical and/or regulatory authorities. Support for Quality of Service (QoS), extremely low power, and data rates up to 10 Mbps is required while simultaneously complying with strict non-interference guidelines where needed. This standard considers effects on portable antennas due to the presence of a person (varying with male, female, skinny, heavy, etc.), radiation pattern shaping to minimize Specific Absorption Rate (SAR) into the body, and changes in characteristics as a result of the user motions. In our study, we integrate the wireless body area networks (WBA) with the wireless USB (WUSB) system to develop wireless communication technologies and localizationbased input functions for wireless wearable computer systems. Even though we can avoid colliding packets using CSMA/CA, hazard of beacon collisions still remains in the WUSB over WBA networks. In spite of its importance, so far, there have been no fundamental solutions for beacon collision problem in the WUSB over WBA networks. In order to solve beacon conflict problem, we introduce a multi-channel beaconing (MCB) for avoidance of beacon collision. The proposed MCB can minimize the possibility of beacon collision by efficiently managing the multiple available channels in a hybrid manner combining proactive and reactive method. 2

3 2. Characteristic of WUSB Protocol WUSB protocol works on WiMedia MAC superframe, and WUSB Channel consists of a set of Private DRP reservations within WiMedia MAC superframe. Since Private DRP reservation blocks can only be used by member devices related to specific application, devices using other application can t obtain the information of the corresponding private DRP reservation blocks [4]. Beacon Period(BP) PCA Private DRP DRP DEV0 DEV1 DEV2 BPST BPST WCTA 1 WCTA n MS- CTA1 WCTA m WUSB Channel WiMedia MAC superframe WCTA 1 WCTA o ext ext ext Transaction Group 1 Transaction Group 2 Transaction Group n Figure 2. The Architecture of WUSB Channel As shown in Figure 2, WUSB defines a WUSB Channel which is encapsulated within a set of WiMedia MAC superframes via a set of Private DRPs. The WUSB Channel is a continuous sequence of control packets, called s (Micro-scheduled Management Commands), which are broadcast by the host within Private DRP reservations in WiMedia MAC superframe. s contain host identifying information, I/O control structures and a time reference to the next in the sequence. includes the information of scheduling for all I and OUT transaction in WUSB Channel and it is used primarily to dynamically schedule channel time for data communications between WUSB host and WUSB devices. An specifies the sequence of micro-scheduled channel time s (MS-CTAs) up to the next within a private DRP reservation block or to the end of a Private DRP reservation block [4]. For transactions between wired USB and WUSB, the wired USB protocol completes an entire I or OUT transaction (Token, Data and Handshake phases) before continuing to the next bus transaction for the next scheduled function endpoint. The Wireless USB protocol broadcasts USB Token (equivalents) in the and utilizes TDMA time slots for the Data and Handshake phases as appropriate for the transfer type and direction of data communication. Utilizing this method, a host can start a group of transactions at the same time because the may contain Tokens for more than one Wireless USB transaction [4]. Within the context of the Wireless USB application, the Micro-scheduled sequence (e.g., plus associated time slots) is called a Transaction Group. A WUSB Host determines how individual transactions are scheduled into individual transaction groups in order to satisfy the needs (and priorities) of the applications controlling the devices in the WUSB Cluster. The wired USB protocol allows a maximum of one data packet per USB transaction. Due to the significant packet delimiter overheads for wireless (long packet preambles, MIFS, SIFS, etc.), WUSB includes the capability to send multiple data packets during a transaction s data phase. This feature allows for potentially better efficiency because packet delimiters and inter-packet gaps can be reduced. The general term for this capability is a Burst Mode Data Phase. Wired USB protocol needs n transactions so that USB host transmits n data frames to WUSB device. However, WUSB completes the same data transmission in smaller transactions using Data Burst Mode. This Data Burst Mode can improve the resource utilization in 3

4 WUSB protocol using the limited resource since it can reduce overheads such as long packet preambles, MIFS, and SIFS [4]. 3. WUSB over WBA Protocol The purpose of IEEE standard is to provide an international standard for a short range (i.e., about human body range), low power and highly reliable wireless communication for use in close proximity to, or inside, a human body. Data rates, typically up to 10Mbps, can be offered to satisfy an evolutionary set of entertainment and healthcare services. Current Personal Area etworks (PA)s do not meet the medical (proximity to human tissue) and relevant communication regulations for some application environments. They also do not support the combination of reliability, Quality of Service (QoS), low power, data rate and noninterference required to broadly address the breadth of body area network applications [7]. To provide or support time referenced s in its wireless body area network (WBA), a hub shall establish a time base as specified in [7] which divides the time axis into beacon periods (superframes) regardless of whether it is to transmit beacons. In such cases, the hub shall transmit a beacon in each beacon period, except in inactive superframes, unless prohibited by regulations such as imposed in MICS band. The hub may shift (rotate) its beacon transmission time from one offset from the start of current beacon period to another offset from the start of next beacon period, thereby shifting the time reference for all scheduled s, to prevent large-scale repeated transmission collisions between its WBA and neighbor WBAs [7]. In cases where a hub is not to provide or support time referenced s in its WBA, it may operate without establishing a time base nor superframe boundaries and hence without transmitting beacons at all. Equivalently, a hub shall operate in beacon mode transmitting a beacon in every beacon period other than in inactive superframes to enable time referenced s, unless regulations as applicable in the MICS band disallow beacon transmission. In the latter case, a hub shall operate in non-beacon mode transmitting no beacons, with superframe and slot boundaries established if to the medium in its WBA involves time referencing, or without superframe or slot boundaries if to the medium in its WBA involves no time referencing. In the beacon mode, a hub shall divide each active beacon period into applicable phases as illustrated in Figure 3. The hub may announce some superframes (beacon periods) as inactive superframes where it transmits no beacons and provides no phases, if there are no s scheduled in those superframes [7]. B B2 EAP1 RAP1 Type-I/II phase EAP2 RAP2 Type-I/II phase CAP Beacon period (superframe) n Figure 3. Layout of Access Phases in a Beacon Period (Superframe) for Beacon Mode The hub shall place the phases exclusive phase 1 (EAP1), random phase 1 (RAP1), type-i/ii phase, exclusive phase 2 (EAP2), random phase 2 (RAP2), type-i/ii phase, and contention phase in the order stated and shown above. The hub may set to zero the length of any of these phases, but shall not have RAP1 shorter than the guaranteed minimum length 4

5 communicated in Connection Assignment frames sent to nodes that are still connected with it. To provide a non-zero length CAP, the hub shall transmit a preceding B2 frame [7]. A type-i/ii phase is either a type-i or type-ii phase as described below but not both. The two type-i/ii phases may be both of type-i, both of type-ii, or one of type-i and the other of type-ii. If one is of type-i and the other is of type-ii, either one may appear before the other. The hub may schedule uplink s, downlink s, and bi-link s anywhere in a type-i phase. It may improvise type-i and type-ii polled s as well as posted s anywhere outside the scheduled s in the type-i phase. It may also provide type-i and type-ii polled s within scheduled bi-link s in a type-i phase. A type-i polled is conveyed in terms of its time duration (the maximum time the polled node may use for its frame transactions in the ). And a type-ii polled is conveyed in terms of a frame count (the maximum number of frames the polled node may transmit in the ). These s along with the corresponding methods by which they are obtained are illustrated in Figure 4. Scheduled Improvised Type-I/II polling Scheduled-polling Scheduled Improvised posting Improvised Type-I/II polling Scheduled uplink Type-I/II polled (uplink) Scheduled bilink Type-I/II polled (uplink) Scheduled downlink Posted (downlink) Type-I/II polled (uplink) Type-I phase Figure 4. Allocation Intervals and Access Methods Permitted in a Type-I Access Phase The hub may schedule bi-link s and delayed bi-link s anywhere in a type-ii phase, except that it shall not schedule any bilink s after delayed bi-link s in the same type-ii phase. It may improvise type-ii, but not type-i, polled s as well as posted s anywhere outside the scheduled bi-link s and delayed bi-link s in the type-ii phase. It may also provide type-ii, but not type-i, polled s within scheduled bi-link s and delayed bi-link s. These s along with the corresponding methods by which they are obtained are illustrated in Figure 5 [7]. Scheduled-polling Improvised Type-II polling Scheduled-polling Improvised posting Delayed-polling Delayed-polling Improvised Type-II polling Scheduled bilink Type-II polled (uplink) Type-II polled (uplink) Scheduled bilink Type-II polled (uplink) Posted (downlink) Delayed bilink Type-II polled (uplink) Delayed bilink Type-II polled (uplink) Type-II phase Figure 5. Allocation Intervals and Access Methods Permitted in a Type-II Access Phase In exclusive phase 1(EAP1), random phase 1 (RAP1), exclusive phase 2(EAP2), random phase 2 (RAP2), and contention phase (CAP), s may only be contended s, which are non-reoccurring time s valid per instance of. The method for obtaining the contended s 5

6 shall be CSMA/CA if prandonaccess is set to CSMA/CA, or slotted Aloha if prandonaccess is set to Slotted Aloha. A hub or nodes may obtain contended s in EAP1 and EAP1, if it needs to send data type frames of the highest user priority (i.e., containing an emergency or medical event report). The hub may obtain such a contended psifs after the start of EAP1 or EAP2 without actually performing the CSMA/CA or slotted Aloha procedure. Only nodes may obtain contended s in RAP1, RAP2, and CAP, to send management or data type frames [7]. To send data type frames of the highest user priority based on CSMA/CA, a hub or node may treat the combined EAP1 and RAP1 as a single EAP1, and the combined EAP2 and RAP2 as a single EAP2, so as to allow continual invocation of CSMA/CA and improve channel utilization. To send data type frames of the highest user priority based on slotted Aloha, a hub or node may treat RAP1 as another EAP1 but not a continuation of EAP1, and RAP2 as another EAP2 but not a continuation of EAP2, due to the time slotted attribute of slotted Aloha. Figure 6 shows the WUSB over WBA architecture. Here, the IEEE WBA superframe begins with a beacon period (BP) in which the WBA hub performing the WUSB host s role sends the beacon. This beacon mode of the WBA is operated in both non-medical and medical traffic environments. The data transmission period in each superframe is divided into the exclusive phase 1 (EAP1), random phase 1 (RAP1), Type-I/II phase, EAP2, RAP2, Type-I/II phase, and contention phase (CAP) periods. The EAP1 and EAP2 periods are assigned through contention to data traffic with higher priorities. Further, the RAP1, RAP2, and CAP periods are assigned through contention to data traffic with lower priorities. In the Type-I/II phase periods, the WBA hub reserves time slots without contention to exchange data with its input-sensor nodes. Beacon Mode with Superframe B B2 EAP1 RAP1 Type-I/II phase EAP2 RAP2 Type-I/II phase CAP MS- CTA1 MS- CTAn MS- CTA1 MS- CTAm MS- CTA1 MS- CTAo WUSB Channel Transfers WBA IEEE Private Period WUSB Host s Beacon Control Transfer Isochronous/ Bulk Data Transfer Interrupt Transfer WUSB Host s Beacon ext ext ext Transaction Group 1 Transaction Group 2 Transaction Group n Figure 6. WUSB over WBA Architecture In the WUSB over WBA Architecture, in order to set up a wireless communication link to wearable computer systems, the WUSB channel is encapsulated within a WBA superframe via Type-I/II phase periods that enables the WUSB host and the input-sensor nodes to reserve time slots without contention through scheduling. In the user scenario of a wearable computer system when using the WUSB over WBA architecture, the user carries a portable or wearable computing host device. This host device performs roles of the WUSB host and the WBA hub simultaneously. Therefore, a wearable WUSB cluster and a WBA cluster are formed. The attached input-sensor nodes perform the functions of localization-based input interfaces for wearable computer systems and healthcare monitoring. Furthermore, the attached wireless nodes comprise the peripherals of a wearable computer system, and the central WUSB host exchanges data with the outer peripherals of the WUSB slave devices [4]. 6

7 4. Multi-Channel Beaconing for WUSB over WBA Architecture 4.1. Idle Listening for Beacon Collision Detection In this Section, we introduce a novel beacon collision avoidance algorithm which utilizes multiple channels through dynamic transition. And also, WUSB over WBA MAC on the same channel can be dynamically scheduled by overhearing each other. Therefore, we call this multi-channel beaconing (MCB). A beacon issued by a coordinator, periodically or by request, plays an important role in constructing a WBA and in synchronizing all of the devices in the network. Since all of the devices synchronized by the same beacon operate with the same period, they can make the promised duty cycle. As a result, the power saving function of 15.6 devices can be used. According to the IEEE standard, a duty cycle of less than 10% can be achieved. Due to the importance of issuing the beacon frames punctually, they have the highest priority in the network. Therefore, unlike in the case of normal data or control packets, carrier sensing or back-off algorithms are not used for beacons, except for their initial transmission. If there exists a WBA, the beacon transmission will be protected by other devices in the network. However, in reality, it is possible that a number of WBAs using IEEE15.6 coexist or are overlapped in the same area. In this case, since the standard does not provide any method of mutual information exchange, collisions may occur between the beacon frames that the different WBAs transmit. Therefore, it might result in unexpected network panic. Direct beacon frame collisions occur when two or more WUSB/WBA hosts are in the transmission range of each other (direct neighbors) and send their beacon frames at approximately the same time, as shown in Figure 7(a). Assume that WUSB/WBA slave node 1 is associated with C1 WUSB/WBA host. And C2 is a WUSB/WBA host of other wearable computer systems. In this case, if C1 and C2 transmit their beacon frame at the approximately same time, node 1 may lose beacon information by the collision of the two beacons. If the superframe duration of the two Systems is the same, beacons will be continuously conflicted. Unfortunately, these two hosts cannot identify the collision. In contrast to the direct beacon collision, Indirect beacon frame collisions occur when two or more WUSB/WBA hosts cannot hear each other, but they have overlapped transmission ranges (indirect neighbors) and transmit their beacon frames at the approximately same time, as shown in Figure 7(b). Assume that node 1, which is located in the overlapped region of both transmission ranges of C1 and C2, will not be able to correctly receive their beacon frames, since the beacons will collide each other. each WUSB/WBA host cannot listen to the other s beacon information. 1 C1 C2 C1 1 C2 C1 time C1 time C2 time C2 time (a) Direct beacon collision. (b) Indirect beacon collision. Figure 7. Direct and Indirect Beacon Frame Collision Problems 7

8 Core idea in the MCB is to scan other candidate channel during idle period, and then if a device identifies the beacon collision, the WUSB/WBA host re-associates with the slave device via the candidate channel, which is already verified to be clean, while original channel are used for other devices during active period. To allocate a new clean channel for beacon collision-free, a WUSB/WBA host has to know the status of other channel. Therefore, the WUSB/WBA host checks whether other device uses the channel. We newly define a (CCS) clean channel searching scan for searching a new candidate channel. Since no mechanism to avoid beacon frame collisions is considered in the current IEEE standard, some proposals have been discussed in Task Group These approaches were proposed as pattern ideas to trigger the design of solutions to the beacon frame collision problem. Two approaches were proposed to avoid the direct beacon frame collision problem [7]. The first approach is the time division approach. Time is divided such that beacon frames and the superframe duration of a given WBA coordinator are scheduled during the inactive period of its neighbor coordinators. The idea is that each coordinator uses a starting time Beacon_Tx_Offset to transmit its beacon frames, which must be different from the starting times of its neighbor coordinators and their parents. This approach requires that a coordinator wakes up both in its active period and in its parent s active period. Observe that Beacon_Tx_Offset must be chosen adequately, not only to avoid beacon frame collisions, but also to enable efficient utilization of inactive periods, thus maximizing the number of clusters in the same network. This problem is more challenging when the superframe orders and beacon orders are different from one cluster to another. The second approach is the beacon-only period approach. In this approach, a time window, denoted as Beacon-Only Period, is reserved at the beginning of each superframe for the transmission of beacon frames in a contention-free fashion. Each coordinator chooses a sending time offset by selecting a contention-free time slot (CFTS) such that its beacon frame does not collide with beacon frames sent by its neighbors. The advantage of this approach as compared to the previous one is that the active periods of the different clusters start at the same time, thus direct communication between neighbor nodes is possible, and there is no constraint on the duty-cycle. The main complexity of this approach is the dimensioning of the duration of the beacon-only period for a given network topology. This duration depends on the number of nodes in the network, their parent-child relationship and also the scheduling mechanism used to allocate the CFTS to each coordinator. Additionally, the GTS mechanism cannot be implemented (at least in accordance to the specification), since transmission from nodes belonging to different clusters may collide. Thus, transmissions are only allowed during the CAP, which will be shared by different clusters. Importantly, oppositely to the time division approach, the beacon-only period approach implies a non-negligible change to the standard protocol. The problem of indirect beacon frame collisions is more complex than the one of direct beacon frame collisions. There is a need to not only know the neighbor coordinators, but also all other coordinators that are two hops away. Two alternatives were proposed by the Task Group 15.6 [7]. In the reactive approach, a coordinator does not carry any specific procedure to avoid indirect beacon frame collision during the association with its parent. Once a beacon frame conflict is detected by a given node, it initiates a recovery procedure to resolve the problem, which may take a long time. In the proactive approach, coordinators try to 8

9 avoid the indirect beacon frame conflict at the association phase by the collection of specific data about beacon frame transmission times of their neighbors. In this approach, each potential coordinator must have the ability to forward the beacon frame time offset of its parent to its neighbor WBA coordinators. This approach is more complex than the reactive approach, but it completely avoids beacon frame collisions during network run-time. The approaches proposed by the Task Group 15.6 show how to extend the standard to take beacon frame scheduling into account, but how to choose the time offsets of different beacons is not addressed. Moreover, these approaches only focus on how to avoid conflicts between beacons. Collisions between beacon frames and data frames may also occur, because while the time of beacon transmissions was considered, the superframe duration of other WBAs was not. In addition, if a beacon frame and a data frame collide again after adjusting the time of the beacon transmission, the WBA coordinator (PC) has to adjust the transmission time of the beacon frame again [7]. Originally, MAC sub-layer shall discard all frames received over the PHY data service excluding beacon frame. However, MCB hears all of the frames on the candidate channel during clean channel searching scan. The WUSB/WBA host can know the existence of other systems indirectly by analyzing data frame received during the scan. Figure 8 presents idle channel listening of MCB. A WUSB/WBA host has Active and Inactive periods which are used to make a duty cycle of devices. MCB performs the CCS scan repetitively during the inactive period. If a device notifies the beacon collision in the next Active period, the WUSB/WBA host commands the channel change into the candidate channel in the next Inactive period. WUSB / WBA Host WUSB / WBA Host Figure 8. Idle Channel Listening of MCB 4.2. Adaptive Channel Switching for Fast Recovery WUSB / WBA Host WUSB / WBA Host Figure 9. Channel Switching Operation of MCB 9

10 Figure 9 illustrates the operation of MCB. In Figure 9, it is assumed that the physical deployment is indirect collision environment in Figure 7(b). Let s assume that device 1 has been associated to WUSB/WBA host 1 (WH1). The beacon of WH1 is equal to the beacon of WH2. WH1 operates normally on channel X in the active period and know that it can allocate superframe on channel Y, through CCS scanning on channel Y during its inactive period. In MCB, a WUSB/WBA slave device can detect a beacon conflict and the WUSB/WBA host recovers the device fast from the collision. The device 1 (D1) in the overlapped region of the transmission ranges of WH1 and WH2 cannot receive a beacon frame. If the number of beacon frames that D1 loses consecutively is more than amaxlostbeacons (default value is 5), D1 performs an orphan scan. The WH1 that has received this orphan notification command frame sends the host realignment command frame. However, two beacons collide again because a beacon of WH1 is equal to a beacon of WH2. Therefore, D1 cannot receive the beacon frame that WH1 transmitted. If the status of D1 is orphan and the number of lost beacon frames is more than amaxlostbeacons again, D1 concludes the status of beacon conflict and sends a beacon conflict notification command frame using CSMA/CA. WH1 that has received the beacon conflict notification command frame sends D1 channel switching command frame. The channel switching command frame contains a clean channel Y and time offset equal to the difference between the original beacon transmission time and the transmission time of new beacon frame. WH1 switches its channel to the channel Y and transmits its beacon frame. After receiving a beacon frame that WH1 transmits on channel Y, D1 can communicates normally with WH1. Initial WUSB/WBA Construction Sending a WBA beacon frame Collision detection Yes o Clear channel searching scan during inactive period Recovery procedure Figure 10. Flow Chart of WUSB/WBA Host using MCB 5. Performance Evaluation We used WUSB/WBA S2 simulator developed in the environment where indirect beacon collision happens [8-13]. Table 1 shows WBA PHY/MAC simulation parameters used in this paper; the network size is 10m*10m; the maximum 30 devices are randomly deployed into this area. Each WUSB/WBA slave device transmits data randomly when receiving a beacon frame. In this simulation, the beacon order of each device and host is equal to 4 an d the superframe order (SO) is equal to 1. To evaluate the performance, we use re-associated ratio equal to number of recovered beacons over number of lost beacons. In Figure 11(a), we present the re-associated ratio versus the number of adjacent WUSB/WBA hosts. Simulation results show that the re-associated ratio is more than 84% irrespective 10

11 Average Recovery Time (ms) Reassociated ratio (%) International Journal of Software Engineering and Its Applications of the number of adjacent hosts. In Figure 11(b), we show the average recovery time after a device detects beacon collision. The average recovery time is related to the SO because WUSB/WBA host using MCB transmits new beacon frame for the device detecting beacon collision, on the new clean channel in the inactive period. Table 1. WBA PHY/MAC Parameters Parameter Value LPreamble 64 bits LPHY_Hdr 15 bits LMAC_Hdr 56 bits LFCS 16 bits pmifs 20 μs psifs 75 μs pallocationslotmin 16 μs pallocationslotresolution 16 μs pallocationslotlength 32 μs msuperframelength 256 psuperframelength msuperframelength*pallocati onslotlength mbeaconslotlength 96 μs mbpextention 24 μs mbeacon2slotlength 80 μs mb2pextention 24 μs umber of adjacent WUSB/WBA Hosts (a) Re-associated ratio SO = 1 SO = umber of adjacent WUSB/WBA Hosts (b) Average Recovery Time. Figure 11. Re-associated Ratio and Average Recovery Time Performances of MCB 11

12 6. Conclusion In this paper, an IEEE wireless body area networks (WBA) medium control protocol is developed to support a wireless USB (WUSB) application as a protocol adaptation layer (PAL). Further, we propose multi-channel beaconing (MCB) method in order to solve beacon conflict problem in the environment of WUSB over WBA. MCB reduces recovery time after a beacon collision happens through scanning an available channel during the inactive period. The simulation results show that MCB can solve indirect beacon conflict problem efficiently irrespective of the number of adjacent WUSB/WBA hosts. Acknowledgements This work was supported in part by Basic Science Research Program through the ational Research Foundation of Korea (RF) funded by the Ministry of Education, Science and Technology (MEST) ( ) and in part by Mid-career Researcher Program through RF grant funded by the MEST ( ). This paper is a revised and expanded version of a paper entitled Adaptive Fast Recovery Technique for Avoidance of Beacon Collision in WUSB over WBA Protocol for Wearable Computer Systems presented at Advanced Information Technology and Sensor Application, Daejun, Korea, , References [1] R. Rosenberg and M. Slater, The Chording Glove: A Glove-Based Text Input Device, IEEE Transaction on Systems, Man, and Cybernetics-Part C: Applications and Review, vol. 29, no. 2, (2009). [2] USB 2.0, USB-IF, [3] WiMedia Alliance, [4] Certified Wireless USB 1.1, USB-IF (2010), [5] WiMedia MAC Release Spec. 1.5, Distributed Medium Access Control (MAC) for Wireless etworks, WiMedia Alliance, (2009). [6] K.-I. Kim, Adjusting Transmission Power for Real-Time Communications in Wireless Sensor etworks, Journal of Information and Communication Convergence Engineering, vol. 10, no. 1, (2012). [7] IEEE WPA Task Group 6 Body Area etworks (BA), IEEE, (2010). [8] A. Varga, The OMeT++ Discrete Event Simulation System, Proceedings of European Simulation Multiconference (ESM 2001), (2001). [9] S.-R. Kim, D.-Y. Lee and C.-W. Lee, An Adaptive MAC Scheduling Algorithm for Guaranteed QoS in IEEE e HCCA, International Journal of Future Generation Communication and etworking, vol. 1, no. 1, (2008). [10] A. andi and S. Kundu, Energy Level Performance of Packet Delivery Schemes in Wireless Sensor etworks over Fading Channels, International Journal of Future Generation Communication and etworking, vol. 4, no. 2, (2011). [11]. Karthikeyan, V. Palanisamy and K. Duraiswamy, Performance Comparison of Broadcasting methods in Mobile Ad Hoc etwork, International Journal of Future Generation Communication and etworking, vol. 2, no. 2, (2009). [12] V. Cuong guyen, V. Thuan Pham and B.-K. Moon, A ew Energy Saving Mechanism in IEEE e/m, International Journal of Energy, Information and Communications, vol. 2, no. 4, (2011). [13] R. Palit, A. Singh and K. aik, An Architecture for Enhancing Capability and Energy Efficiency of Wireless Handheld Devices, International Journal of Energy, Information and Communications, vol. 2, no. 4, (2011). 12

13 Authors Kyeong Hur he is currently an Associate Professor in the Department of Computer Education at Gyeongin ational University of Education, Republic of Korea. He was senior researcher with Samsung Advanced Institute of Technology (SAIT), Korea from September 2004 to August He received a M.S. and Ph.D. in Department of Electronics and Computer Engineering from Korea University, Seoul, Korea, in 2000 and 2004, respectively. His research interests include; computer network designs, next generation Internet, Internet QoS, and future All-IP networks. Won-Sung Sohn he received the B.S. and M.S. degrees in Department of Computer Engineering from Dongguk University in 1998 and 2000 and the Ph.D degree in Department of Computer Science from Yonsei University in From 2004 to 2006 he was a postdoctoral associate in the Computational Design Laboratory at Carnegie Mellon University. He is currently a professor at Department of Computer Education, Gyeongin ational University of Education. His research interests include educational design research, human-computer interaction and computer education. Jae-Kyung Kim he received the B.S. degree in Statistical Computing/Chemistry from Dankook University in 2000 and the M.S, and Ph.D degrees in Computer Science from Yonsei University in 2002 and He is currently a researcher at Smart Education Research Center at Gyeongin ational University of Education. His research interests include smart education, human-computer interaction, annotation, and electronic textbooks. YangSun Lee he received his B.S., M.S. and ph.d degrees in Department of Computer Engineering from Dongguk University, He is currently a professor at Department of Computer Engineering, Seokyeong University. He is also a member of board of directors of Smart Developer Association, Korea Multimedia Society and Korea Information Processing Society. His research interests include smart system solutions, programming languages, and embedded systems. 13

14 14

A Hierarchical Power-saving Method of WUSB over WBAN

A Hierarchical Power-saving Method of WUSB over WBAN A Hierarchical Power-saving Method of WUSB over WBAN Kyeong Hur 1, Won-Sung Sohn 1 *, Jae-Kyung Kim 1 and YangSun Lee 2 1* Dept. of Computer Education, Gyeongin National University of Education, Gyesan-

More information

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building Radio Networks riccardo.cavallari@unibo.it +39 051 20 93180 Office: 3 rd floor, Main Building 1 Wireless Body Area Networks (WBAN) and IEEE 802.15.6 Standard 2 Outline 1. Introduction Definitions and Application

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks. Wireless Body Area Networks WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks www.wiserban.eu Wireless Body Area Networks (WBANs) WBAN: Collection of nodes placed on, or inside,

More information

Certified Wireless USB Protocol Dan Froelich

Certified Wireless USB Protocol Dan Froelich Certified Wireless USB Protocol Dan Froelich Intel Corporation Content also provided by: John S. Howard, Intel Corporation Agenda Protocol Components Data Transfers (general model) Device Notifications

More information

Wireless USB Architecture Overview Brad Hosler. Intel Corporation

Wireless USB Architecture Overview Brad Hosler. Intel Corporation Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance environment Intellectual Property Industry Enabling

More information

High-Speed WUSB Technology Based on WiMedia.

High-Speed WUSB Technology Based on WiMedia. High-Speed WUSB Technology Based on WiMedia ysnam@dongguk.ac.kr KRnet 2006 Contents I. MBOA/Wimedia/WUSB II. Wireless USB Specification III. WUSB Development Systems IV. Conclusions KRnet 2006 I. MBOA

More information

Application of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks

Application of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks , pp.60-64 http://dx.doi.org/10.14257/astl.2015.108.14 Application of Fuzzy Logic Control to Dynamic Channel Allocation of WiMedia UWB Networks Dong-Keun Jeon 1, Yeonwoo Lee *2 1 Dept. of Mechatronics,

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs) Title: [Olympus MAC Proposal] Date Submitted: [May 2009] Source: [Gang Ding] Company [Olympus Communication Technology

More information

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved.

WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput. January All Rights Reserved. WiMedia Ultra-wideband: Efficiency Considerations of the Effects of Protocol Overhead on Data Throughput January 2009. All Rights Reserved. Contributed by WiMedia member company Abstract Today s wireless

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs) Title: [Olympus MAC Proposal] Date Submitted: [May 2009] Source: [Gang Ding] Company [Olympus Communication Technology

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications

2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications 2L-MAC: A MAC Protocol with Two-Layer Interference Mitigation in Wireless Body Area Networks for Medical Applications Guan-Tsang Chen, Wen-Tsuen Chen, and Shan-Hsiang Shen Department of Computer Science,

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

WiMedia Media Access Control (MAC) Dan Froelich

WiMedia Media Access Control (MAC) Dan Froelich WiMedia Media Access Control (MAC) Dan Froelich Intel Corporation Content also provided by: Kris Flemming, Intel Corporation Agenda Key Messages Relationship of Certified Wireless USB and other WiMedia

More information

An Emergency Handling Scheme for Superframe-structured MAC protocols in WBAN

An Emergency Handling Scheme for Superframe-structured MAC protocols in WBAN An Emergency Handling Scheme for Superframe-structured MAC protocols in WBAN BeomSeok Kim and Jinsung Cho Dept. of Computer Engineering Kyung Hee University Youngin 446-701, Korea {passion0822, chojs}@khu.ac.kr

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment

A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment , pp.93-98 http://dx.doi.org/10.14257/astl.2015.108.20 A study on MAC protocol for urgent data transmission in Wireless Bio Signal Monitoring Environment Rae Hyeon Kim, Pyung Soo Kim, Jeong Gon Kim 1 Department

More information

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security

WIRELESS LAN/PAN/BAN. Objectives: Readings: 1) Understanding the basic operations of WLANs. 2) WLAN security Objectives: 1) Understanding the basic operations of WLANs 2) WLAN security 3) Wireless body area networks (IEEE 802.15.6) Readings: 1. Kurose & Ross, Computer Networking: A Top-Down Approach (6th Edition),

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

A Coexistence Mitigation Scheme for IEEE based WBAN

A Coexistence Mitigation Scheme for IEEE based WBAN Thesis for the Degree of Master of Science A Coexistence Mitigation Scheme for IEEE 802.15.4 based WBAN Jonghyeon Choi Department of Computer Engineering Graduate School Kyung Hee University Seoul, Korea

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [A MAC proposal for LECIM] Date Submitted: [September, 2011] Source: [Kyungsup Kwak, Jaedoo Huh*, M. Al Ameen, Niamat

More information

Wireless USB Protocol John S. Howard. Senior Architect Intel Corporation

Wireless USB Protocol John S. Howard. Senior Architect Intel Corporation Wireless USB Protocol John S. Howard Senior Architect Intel Corporation Agenda Protocol Components Data Transfers (general model) Device Notifications Flow Control 2 Wireless USB Channel Review Beacon

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

Multichannel MAC for Energy Efficient Home Area Networks

Multichannel MAC for Energy Efficient Home Area Networks 1st International Workshop on GReen Optimized Wireless Networks (GROWN'13) Multichannel MAC for Energy Efficient Home Area Networks Kok Keong Chai, Shihab Jimaa, Yun Li, Yue Chen, and Siying Wang Abstract

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless USB Periodic Transfer Models. Dan Froelich Intel

Wireless USB Periodic Transfer Models. Dan Froelich Intel Wireless USB Periodic Transfer Models Dan Froelich Intel Agenda Wired Isochronous Model Overview Key Features Wireless Media Reliability Coexistence (Shared With Other Hosts And UWB Devices) Wireless USB

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Developers Conference 2006 Taipei, Taiwan

Developers Conference 2006 Taipei, Taiwan Developers Conference 2006 Taipei, Taiwan Certified Wireless USB Architecture Overview Brad Hosler Intel Corporation Agenda Devcon goals Radio environment (common platform) High level architecture Compliance

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Certified Wireless USB Compliance

Certified Wireless USB Compliance Certified Wireless USB Compliance Dan Froelich Staff Architect/Engineer Intel Corporation Agenda Compliance Program Goals Compliance Process Compliance Devices Test Areas WiMedia WiMedia Mac WiMedia Coexistence

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks

Channel Adaptive ACK Mechanism in IEEE Wireless Personal Area Networks Channel Adaptive ACK Mechanism in IEEE 802.15.3 Wireless Personal Area Networks Jong-In Lee 28 August 2008 Broadband Communication Laboratory Korea University FISC 2008 Outline Introduction System model

More information

Topic 02: IEEE

Topic 02: IEEE Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

IEEE SENSORS JOURNAL, VOL. 17, NO. 21, NOVEMBER 1,

IEEE SENSORS JOURNAL, VOL. 17, NO. 21, NOVEMBER 1, IEEE SENSORS JOURNAL, VOL. 17, NO. 21, NOVEMBER 1, 2017 7189 A Hybrid Channel Access Scheme for Coexistence Mitigation in IEEE 802.15.4-Based WBAN Beomseok Kim, Jong-Hyeon Choi, and Jinsung Cho, Member,

More information

Design Considerations for Self-Beaconing & Dual-Role Devices S. Aravindhan Synopsys, Inc. Content also provided by: Matthew Myers, Synopsys, Inc.

Design Considerations for Self-Beaconing & Dual-Role Devices S. Aravindhan Synopsys, Inc. Content also provided by: Matthew Myers, Synopsys, Inc. Design Considerations for Self-Beaconing & Dual-Role Devices S. Aravindhan Synopsys, Inc. Content also provided by: Matthew Myers, Synopsys, Inc. Agenda Self-Beaconing Devices Un-tethered from the host

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Performance Evaluation of IEEE for Mobile Sensor Network

Performance Evaluation of IEEE for Mobile Sensor Network Research Online ECU Publications Pre. 2011 2008 Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network Kartinah Zen Daryoush Habibi Alexander Rassau Iftekhar Ahmad 10.1109/WOCN.2008.4542536

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

MAC PROTOCOL IN WIRELESS BODY AREA NETWORKS FOR E-HEALTH: CHALLENGES AND A CONTEXT-AWARE DESIGN

MAC PROTOCOL IN WIRELESS BODY AREA NETWORKS FOR E-HEALTH: CHALLENGES AND A CONTEXT-AWARE DESIGN WIRELESS C OMMUNICATIONS FOR E-HEALTH APPLICATIONS MAC PROTOCOL IN WIRELESS BODY AREA NETWORKS FOR E-HEALTH: CHALLENGES AND A CONTEXT-AWARE DESIGN BIN LIU AND ZHISHENG YAN, UNIVERSITY OF SCIENCE AND TECHNOLOGY

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok

More information

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract

More information

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview

Certified Wireless Network Administrator (CWNA) PW Chapter Medium Access. Chapter 8 Overview Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 8 802.11 Medium Access Chapter 8 Overview CSMA/CA vs. CSMA/CD Distributed Coordination Function (DCF) Point Coordination Function (PCF) Hybrid

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

Interference Mitigation Schemes for Coexistence Problem in Wireless Body Area Networks

Interference Mitigation Schemes for Coexistence Problem in Wireless Body Area Networks Thesis for the Degree of Doctor of Philosophy Interference Mitigation Schemes for Coexistence Problem in Wireless Body Area Networks BeomSeok Kim Department of Computer Engineering Graduate School Kyung

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs

Fairness Enhancement Scheme for Multimedia Applications in IEEE e Wireless LANs Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs Young-Woo Nam, Sunmyeng Kim, and Si-Gwan Kim Department of Computer Software Engineering Kumoh National Institute of

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Design and Performance of Contention Based MAC Protocols in WBAN for Medical ICT Using IR-UWB

Design and Performance of Contention Based MAC Protocols in WBAN for Medical ICT Using IR-UWB IEEE PIMRC 2010 International Workshop on Body Area Networks- Enabling Technologies for Wearable and Implantable Body Sensors, Istanbul Design and Performance of Contention Based MAC Protocols in WBAN

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information