Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks

Size: px
Start display at page:

Download "Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks"

Transcription

1 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks XinMing Zhang, Guoqing Qiu, Zhilong Dai School of Computer Science and Technology University of Science and Technology of China Hefei, P.R.China Dan Keun Sung Department of Electrical Engineering Korea Advanced Institute of Science and Technology Daejeon, Korea Abstract Carrier sensing schemes have been recognized as a key knob for improving network performance. The distributed coordination function (DCF) and its modifications focus on the feature of the ongoing transmission links to enhance link throughput, however, a lack of coordinated adjustment of the surrounding nodes may reduce the aggregate throughput of entire network. In this paper, we are concerned with the delayed transmissions from exposed terminals, and interference and collisions from hidden terminals. We classify the neighboring areas for a given transmission link into three areas: a hidden area, an exposed area and an overlapped area, and then propose a coordinated dynamic physical carrier sense (CDPCS) scheme in which the carrier sensing threshold (CST) values of the neighbors are adjusted at the same time to achieve local optimization by utilizing the exchanged information and states of neighboring nodes. Simulation results show that the proposed schemes can work effectively. I. INTRODUCTION In wireless multi-hop ad hoc networks, IEEE DCF has been widely adopted as a main medium access control (MAC) protocol. The DCF protocol utilizes carrier sensing to detect the status of the medium and determines either to transmit or to defer transmission to mittigate a collision problem. There are two type of carrier sensing: physical carrier sensing (PCS) and virtual carrier sensing (VCS). A node can initiate a transmission if it senses the signal strength below a given carrier sensing threshold (CS th ) value in the PCS [1], while it exchanges request-to-send (RTS) and clear-to-send (CTS) frames and sets its network allocation vector (NAV) to the duration of a successful transmission in the VCS, which has been included in the IEEE standard. Many studies [1] [4] focused on spatial reuse in the PCS environment, which coordinate concurrent transmission nodes in different collision domains in order to improve channel utilization and network throughput. These studies showed that there is a trade-off among carrier sensing range, throughput, and the hidden/exposed node problems. Both hidden nodes and exposed nodes affect the network performance This work was supported in part by the National Natural Science Foundation of China under Grant No & No & No [5]. Conventional RTS/CTS schemes which effectively set the receive range to the data transmission range can partly eliminate the hidden terminal and exposed terminal problems in transmission range. But the node outside the transmission range may cause interference to the receiver, which is called the extended hidden-terminal problem [6]. In order to solve the interference problems, we can extend the RTS/CTS reception range. However, the extended RTS/CTS transmission range can also cause to reduce the number of concurrent transmissions while increasing the number of exposed terminals, therefore, the conventional RTS/CTS schemes have a shortage in solving the interference problems. In many cases, transmission nodes block the transmission of the surrounding neighbor nodes even though the blocked nodes would not induce sufficient interference to corrupt its reception at the receiver. These problems are mainly attributed to an inherent property that the DCF mechanisms excessively pay attention to the ongoing transmission between the sender and receiver. In this paper, the initial motivation of our proposed scheme is as follows: the nodes which are around the transmission link, such as hidden nodes and exposed nodes, acquire the information and states of transmission nodes by the exchange of simplified RTS/CTS (SRTS/SCTS) control frames in which the transmission power is enough to let interference nodes to correctly receive and decode RTS/CTS signal, and then adjust their carrier sensing threshold values accordingly. Meanwhile, the proposed coordinated dynamic physical carrier sense (CDPCS) scheme employs different carrier sensing threshold values for different location areas: hidden node area, exposed node area and overlapped node area. Each node adjusts its CS th according to the optimization of the performance of local network around transmission links and can improve the overall network performance. II. RELATED WORK Most of previous studies on carrier sensing problems focused on the spatial reuse improvement of networks [2], [4], [7] [9]. Kim et al. [2] showed that the spatial reuse depends only on the ratio of the transmit power to the carrier sensing /13/$ IEEE 398

2 threshold while only a set of discrete data rates are available and mentioned that there exists a tradeoff between the level of spatial reuse and the data rate that can be sustained by each transmission. Ma et al. [7], Wong et al. [10] and Deng et al. [11] argued that the carrier sensing threshold is a tunable parameter that can significantly affect the MAC performance. Besides numerical analysis, Ma et al. [12] and Zhu et al. [13] proposed centralized heuristic algorithms for adjusting the carrier sensing threshold based on the network performance, which can not be implemented in distributed ad hoc networks. Park et al. [14], Ven et al. [1] and Zhu et al. [3] proposed distributed adaptive schemes to dynamically adjust the CS th value to eliminate the likelihood of collisions from hidden terminals in order to enhance spatial reuse. However, these schemes did not consider the delay problems of exposed nodes, and also did not distinguish the nodes located within different areas, such as the sensing area and the interference area. It has been a hot technical issue to solve the hidden and exposed terminal problems in wireless ad hoc networks. However, a simple RTS/CTS mechanism is not sufficient enough to resolve these problems completely. A tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes) was investigated in [5]. Alawieh et al. [4] showed that selecting a small carrier sensing threshold value would severely impact the spatial reuse, whereas setting a large CS th value would cause excessive interference among concurrent transmissions. Nadeem et al. [8] incorporated location information in DCF frame (RTS/CTS) exchange sequences so that stations sharing the communication channel are able to make better interference predictions and blocking channel access. In [14], the sender exploits such correlation using an automated on line learning algorithm and makes a decision about the channel availability at the intended receiver. There have been other approaches to increase the number of concurrent transmissions in networks. Ye et al. [9] suggested to change the timing of the steps within the synchronized states among one-hop area neighbors and RTS-CTS-DATA- ACK frame sequence. Acharya et al [16] observed that, in an overactive RTS-CTS situation where the RTS-CTS exchange affects more surrounding stations than needed. Yang et al. [17] proposed a spatial backoff algorithm to adjust the channel contention level, but this algorithm is operated when a collision occurs or a transmission fails. III. LOCAL OPTIMIZATION OF CARRIER SENSING WITH COORDINATION A. Transmission Area Analysis The hidden and exposed terminal problems can not be resolved completely in recent carrier sensing schemes [1], [3] because of a lack of consideration about the delay problem of exposed nodes. The nodes located within different node areas such as hidden, exposed, and overlapped areas should be distinguished and analyzed to employ different carrier sensing adjusting strategies to meet different node states. Thus, we first divide the nodes into three different node areas, and then analyze the feature of nodes in each region. Fig. 1 shows three different node areas in a local transmission area. Here, node A starts its transmission to node B in the beginning, while node C can not sense the ongoing transmission between node A and node B because node C is outside of node A s sensing range. In this case, node C senses the channel idle and naturally initiates its own transmission causing to interfere with the transmission of node A. In fact, node C does not know that its transmission corrupted the transmission from node A, and the region where node C is located is called the hidden area. Node D is an exposed node. After node A starts transmission to node B, node D detects the activity of node A and then blocks its own transmission. Unfortunately, the transmission of node D does not corrupt the current transmission because receiver B does not receive interference from node D. This exposed problem causes unnecessary delay, and the region where node D is located is called the exposed area. The overlapped node area refers to the overlap node area of the sensing range of a transmitter, such as node A, and the interference range of a receiver, such as node B. For example, node E is in the overlapped node area. The nodes located in the overlapped node area are close to the transmission link and mitigate the contention from a sender by tuning the CS th, and also can mitigate the conflict from a receiver by sensing the interference range. Fig. 1. Three different areas in a local transmission area B. Carrier Sensing Tuning Strategy based on Local Optimization Based on the above problems, the conventional PCS schemes have the following two disadvantages: lack of coordinated carrier sensing tuning in surrounding nodes and a lack of different adjustment in different node areas. We propose a new carrier sensing tuning strategy based on local optimization to solve the above problems. 1) SRTS-SCTS exchange In order to achieve local optimization in a distributed network, surrounding nodes need to exchange some information and states, such as transmission distance, transmission power and interference range, and then obtain the optimal carrier sensing threshold to cooperate the local network carrier sensing scheme. For the minimal overhead of information exchange, we use simplified RTS/CTS control frames, called SRTS/SCTS, to carry the exchanged information and states of nodes. 399

3 SRTS/SCTS control frames cancel the NAV scheme used in the conventional RTS/CTS exchange scheme, and nodes which receive SRTS/SCTS frames only read the carried information without blocking its transmission. Fig. 2 shows the sequence diagram of SRTS-SCTS exchange. The sender node first sends an SRTS frame which delivers the information to surrounding neighbors, and then the surrounding nodes receive the SRTS frame and save the received information. The intended destination of the SRTS frame replies an SCTS frame to the sender and broadcasts the SCTS to the surrounding neighbors. After receiving the control frames and reading the carried information, the nodes set their carrier sensing thresholds by an appropriate scheme. Through the exchange of SRTS/SCTS control frames, the nodes around the transmission link can be aware of the information and states of the current transmission. Fig. 2. Sequence diagram of exchanging SRTS-SCTS frames In order to achieve the goal of local network optimization, each node needs to collect the information of all on-going neighboring transmissions. Each node maintains two data structures of vector type: V-SRTS and V-SCTS, which store the calculated carrier sensing threshold values from the control frames, and then deletes the corresponding record value after the transmission is finished. Vector V-SRTS and V-SCTS consist of < I, d > and < I, d >, respectively where I is the index of SRTS and SCTS frames and d is the calculated carrier sensing range value. After receiving the control frames, the node determines the located node area, which includes the overlapped area, hidden node area and exposed node area, under the stored vector V-SRTS and V-SCTS. The node in the overlapped area has a record of a pair of transmission (node i, j) in V-SRTS and V-SCTS, respectively. The node in the hidden node area has a record in vector V-SCTS, while the node in the exposed area has a record in vector V- SRTS. Generally, each node may be located in different node area at the same time, and the carrier sensing tuning strategy needs to be selected according to the priority of each area. The overlapped node area has the highest priority, and a less priority is assigned in hidden nodes, and the exposed area has the lowest priority. The strategies to determine the located node areas is presented in Algorithm 1. Based on the decisions of Algorithm 1, we can have a different carrier sensing tuning strategy according to the distinguishing features in different node areas. 2) Carrier sensing tuning strategy in different node areas Each node calculates the carrier sensing threshold according Algorithm 1 The Strategy to Determine the Located Areas 1: After Receiving SRTS/SCTS Frame 2: if V-SRTS< i > in V-SRTS corresponding V-SCTS< j > in V-SCTS then 3: Node is in Overlapped node Area of transmission i to j; 4: else { V-SCTS is not NULL } 5: Node is in Hidden node Area; 6: else { V-SCTS is NULL AND V-SRTS is not NULL } 7: Node is in Exposed node Area; 8: else 9: No Transmissions around; 10: end if to the V-SRTS and V-SCTS. In the overlapped area, nodes are close to transmission link, and, thus, they adjust the carrier sensing threshold value only to sense the transmission of the sender, and the carrier sensing range is quite small, which corresponds to a large threshold value in order to improve the spatial reuse level. The nodes in the hidden node area should sense the transmission of the sender, and then the carrier sensing range is set to a large value to mitigate interference. For improving the number of concurrent transmissions, a small carrier sensing range is set so that nodes in the exposed node area are encouraged to transmit their frames. The final carrier sensing range is obtained based on the following equation: r cs = min{max{d in V SRT S}, r max } when in the overlapped node area min{max{d in V SCT S}, r max } when in the hidden node area max{min{d in V SRT S}, r min } when in the exposed node area where r max and r min is the maximum and minimum bounds of carrier sensing range in order to ensure the safety of adjustment, respectively. IV. PROPOSED ALGORITHM Based on the above analysis, we propose a new scheme called a coordinated dynamic physical carrier sensing (CD- PCS) scheme. In this section, we introduce our underlying concept of this proposed scheme and also present it in pseudocode. A. Coordinated Dynamic Physical Carrier Sensing (CDPCS) Scheme The proposed CDPCS scheme mainly includes three parts: exchange of SRTS/SCTS control frames, determination of located node area and carrier sensing threshold tuning. The first two parts was presented in the previous section, and then the last part focuses on the dynamic carrier sensing tuning after receiving SRTS or SCTS frame for coordination. In wireless ad hoc networks, the signal P r received at the receiver is a decreasing function of the distance d. Let P s be the transmit power of the sender, and θ is the path-loss (1) 400

4 exponent, ranging from two (line-of-sight free space) to four (indoor) [18], then P r is: P r = P s d(s, r) θ. (2) When node D receives an SRTS frame from other node, e.g. node A, node D is able to calculate the distance (d AD ) to node A as follows: d A,D = ( P t,a P r,d ) 1 θ, (3) where θ is the path-loss exponent, and we typically choose 3 in our scheme. P t,a is the transmit power of node A and P r,d is the received signal strength of node D. Node D saves the d A,D into the V-SRTS as V-SRTS< I, d >, where, I is the index of transmitter and d is the d A,D. Node D calculates the new CS th value based on d A,D to compare with the CS th value of D. If the new CS th value is larger and D does not receive any SCTS, the new CS th value is set to encourage its transmission. After receiving the SCTS frame, node B is able to calculate d AB by using Eq. 3. Secondly, the receiver (node B) calculates its interference range: d B,I = ( P t,a P t,a ) 1 θ, (4) ς d θ data N B AB where ς data represents the SINR threshold for data frames. N B is the current threshold of noise measured at node B. Next, node B obtains the necessary information about the transmitter A (such as d A,B and d B,I ) from the SRTS frame. In order to enforce the interfering nodes of receiver B to defer their transmission, an SCTS frame, including d A,D and d B,I, is sent to make sure that all neighboring nodes in node B s interference range receive the SCTS frame. Thus, the transmit power of node B should be set to be large enough to transfer the SCTS frames availably. Some nodes outside of the interference range of node B still receive the SCTS frames. Accordingly, node C calculates the d B,C, and then compares the d B,C with the value of d B,I in the received SCTS frame. If d B,C is larger than d B,I, node C does not to adjust the CS th value and discards the SCTS frames. Otherwise, node C detects its location in the interference, and adjusts its CS th value to ensure that its carrier sensing range includes node A. Now, we obtain the following inequality: d c,c = d A,C d A,B + d B,C, where d c,c denotes the carrier sensing range of node C; the minimum carrier sensing range is d c,c = d A,B + d B,C, and the minimum carrier sense range corresponds to the maximum CS th, η max,c. If the CS th value is lower than the η max,c, it limits its threshold. If the CS th value is higher than the η max,c, node C can not sense the receiver B. Thus, the minimum carrier sensing range is equal to the silence range of node A. The maximum carrier sensing threshold is calculated as follows: P η max,c = (d A,B + d B,C ) 3. (5) In multi-hop networks, a node may receive many SRTS frames from more than one pair of nodes. The maximum carrier sensing node of all neighboring node pairs is η max,c = min{ P (d }. i cs B. Algorithm )3 Each node maintains two vectors: V-SRTS< I, d i CS > and V-SCTS< I, d i CS >. When node I receives a control frame, the CDPCS scheme starts as in Algorithm 2. Lines 2 to 10 represent the processing for SRTS and SCTS control frames. After receiving the SRTS frame, the node stores the distance between the sender and receiver from the SRTS frame as d A,D in vector V-SRTS. When the node receives the SCTS frame, the distance of interference link, d B,I, adding the distance of transmission link, d A,B, is stored in V-SCTS. When receiving an ACK frame, it means that the data transmission has finished, and the transmission records in vectors should be deleted, and then the algorithm jumps to line 11. Lines 11 to 17 represent the processing of carrier sensing range (r cs ) selection. If the vector V-SRTS and V-SCTS in a node stores the record of a pair of SRTS and SCTS transmission, which indicates that the node is located in the overlapped node area of a link, the maximum d cs in V-SRTS is selected as the carrier sensing range. If the V-SCTS is not null, which means that the node is located in a hidden node area, the maximum d cs in the V-SCTS is selected as the carrier sensing range in order to mitigate the interference from hidden nodes. If the V-SRTS is null and V-SCTS is not null, which means that the node is located in an exposed node area, the minimum d cs in V-SRTS is selected as the carrier sensing range to decrease the delayed concurrent transmissions. In order to guarantee the safety of carrier sensing range adjustment during the processing of signal reception and numerical calculation, we utilize the r max and r min as the boundary of carrier sensing range tuning, and r max is set as the transmission radius of node, while r max is set to the treble transmission radius. After data transmission, the receiver sends an ACK to the sender. Neighboring nodes which receive the ACK frame delete the current distance records from two vectors: V- SRTS< I, d i CS > and V-SCTS< I, di CS >. Meanwhile, every record in vectors maintains a timestamp. After certain time (maximum transmission time of the data frame), the node checks the timestamp of each record and deletes the timeout records in vectors to ensure the real-time characteristics of vectors. V. PERFORMANCE EVALUATION In this section, we present a simulation study to evaluate the performance of the proposed scheme. we compare the performance of the proposed scheme with that of two other schemes: IEEE scheme and the spatial backoff scheme proposed in [17]. The simulation is carried out using NS-2. In the simulation of grid topology and random dynamic topology, we adopt a two-ray model as a radio propagation model. The dynamic Source Routing (DSR) routing protocol is considered as a routing protocol. The transmission radius is 250m, and the initial carrier sensing range is 450m. The SRTS/SCTS 401

5 Algorithm 2 CDPCS 1: After Receiving SRTS/SCTS Frame 2: if Frame type is SRTS then 3: distance=d A,D ; Put distance into V-SRTS; 4: end if 5: if Frame type is SCTS then 6: distance = d A,B + d B,I ; Put distance into V-SCTS; 7: end if 8: if Frame type is ACK then 9: Delete records of sender in V-SRTS / V-SCTS; Goto Line 11; 10: end if 11: if V-SRTS< i > in V-SRTS corresponding V-SCTS< j > in V-SCTS then 12: r cs = min{max{d in V-SRTS}, r max }; 13: else {V-SCTS is not NULL} 14: r cs = min{max{d in V-SCTS}, r max }; 15: else {V-SCTS is NULL AND V-SRTS is not NULL} 16: r cs = max{min{d in V-SRTS}, r min }; 17: end if Fig. 4. Collision probability versus the number of CBR flows transmission range is set to 1.6 times the distance of data transmission. The simulation time for each simulation scenario is 500 seconds. In the results, each data point represents an average of 10 trials of experiments. The confidence level is set to 95%, and the confidence interval is shown as a vertical bar in figures. The NAV scheme is discarded in the proposed mechanism. A. Grid Topology In this subsection, we consider 25 nodes placed on a 5 5 grid at unit distance (200m) from each other. The CBR (Constant Bit Rate) flows randomly choose end-to-end source and destination pairs in this topology, and the transmission rate is 1Mbps. Fig. 3. Throughput versus the number of CBR flows Fig. 3 shows the throughput performance of the following three schemes: IEEE basic scheme, spatial backoff scheme, and the proposed scheme, for varying the number of CBR flows. The network has maximum throughput when the number of CBR flows is 7. The proposed scheme can improve the throughput of network because the CS th values of the Fig. 5. Throughput versus distance to adjacent node neighboring nodes are adjusted at the same time. Fig. 4 shows the collision probability of the three schemes for varying the number of CBR flows. The proposed scheme yields the lowest collision probability and interference. In order to achieve the optimization of local network, the CS th values of surrounding neighbors are adjusted at the same time, and then the number of collisions can be reduced effectively. In order to further investigate the relationship between node density and throughput, we consider 25 nodes placed on a 5 5 grid, the distance of adjacent nodes is set from 120m to 240m and the topology is gird. The number of CBR flows maintains 7, and other experiment parameters are the same as above parameters. Fig. 5 shows the throughput of the three schemes for varying the distance to adjacent node. We can observe from the figure that the proposed CDPCS scheme has the best result when the node density is high.when the distance between each node is small, hidden nodes and exposed nodes around the transmission links cause conflicts and interference. Meanwhile, the performance of the proposed CDPCS scheme is not particularly outstanding because it can not utilize the advantages of local information exchange when the node is sparse. B. Random Dynamic Topology We consider a randomly generated network with 100 nodes which are randomly distributed inside an m 2 with a maximal moving speed of 5 m/s. As the transmission rate increases, the interference range increases. Thus, higher transmission rates do not help to improve network throughput. 402

6 Fig. 6 shows the throughput of the three different schemes for varying transmission rates. The network achieves the maximum throughput when the transmission rate is set to 25Mbps. In the random network topology, this scheme still demonstrates good performance. In the case of random dynamic topology, the neighboring nodes are constantly moving, however, the proposed CDPCS scheme is based on the exchange of control frames, and then the topology change does not affect the performance considerably. Thus, the proposed CDPCS scheme is able to adapt to random or dynamic topology. As the transmission rate increases, the network reaches its maximum capacity, and the throughput is maintained at a slow growth until the transmission rate is higher than 25Mbps. Fig. 6. Throughput versus transmission rates Fig. 7. Throughput versus number of nodes To test more general topologies, we place nodes randomly in an m 2 area with 9 pairs of randomly chosen nodes acting as sources and destinations with the same transmission rate, 25Mbps. We investigate the throughput by varying the number of nodes from 20 to 60. Results are shown in Fig. 7, where the X-axis is the number of nodes and the Y-axis is the throughput in Kbps. In general, the proposed CDPCS scheme achieves the better performance in a dense network. VI. CONCLUSION In this paper, we mainly focused on the physical carrier sensing scheme to enhance the performance of DCF-based multi-hop wireless networks. We are concerned with the solution of the hidden terminal and exposed terminal problems and propose a coordinated dynamic physical carrier sense (CDPCS) scheme. The proposed CDPCS scheme enables a node to sense the busy medium and block its transmission whenever it falls in the interference range of the receiver, while it enables nodes in the carrier sensing range and not in the interference range encourage to transmit their packets.through theoretical analysis and experimental simulation, the proposed CDPCS scheme can improve network performance by increasing the number of concurrent transmissions of exposed nodes and reducing the collision probability and interference caused by hidden nodes in networks. REFERENCES [1] P. M. van de Ven, A. J. E. M. Janssen, and J. S. H. Van Leeuwaarden. Optimal tradeoff between exposed and hidden nodes in large wireless networks, Proc. ACM SIGMETRICS, pp.14-18, [2] T-S. Kim, H. Lim and J. C. Hou, Understanding and Improving the spatial reuse in multihop wireless networks, IEEE Transactions on Mobile Computing, Vol. 7, No. 10, pp ,october [3] J. Zhu, X. Gao, L. L. Yang, W. S. Conner, S. Roy and M. M. Hazra, Adapting physical carrier sensing to maximize spatial reuse in mesh networks, Wireless Communications and Mobile Computing, vol.4,no.8,pp , December [4] B. Alawieh, C. M. Assi and H. Mouftah, Investigating the performance of power-aware IEEE in multihop wireless networks, IEEE Transactions on Vehicular Technology, vol.58, no.1,pp ,january [5] F. P. Tobagi and L. Kleinrock. Packet switching in radio channels: part II - the hidden terminal problem in carrier sense multiple-access and the busy-tone solution, IEEE Transactions on Communications, vol.23,no.12, pp , [6] J. Li, C. Blake, D. D. Couto, H. Lee, and R. Morris, Capacity of ad hoc wireless networks, Proc. ACM MobiCom, pp.61-69, [7] H. Ma, H. M. K. Alazemi and S. Roy, A stochastic model for optimizing physical carrier sensing and spatial reuse in ad hoc networks, Proc. IEEE MASS, pp ,2005. [8] T. Nadeem, L. Ji, Location-aware IEEE for spatial reuse enhancement, IEEE Transactions on Mobile Computing, vol.6, no.10, pp ,october [9] F. Ye, S. Yi, and B. Sikdar, Improving spatial reuse of IEEE based ad hoc networks, Proc. IEEE GLOBECOM, pp , [10] E. Wong and R. Cruz, A spatio-temporal model for physical carrier sensing wireless ad-hoc networks, Proc. IEEE SECON, pp , [11] J. Deng, B. Liang, and P. K. Varshney, Tuning the carrier sensing range of IEEE MAC, Proc. IEEE GLOBECOM, pp , [12] H. Ma, S. Shin, and S. Roy, Optimizing throughput with carrier sensing adaptation for IEEE mesh networks based on loss differentiation, Proc. IEEE ICC, pp , pp ,january [13] J. Zhu, B. Metzler, X. Guo, and Y. Liu. Adaptive csma for scalable network capacity in high-density WLAN: a hardware prototyping approach, Proc. IEEE INFOCOM, pp. 1-10, [14] K-J. Park, L. Kim, and J.C. Hou, Adaptive physical carrier sense in topology-controlled wireless networks, IEEE Transactions on Mobile Computing, vol.9, no.1, pp , January [15] C.-C. Chen, E. Seo, H. Kim, and H. Luo, SELECT:self-learning collision avoidance for wireless networks, IEEE Transactions on Mobile Computing, vol.7, no.3,pp , March [16] A. Acharya, A. Misra, and S. Bansal, MACA-P: a MAC for concurrent transmissions in multi-hop wireless networks, Proc. IEEE PerCom, pp , [17] X. Yang and N. Vaidya, A spatial backoff algorithm using the joint control of carrier sense threshold and transmission rate, Proc. IEEE SECON, pp , [18] J. Kivinen, X. Zhao, and P. Vainikainen, Empirical characterization of wideband indoor radio channel at 5.3 GHz, IEEE Transactions Antenna and Propagation, vol. 49, no. 8, pp ,

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Investigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks

Investigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks JOUNAL OF NEWOKS, VOL. 5, NO. 4, AIL 21 459 Investigating the Optimum Carrier Sensing ange Using ransmission elation Graph in Wireless Ad hoc Networks Chongqing Zhang Department of Network Engineering,

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

IEEE802.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS)

IEEE802.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS) IEEE82.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS) Christina Thorpe School of Computer Science and Informatics University College Dublin Belfield, Dublin 4 Sean

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Quality of Experience in Dense CSMA Networks

Quality of Experience in Dense CSMA Networks IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) Quality of Experience in Dense CSMA Networks Tung-En Wu, Der-Jiunn Deng, and Kwang-Cheng

More information

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks KSII The first International Conference on Internet (ICONI) 2010, December 2010 1 Coexistence Issues in Contention-Based Heterogeneous Wireless Networks Eun-Chan Park 1, Minjoong Rim 1, Hwangnam Kim 2,

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Adapting Physical Carrier Sensing to Maximize Spatial Reuse in Mesh Networks

Adapting Physical Carrier Sensing to Maximize Spatial Reuse in Mesh Networks Adapting Physical Carrier Sensing to Maximize Spatial Reuse in 802.11 Mesh Networks Jing Zhu, Xingang Guo, L. Lily Yang, W. Steven Conner, Sumit Roy, and Mousumi M. Hazra {jing.a.zhu, xingang.guo, lily.l.yang,

More information

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 941 946 DOI: 10.15439/2014F437 ACSIS, Vol. 2 Throughput Improvement by Adjusting RTS Transmission Range for

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks P.Sivanesan Department of Information Technology Kurinji College of Engineering and Technology Tiruchirappalli, Tamilnadu, India

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

Hidden Problems with the Hidden Node Problem

Hidden Problems with the Hidden Node Problem Hidden Problems with the Hidden Node Problem Hidden Node Problem A B C Hidden node Outside the TX range of sender but within the range of receiver. C is hidden node! Throughput is decreased. Larger data

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Performance Evaluation of e over Multihop WiFi Mesh Networks

Performance Evaluation of e over Multihop WiFi Mesh Networks Performance Evaluation of 802.11e over Multihop WiFi Mesh Networks Kuo-Lun Hua and Ray-Guang Cheng Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan,

More information

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks Hongqiang Zhai and Yuguang Fang Department of Electrical & Computer Engineering University of Florida, Gainesville,

More information

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks ERBAR: an Enhanced Receiver-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks Zhifei Li, Anil K. Gupta, and Sukumar Nandi School of Computer Engineering, Nanyang Technological University, Singapore-639798

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Improved Power Control MAC Protocol for wireless Ad Hoc Networks

Improved Power Control MAC Protocol for wireless Ad Hoc Networks Improved Power Control MAC Protocol for wireless Ad Hoc Networks YASER MAHMOOD A. HAMID and D.K. LOBIYAL School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi, INDIA yaser2001in@yahoo.com,

More information

Mitigating Deafness in Multiple Beamforming Antennas

Mitigating Deafness in Multiple Beamforming Antennas Mitigating Deafness in Multiple Beamforming Antennas Vivek Jain and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing Department of ECECS, University of Cincinnati, Cincinnati, OH 45221-0030

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE 802.11 NETWORKS Wee Lum Tan 1, Konstanty Bialkowski 1 1 Queensland Research Laboratory National ICT Australia Brisbane, QLD, Australia Email: {weelum.tan,

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control

Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea dnmduc@khu.ac.kr Phuong Luu Vo Department

More information

Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

OCP: Opportunistic Carrier Prediction for Wireless Networks

OCP: Opportunistic Carrier Prediction for Wireless Networks OCP: Opportunistic Carrier Prediction for Wireless Networks Chun-cheng Chen and Nitin Vaidya University of Illinois at Urbana-Champaign Abstract In this paper, we propose Opportunistic Carrier Prediction

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

I. INTRODUCTION. performance metric; we defer considerations of important topics such as per node throughput fairness to later work.

I. INTRODUCTION. performance metric; we defer considerations of important topics such as per node throughput fairness to later work. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Optimizing 802.11 Wireless Mesh Networks Based on Physical Carrier Sensing Hui Ma, Student Member, IEEE, Rajiv Vijayakumar, Sumit Roy, Fellow, IEEE, and Jing Zhu,

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Performance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme

Performance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme World Engineering & Applied Sciences Journal 6 (2): 97-103, 2015 ISSN 2079-2204 IDOSI Publications, 2015 DOI: 10.5829/idosi.weasj.2015.6.2.22146 Performance Analysis of Distributed Mac Protocol with Physical

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Control Frame Shaping in Power Controlled and Directional MAC Protocols

Control Frame Shaping in Power Controlled and Directional MAC Protocols Ad Hoc & Sensor Wireless Networks Vol., pp. 1 26 Reprints available directly from the publisher Photocopying permitted by license only 27 Old City Publishing, Inc. Published by license under the OCP Science

More information

Distributed power control over multiple channels for ad hoc wireless networks

Distributed power control over multiple channels for ad hoc wireless networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2012) Published online in Wiley Online Library (wileyonlinelibrary.com)..2266 RESEARCH ARTICLE Distributed power control over multiple

More information

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON 802.11 AD HOC NETWORKS Alexandre Andrade Pires and JosC Ferreira de Rezende GTA - COPPE Universidade Federal do Rio de Janeiro, Brazil Ernail: {andrude,

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

Computer Communications

Computer Communications Computer Communications 2 (2009) 126 1270 Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Improving throughput by tuning carrier sensing

More information

BLAM: An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks

BLAM: An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks : An Energy-Aware MAC Layer Enhancement for Wireless Adhoc Networks Sameh Gobriel, Rami Melhem and Daniel Mossé Computer Science Department, University of Pittsburgh {sameh, melhem, mosse}@cs.pitt.edu

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information