Voice Capacity Evaluation of IEEE a with Automatic Rate Selection

Size: px
Start display at page:

Download "Voice Capacity Evaluation of IEEE a with Automatic Rate Selection"

Transcription

1 Voice Capacity Evaluation of IEEE 80.11a with Automatic Rate Selection Nattavut Smavatkul, Ye Chen, Steve Emeott Motorola Labs, 1301 E. Algonquin Rd., Schaumburg, IL (Natt, Ye.Chen, Abstract his paper analyzes the transmission of and isochronous traffic in general over an 80.11a wireless local area network. In particular, we provide a simple analytic technique for estimating the capacity of an 80.11a access point under the contention-based access method when all stations can select an optimal transmission rate using automatic rate selection. Capacity is additionally estimated using a wireless LAN (WLAN) system simulator that models contention-based access in a noise limited channel, in which packet erasures are modeled using quasi-static link simulation techniques. he impact of automatic rate selection on capacity is evaluated. Results from the analytic and simulation based methods of estimating capacity are compared. In addition, impact on capacity from data traffic is studied. I. INRODUCION Wireless LAN (WLAN) has experienced spectacular growth in recent years due to the popularity of nomadic computing and the inherent advantages of wireless connectivity, such as rapid deployment and mobility. In many WLAN technologies, information can be transmitted at various rates. Stations compliant with IEEE 80.11a [1], for example, can transmit information at eight different rates, ranging from 6 to 54 Mbps. While the principal application of WLAN systems has been providing connectivity to application such as and web browsing, there has been a growing interest in supporting isochronous services with automatic rate selection. Current WLAN technologies [][3] provide two main approaches for delivering isochronous traffic, either through a prioritized contention-based technique or a polling-driven technique. Under the polling-driven scheme, channel access is regulated via an explicit polling message issued by a central controller. he real-time traffic capacity and performance using polling has been studied in several papers [4][5]. Another approach, the prioritized contention-based scheme, employs a free-for-all approach called carrier sensing multiple access with collision avoidance (CSMA/CA), which lets station contend for channel access. he capacity of this scheme has also been studied in several papers [6][7]. However, neither set of papers considers the impact of multi-rate operation. In this paper, we analyze the performance of 80.11a WLAN access point (AP) under contention-based scheme in term of the maximum number of conversations that can be supported in a noise-limited channel. In particular, we provide a simple analytic technique that allows us to estimate the impact of automatic rate selection on capacity. Although we focus on a typical office environment, this technique can also be applied to other types of environments. his paper is organized as follows: first, we review 80.11a medium access control (MAC) protocol and physical layer, and describe how these protocols effect the WLAN capacity in Section II and III. he traffic model and its capacity criteria are described in Section IV. In Section V, the analytic models to estimate WLAN capacity with automatic rate selection are presented. he quasi-static concept that separates system simulator from link simulator is addressed in Sections VI. he system simulator is introduced in Section VII. he simulation results are presented in Section VIII. Finally, Section IX concludes the paper. II. CONENION-BASED MEDIA ACCESS CONROL A typical frame exchange sequence using contention-based access is shown in Fig. 1. First, a station with traffic senses channel for a certain period of time. If the channel is idle, it acquires the channel and sends data frame. Otherwise, it starts to backoff. If the receiving station correctly receives this data frame, it is required to respond with an acknowledgement () frame within a period defined as short interframe space (SIFS). Following a successful frame exchange sequence, a station is required to wait for duration, defined as distributed interframe space (DIFS), prior to beginning its backoff procedure. During the backoff period, each station waits for a random amount of time, which is uniformly distributed between zero and a contention window (CW) value. A portion of the channel capacity is unusable from collision when more than one WLAN user tries to transmit at the same time. When the sending SA does not receive an frame within SIFS interval, it assumes that the transmission has been lost and invokes a random backoff procedure prior to retransmitting the packet. Access point SA i SA j Data to SA i DIFS SIFS Backoff window Data to AP SIFS Figure 1. Basic frame exchange sequence of contention-based access.

2 he on-going 80.11e standard [3] additionally specifies a prioritized contention-based access method that provides traffic class differentiation. III A PHYSICAL LAYER 80.11a physical layer is based on orthogonal frequency division multiplexing (OFDM) technology as specified in 80.11a standards [1]. It operates in a 5GHz unlicensed frequency band in both Europe and the US. o study the effect of noise and automatic rate selection in the system, a realistic link simulator to model 80.11a physical layer is needed. By adopting a quasi-static simulation technique presented in Section VI, the simulator is separated into a link simulator and a system simulator. A multi-purpose OFDM link simulator [8] is used to generate a statistical model that describes the relationship among received signal power, packet error rate, packet size, and modulation & coding. his information will then be used by the system simulator to look up the packet error rate using the remaining three factors, viz., received signal strength, packet size, and modulation & coding. During this phase of study, only four different data rates, i.e., 6, 1, 18, and 36 Mbps, are considered. A. Automatic Rate Selection An idealized procedure for automatically selecting transmit rate is used, based on link curves from the link simulator. It is assumed that the path loss information between transmitter and receiver is known to the transmitter prior to selecting a transmit rate. he transmitter can then select the appropriate rate based on path loss information and link curves. A packet error rate before retransmission (PER) of more than 5% is established as a criterion to reduce the transmit rate. Given a current propagation path between transmitter and receiver, the chosen physical transmission rate is the highest rate that can still satisfy the maximum 5% PER criterion. A sample of the operating ranges of each physical transmission rates are depicted in Fig.. he maximum cell radius is chosen such that the PER will equal to 10% at the cell boundary for the lowest physical transmission rate, 6 Mbps. For an indoor office environment, this cell radius equals to 6 meters. LinkSpeed(Mbps) Range (meters) Figure a Link Speed vs. Range IV. ELEPHONY VOICE RAFFIC MODEL he traffic model represents a speech signal using a periodic pulse train, where the periodicity of the pulse train depends upon the coder frame size. We assume that all coders have a 0 milli-second frame size. he process of encapsulating frames into IP packets is commonly referred to as packetization. he size of each packet depends on the rate of the coder, which commonly ranges from 4 Kbps to 64 Kbps. Each conversation is bi-directional, resulting in two s in opposite directions for a single conversation. Both uplink and downlink s are assumed to be independent from one another with the start times randomly distributed over 0 ms period. he lifetime of a packet is also assumed to be 0 ms. V. VOICE CAPACIY MODEL In the absence of hidden terminal, noise, and interference, it is possible to analytically estimate the maximum number of telephony conversations that an 80.11a WLAN AP can support with contention-based access. A. Overview elephony traffic is sensitive to both delay and packet loss. In order to maintain an acceptable quality, we assume that the packet loss rate must be less than or equal to 1% and over 99% of packets experience less than 0 ms delay (e.g. equal to the frame duration). he WLAN system capacity is then defined as the maximum number of full duplex calls that a given AP can support while still maintaining these criteria. he basic frame exchange of a telephony consists of a data frame carrying payload followed by an frame, similar to Fig. 1. he analytic model will estimate a maximum number of s that can be accommodate during a 0 ms period (a single frame) of an IEEE 80.11a AP with multi-rate support under the contention-based access method. he analytical model consists of the contention module and the automatic rate selection module. he contention module considers the effect of contention and collision among users in accessing the medium, whereas the automatic rate selection module considers the effect of switching between multiple transmit rates. It is also important to note that the analytical model is based on two simplifying assumptions: ideal availability of channel state information and an errorfree channel. B. Contention-based Access Under the contention-based access method, each call is treated as a constant bit rate (CBR) connection with both uplink and downlink uni-directional s. he time consumed by a sequence,, is shown in (1). = DIFS + _ + SIFS + (1) and Voice _ PDU Voice PDU are the time to transmit data and frames, respectively. In addition to, the impact from the contention scheme is considered in two phases, backoff phase and collision phase. Both phases are modeled analytically based on a DCF model derived by Bianchi [10].

3 he backoff duration ( backoff ) represents the average backoff interval for a successful packet transmission. It can be calculated as shown in (), where n is the number of backlogged stations and τ is the probability that a station transmits in a randomly chosen slot time. backoff = slot 1 τ () n τ slot equals to a duration of one backoff slot. In a stable system (less than 1% packet loss criteria) with CW min value of 15 slots, the sustained maximum number of backlogged stations at any given time must be less than 15/e = 5., based on a slotted aloha throughput. In our analytical model, n is chosen as 3. he number of backlogged station will be studied further in the simulation results section. τ can be determined by solving (3) and (4) [10], where m is the maximum number of backoff stages. τ (3) = m i 1 CWmin p CWmin ( p) i= 0 n 1 p = 1 (1 τ ) (4) In addition to backoff overhead, a portion of the channel capacity is also unusable from collisions. he average unusable time due to collision per single successful packet transmission ( collision ) is shown in (5) [10]. propagation is the maximum propagation time for the WLAN cell under consideration. collision n 1 (1 τ ) ( ) (5) = Voice _ PDU + DIFS + propagation 1 n 1 n τ (1 τ ) By adding the overheads related to backoff and collision, the amount of time associated with a single (V k ) during a 0 ms period can be obtained by (6). K will be defined in the next subsection. ς κ = + backoff + collision, κ= 1,..., Κ (6) C. Statistical Models of Automatic Rate Selection he central limit theorem is used to determine the effect of automatically selecting a physical transmission rate based on the channel condition. Let s assume that there are N active uni-directional s at any given time in the system. Because a full-duplex call consists of two s, the total number of calls N user that the system can support equals to (N /). Given that each active carries out one frame exchange sequence within a period equal to the frame duration of 0 ms, there are N frame exchange sequences per 0 ms. Let a random variable represents the amount of time consumed by the aggregated calls during the same duration, equals to the summation of time consumed by each call ( i ). Because each user is statistically identical, mean and variance of i are identical for all values of i (i=1,,n ). Since each call is independent from one another, according to the central limit theorem, the mean η and variance σ of random variable equal to the sum of means and variances of random variables i, which equals to N η and i N σ, respectively. Under an i assumption that i is not deterministic (σ 0), the cumulative distribution function (CDF) F( ) of the random variable approaches a normal distribution with the mean η and variance σ as shown in (7). F ( ) = Norm ( η σ Assuming that there are K possible durations of a frame exchange sequence, denoted by V k, where k ranges from 1 to K. If there are N link possible physical transmission rates, there are N link possible values of V k (K = N link ). he probability that a station will uses any given V k duration for its frame exchange sequence is represented by P k, which equals to the probability that a given physical transmission rate is chosen (P k = Prob [k-th link is used]). It is straightforward to derive the mean η i and variance σ i of i, based on the discrete random variable rules. he mean and variance of can then be derived from η i and σ i. he resulting CDF of is shown in (8). F ( ) = Norm ( N σ N i ) η i ) (8) D. Voice Capacity Given the capacity criteria, in which, with 0.99 probability, the time consumed by aggregated calls remains below the system capacity, the maximum capacity of a WLAN AP can be estimated using (9). P 1 frame i [ > frame ] = erfc ( ) Pclipping N N σ i (7) η (9) frame represents the maximum channel capacity available for transmission during a given frame duration, which is 0 ms. he clipping probability or packet loss ratio, P clipping, is limited to be under he maximum number of s can be determined by solving (9) for N. he maximum number of full-duplex calls N user that the system can support for each vocoder rate is equal to N /. Using this analytical model, the capacity of an 80.11a WLAN can be estimated. A set of basic channel access parameters for the contention-based access method can be obtained from the 80.11a standard [1]. he amount of time required by each,, during each 0 ms period depends on both the vocoder rates and link speeds. he probability of each link speed is calculated based on the

4 80.11a range Vs. link speed in Fig., assuming that mobiles are uniformly distributed in a circular region. VI. QUASI-SAIC SIMULAION CONCEP WLAN capacity is additionally estimated using a system simulator that models contention-based access and a noise limited channel. he simulation results are used to validate the theoretical estimates. We use a quasi-static simulation technique, which enables a separation between link simulator and system simulator. At the system level, it is assumed that the link quality remains the same over the duration of each packet transmission. It is also assumed that errors are uncorrelated, i.e., error in prior packet does not influence the probability of error in subsequent packet. Furthermore, it is assumed that the location or distribution of error bits does not have any impact to the packet error rate, which is generally the case with a good interleaver design. Finally, it is also assumed that the CRC never fails. Based on these assumptions, the entire channel state information can be represented by a single SNR value, which remains constant over the packet duration. his SNR value can be obtained from an appropriate pathloss and propagation models. Figure 3. Summary of 80.11a WLAN capacity B. Delay For a delay-sensitive traffic such as, maintaining low and predictable delay is crucial in supporting real time traffic. he CDF for channel access delay is shown in Fig. 4 for 64 Kbps and 16 Kbps vocoder rates. VII. SYSEM SIMULAOR he system simulator is implemented in OPNE Modeler, based on the 80.11a MAC and physical layers. It also employs a statistical model that predicts PER from SNR, packet size, and modulation & coding, which is generated using the link simulator. VIII. SIMULAION RESULS In this section, the simulation results are presented, both to validate the analytic model and to provide insight into other performance metrics. Several vocoder rates, from 4 Kbps to 64 Kbps, and the capacity gain from automatic rate selection are investigated. A. Voice Capacity In Fig. 3, the capacity numbers for an 80.11a AP with contention-based access method are depicted for different combinations of vocoder rates and physical transmission rates. he simulation results are compared with the theoretical estimations from the previous section. As shown in the figure, automatic rate selection increases the WLAN capacity from the fixed 6 Mbps transmission rate. For example, with a 16 Kbps vocoder, 44 users can be supported with automatic rate selection while only 31 users can be supported without automatic rate selection. Additional users can also be supported by using a lower rate vocoder. he number of users increases from 30 to 50 when the vocoder rate decreases from 64 Kbps to 4 Kbps. In all cases, there is only a small difference between the analytical estimate and the simulation results, which can be attributed, in part, to noise in the system. Figure 4. CDF of medium access delay for selected vocoder rates. he effect of automatic rate selection is also presented. For comparison, all curves are depicted when the system reaches its maximum capacity. Even at capacity, virtually all packets experience less than ms in channel access delay, which is much lower than the 0 ms maximum delay criteria. Other simulation results show that delay increases rapidly when the system exceeds its capacity. A comparison between different vocoder rates reveals that delay is lower with lower vocoder rate. he average delay of 16 Kbps is approximately 0.5 ms smaller than the average delay of 64 Kbps. Because a packet from high rate vocoder is larger than a packet from low rate vocoder, with a 64 Kbps vocoder requires more transmission time. Consequently, other users must wait for a longer period for the current transmission to complete, resulting in a longer channel access delay. Additionally, a larger packet is more susceptible to erasure, which results in additional retransmission delay. he impact from multi-rate transmission can also be seen from the figure. Under the same vocoder rate, smaller channel access delay can be achieved via automatic rate selection. he slightly smaller delay results from the higher data rate used in the multi-rate case. However, the shallower

5 CDF curve in multi-rate simulation indicates that there is more delay jitter when automatic rate selection is used. C. Voice Capacity in the Presence of Data Users By appropriately setting up the contention parameters, higher priority can be granted to traffic over data traffic. Nevertheless, the capacity is expected to be slightly lower when data traffic is introduced. From our preliminary simulation results, the traffic is reasonably protected from low priority traffic, resulting in a graceful degradation of capacity. he contention parameter settings and data traffic model are depicted in ABLE 1. From Fig. 5, the capacity decreases by -3 users with 8 HP and 6 FP users. Figure 5. Voice Capacity in the presence of data traffic. D. Number of Stations in Backoff As previously discussed, the number of backlogged station is one parameter of the analytical model. Fig. 6 shows a relationship between packet loss rate (indication of system stability) and stations in backoff. Higher packet loss rate is achieved by increasing the number of stations. he AP is almost always in backoff, having to transmit downlink traffic to all stations. Consequently, backlogged station starts from one and goes up sharply when the packet loss rate is greater than 5%. Additionally, the number of stations in backoff seems to be insensitive to vocoder rate and link speed. ABLE I. SIMULAION PARAMEERS Contention Parameters Value CWmin/CWmax for /HP/FP 15/103; 31/103; 63/103 IFS for /HP/FP DIFS; DIFS+5; DIFS+9 30 Kbps; HP1.1, 00 Data model for HP/FP Kbps with truncated Pareto object size IX. CONCLUSIONS In this paper, both analytic and simulation techniques for estimating capacity using contention-based access are described for 80.11a WLAN. In particular, methods of modeling multi-rate links are described. Five different vocoder rates are considered in the capacity study. he analytic models assume a finite number of mobile stations, multi-rate links, and ideal channel conditions. Results for multi-rate noise limited channels are obtained from system simulation models. Packet erasures are modeled using path loss equations and quasi-static link modeling techniques. Comparisons between the analytic models and simulation results show that the analytic models provide an accurate estimate of capacity. he capacity improvement due to using ideal automatic rate selection instead of a fixed 6 Mbps link ranges from 35% to 55%, depending on vocoder rate. Additionally, the capacity can also be improved with a decrease in vocoder bit rate. REFERENCES [1] ANSI/IEEE Std 80.11a: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications; High-speed Physical Layer in the 5 GHz Band, 1999 [] ANSI/IEEE Std 80.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999 [3] IEEE Standard 80.11e, Media Access Control (MAC) Enhancements for Quality of Service (QoS), Draft 4.0, November 00 [4] M. Veeraraghavan, N. Cocker, and. Moors, Support of services in IEEE wireless LANs, Proceedings of the IEEE INFOCOM 001, pp , 001 [5] E. Ziouva and. Antonakopoulos, CBR packetized transmission in IEEE networks, Proceedings of the Sixth IEEE Symposium on Computers and Communications, pp , 001 [6] D-J. Deng and R-S. Chang, A priority scheme for IEEE DCF access method, IEICE ransactions on Communications, E8-B(1), January [7] I. Aad and C. Castelluccia, Differentiation mechanisms for IEEE 80.11, Proceedings of the IEEE INFOCOM 001, Vol. 1, pp , 001 [8] S. Simoens and D. Bartolome, Optimum Performance of Link Adaptation in HIPERLAN/ Networks, IEEE 53rd Vehicular echnology Conference, Vol., pp , Spring 001 [9] A. Doufexi, S. Armour, A. Nix, and D. Bull, A comparison of HIPERLAN/ and IEEE 80.11a, Symposium on Communications and Vehicular echnology, SCV-000, pp. 14 0, 000 [10] G. Bianchi, Performance analysis of the IEEE distributed coordination function, IEEE Journal on Selected Areas in Communications, pp , Vol. 18, no. 3, March 000 Figure 6. Packet Loss Rate Vs. Number of station in backoff. (80.11a)

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks

Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Call Admission Control for IEEE Contention Access Mechanism

Call Admission Control for IEEE Contention Access Mechanism Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Providing Throughput Guarantees in IEEE e Wireless LANs

Providing Throughput Guarantees in IEEE e Wireless LANs Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,

More information

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs

The IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Priority-based Transmission in IEEE Networks

Priority-based Transmission in IEEE Networks Priority-based Transmission in IEEE 802.11 Networks Tomasz Janczak and Józef Wozniak janczak @ eti.pg. gda.pl., jowoz @pg. gda.pl Technical University of Gdansk Faculty of Electronics, Telecommunications

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Infrastructure CSMA/CA Network With Multiple Service Classes

Infrastructure CSMA/CA Network With Multiple Service Classes Traffic and QoS Analysis of an Infrastructure CSMA/CA Network With Multiple Service Classes Ritabrata Roy December 13, 2002 Abstract This treatise aims at analysing a CSMS/CA network operating in an access

More information

Notes on the Inefficiency of e HCCA

Notes on the Inefficiency of e HCCA Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode

Supporting VBR VoIP Traffic in IEEE WLAN in PCF Mode Supporting VBR VoIP Traffic in IEEE 802.11 WLAN in PCF Mode Dongyan Chen*, Sachin Garg**, Martin Kappes** and Kishor S. Trivedi* * Center for Advanced Computing and Communications, ECE Department Duke

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

When two-hop meets VoFi

When two-hop meets VoFi This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCC 00 proceedings. When two-hop meets VoFi Sathya arayanan *,

More information

MC-CDMA Based IEEE Wireless LAN

MC-CDMA Based IEEE Wireless LAN MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Transmission Control Protocol over Wireless LAN

Transmission Control Protocol over Wireless LAN Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

A Tool for Simulating IEEE e Contention-based Access

A Tool for Simulating IEEE e Contention-based Access A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr

More information

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation

QoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation QoS Support for Time-Constrained Multimedia Communications in IEEE 8. WLANs: A Performance Evaluation José Villalón Francisco Micó Pedro Cuenca Luis Orozco-Barbosa Department of Computer Engineering, Universidad

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g

Analyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic

IEEE Throughput and Delay Analysis for mixed real time and normal data traffic IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead

Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead 1 Dr.S. Bhargavi Professor, Dept.of ECE SJCIT, Chickballapur E-mail: bhargavisunil@gmail.com 2 Chandra Naik G Asst. Professor,

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

QoS Enhancement in IEEE Wireless Local Area Networks

QoS Enhancement in IEEE Wireless Local Area Networks MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:

. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates: QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering

More information

Performance Evaluation of IEEE e

Performance Evaluation of IEEE e Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs Effect of Payload Length Variation and Retransmissions on Multimedia in 8.a WLANs Sayantan Choudhury Dept. of Electrical and Computer Engineering sayantan@ece.ucsb.edu Jerry D. Gibson Dept. of Electrical

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information