Voice Capacity Evaluation of IEEE a with Automatic Rate Selection
|
|
- Naomi McDaniel
- 5 years ago
- Views:
Transcription
1 Voice Capacity Evaluation of IEEE 80.11a with Automatic Rate Selection Nattavut Smavatkul, Ye Chen, Steve Emeott Motorola Labs, 1301 E. Algonquin Rd., Schaumburg, IL (Natt, Ye.Chen, Abstract his paper analyzes the transmission of and isochronous traffic in general over an 80.11a wireless local area network. In particular, we provide a simple analytic technique for estimating the capacity of an 80.11a access point under the contention-based access method when all stations can select an optimal transmission rate using automatic rate selection. Capacity is additionally estimated using a wireless LAN (WLAN) system simulator that models contention-based access in a noise limited channel, in which packet erasures are modeled using quasi-static link simulation techniques. he impact of automatic rate selection on capacity is evaluated. Results from the analytic and simulation based methods of estimating capacity are compared. In addition, impact on capacity from data traffic is studied. I. INRODUCION Wireless LAN (WLAN) has experienced spectacular growth in recent years due to the popularity of nomadic computing and the inherent advantages of wireless connectivity, such as rapid deployment and mobility. In many WLAN technologies, information can be transmitted at various rates. Stations compliant with IEEE 80.11a [1], for example, can transmit information at eight different rates, ranging from 6 to 54 Mbps. While the principal application of WLAN systems has been providing connectivity to application such as and web browsing, there has been a growing interest in supporting isochronous services with automatic rate selection. Current WLAN technologies [][3] provide two main approaches for delivering isochronous traffic, either through a prioritized contention-based technique or a polling-driven technique. Under the polling-driven scheme, channel access is regulated via an explicit polling message issued by a central controller. he real-time traffic capacity and performance using polling has been studied in several papers [4][5]. Another approach, the prioritized contention-based scheme, employs a free-for-all approach called carrier sensing multiple access with collision avoidance (CSMA/CA), which lets station contend for channel access. he capacity of this scheme has also been studied in several papers [6][7]. However, neither set of papers considers the impact of multi-rate operation. In this paper, we analyze the performance of 80.11a WLAN access point (AP) under contention-based scheme in term of the maximum number of conversations that can be supported in a noise-limited channel. In particular, we provide a simple analytic technique that allows us to estimate the impact of automatic rate selection on capacity. Although we focus on a typical office environment, this technique can also be applied to other types of environments. his paper is organized as follows: first, we review 80.11a medium access control (MAC) protocol and physical layer, and describe how these protocols effect the WLAN capacity in Section II and III. he traffic model and its capacity criteria are described in Section IV. In Section V, the analytic models to estimate WLAN capacity with automatic rate selection are presented. he quasi-static concept that separates system simulator from link simulator is addressed in Sections VI. he system simulator is introduced in Section VII. he simulation results are presented in Section VIII. Finally, Section IX concludes the paper. II. CONENION-BASED MEDIA ACCESS CONROL A typical frame exchange sequence using contention-based access is shown in Fig. 1. First, a station with traffic senses channel for a certain period of time. If the channel is idle, it acquires the channel and sends data frame. Otherwise, it starts to backoff. If the receiving station correctly receives this data frame, it is required to respond with an acknowledgement () frame within a period defined as short interframe space (SIFS). Following a successful frame exchange sequence, a station is required to wait for duration, defined as distributed interframe space (DIFS), prior to beginning its backoff procedure. During the backoff period, each station waits for a random amount of time, which is uniformly distributed between zero and a contention window (CW) value. A portion of the channel capacity is unusable from collision when more than one WLAN user tries to transmit at the same time. When the sending SA does not receive an frame within SIFS interval, it assumes that the transmission has been lost and invokes a random backoff procedure prior to retransmitting the packet. Access point SA i SA j Data to SA i DIFS SIFS Backoff window Data to AP SIFS Figure 1. Basic frame exchange sequence of contention-based access.
2 he on-going 80.11e standard [3] additionally specifies a prioritized contention-based access method that provides traffic class differentiation. III A PHYSICAL LAYER 80.11a physical layer is based on orthogonal frequency division multiplexing (OFDM) technology as specified in 80.11a standards [1]. It operates in a 5GHz unlicensed frequency band in both Europe and the US. o study the effect of noise and automatic rate selection in the system, a realistic link simulator to model 80.11a physical layer is needed. By adopting a quasi-static simulation technique presented in Section VI, the simulator is separated into a link simulator and a system simulator. A multi-purpose OFDM link simulator [8] is used to generate a statistical model that describes the relationship among received signal power, packet error rate, packet size, and modulation & coding. his information will then be used by the system simulator to look up the packet error rate using the remaining three factors, viz., received signal strength, packet size, and modulation & coding. During this phase of study, only four different data rates, i.e., 6, 1, 18, and 36 Mbps, are considered. A. Automatic Rate Selection An idealized procedure for automatically selecting transmit rate is used, based on link curves from the link simulator. It is assumed that the path loss information between transmitter and receiver is known to the transmitter prior to selecting a transmit rate. he transmitter can then select the appropriate rate based on path loss information and link curves. A packet error rate before retransmission (PER) of more than 5% is established as a criterion to reduce the transmit rate. Given a current propagation path between transmitter and receiver, the chosen physical transmission rate is the highest rate that can still satisfy the maximum 5% PER criterion. A sample of the operating ranges of each physical transmission rates are depicted in Fig.. he maximum cell radius is chosen such that the PER will equal to 10% at the cell boundary for the lowest physical transmission rate, 6 Mbps. For an indoor office environment, this cell radius equals to 6 meters. LinkSpeed(Mbps) Range (meters) Figure a Link Speed vs. Range IV. ELEPHONY VOICE RAFFIC MODEL he traffic model represents a speech signal using a periodic pulse train, where the periodicity of the pulse train depends upon the coder frame size. We assume that all coders have a 0 milli-second frame size. he process of encapsulating frames into IP packets is commonly referred to as packetization. he size of each packet depends on the rate of the coder, which commonly ranges from 4 Kbps to 64 Kbps. Each conversation is bi-directional, resulting in two s in opposite directions for a single conversation. Both uplink and downlink s are assumed to be independent from one another with the start times randomly distributed over 0 ms period. he lifetime of a packet is also assumed to be 0 ms. V. VOICE CAPACIY MODEL In the absence of hidden terminal, noise, and interference, it is possible to analytically estimate the maximum number of telephony conversations that an 80.11a WLAN AP can support with contention-based access. A. Overview elephony traffic is sensitive to both delay and packet loss. In order to maintain an acceptable quality, we assume that the packet loss rate must be less than or equal to 1% and over 99% of packets experience less than 0 ms delay (e.g. equal to the frame duration). he WLAN system capacity is then defined as the maximum number of full duplex calls that a given AP can support while still maintaining these criteria. he basic frame exchange of a telephony consists of a data frame carrying payload followed by an frame, similar to Fig. 1. he analytic model will estimate a maximum number of s that can be accommodate during a 0 ms period (a single frame) of an IEEE 80.11a AP with multi-rate support under the contention-based access method. he analytical model consists of the contention module and the automatic rate selection module. he contention module considers the effect of contention and collision among users in accessing the medium, whereas the automatic rate selection module considers the effect of switching between multiple transmit rates. It is also important to note that the analytical model is based on two simplifying assumptions: ideal availability of channel state information and an errorfree channel. B. Contention-based Access Under the contention-based access method, each call is treated as a constant bit rate (CBR) connection with both uplink and downlink uni-directional s. he time consumed by a sequence,, is shown in (1). = DIFS + _ + SIFS + (1) and Voice _ PDU Voice PDU are the time to transmit data and frames, respectively. In addition to, the impact from the contention scheme is considered in two phases, backoff phase and collision phase. Both phases are modeled analytically based on a DCF model derived by Bianchi [10].
3 he backoff duration ( backoff ) represents the average backoff interval for a successful packet transmission. It can be calculated as shown in (), where n is the number of backlogged stations and τ is the probability that a station transmits in a randomly chosen slot time. backoff = slot 1 τ () n τ slot equals to a duration of one backoff slot. In a stable system (less than 1% packet loss criteria) with CW min value of 15 slots, the sustained maximum number of backlogged stations at any given time must be less than 15/e = 5., based on a slotted aloha throughput. In our analytical model, n is chosen as 3. he number of backlogged station will be studied further in the simulation results section. τ can be determined by solving (3) and (4) [10], where m is the maximum number of backoff stages. τ (3) = m i 1 CWmin p CWmin ( p) i= 0 n 1 p = 1 (1 τ ) (4) In addition to backoff overhead, a portion of the channel capacity is also unusable from collisions. he average unusable time due to collision per single successful packet transmission ( collision ) is shown in (5) [10]. propagation is the maximum propagation time for the WLAN cell under consideration. collision n 1 (1 τ ) ( ) (5) = Voice _ PDU + DIFS + propagation 1 n 1 n τ (1 τ ) By adding the overheads related to backoff and collision, the amount of time associated with a single (V k ) during a 0 ms period can be obtained by (6). K will be defined in the next subsection. ς κ = + backoff + collision, κ= 1,..., Κ (6) C. Statistical Models of Automatic Rate Selection he central limit theorem is used to determine the effect of automatically selecting a physical transmission rate based on the channel condition. Let s assume that there are N active uni-directional s at any given time in the system. Because a full-duplex call consists of two s, the total number of calls N user that the system can support equals to (N /). Given that each active carries out one frame exchange sequence within a period equal to the frame duration of 0 ms, there are N frame exchange sequences per 0 ms. Let a random variable represents the amount of time consumed by the aggregated calls during the same duration, equals to the summation of time consumed by each call ( i ). Because each user is statistically identical, mean and variance of i are identical for all values of i (i=1,,n ). Since each call is independent from one another, according to the central limit theorem, the mean η and variance σ of random variable equal to the sum of means and variances of random variables i, which equals to N η and i N σ, respectively. Under an i assumption that i is not deterministic (σ 0), the cumulative distribution function (CDF) F( ) of the random variable approaches a normal distribution with the mean η and variance σ as shown in (7). F ( ) = Norm ( η σ Assuming that there are K possible durations of a frame exchange sequence, denoted by V k, where k ranges from 1 to K. If there are N link possible physical transmission rates, there are N link possible values of V k (K = N link ). he probability that a station will uses any given V k duration for its frame exchange sequence is represented by P k, which equals to the probability that a given physical transmission rate is chosen (P k = Prob [k-th link is used]). It is straightforward to derive the mean η i and variance σ i of i, based on the discrete random variable rules. he mean and variance of can then be derived from η i and σ i. he resulting CDF of is shown in (8). F ( ) = Norm ( N σ N i ) η i ) (8) D. Voice Capacity Given the capacity criteria, in which, with 0.99 probability, the time consumed by aggregated calls remains below the system capacity, the maximum capacity of a WLAN AP can be estimated using (9). P 1 frame i [ > frame ] = erfc ( ) Pclipping N N σ i (7) η (9) frame represents the maximum channel capacity available for transmission during a given frame duration, which is 0 ms. he clipping probability or packet loss ratio, P clipping, is limited to be under he maximum number of s can be determined by solving (9) for N. he maximum number of full-duplex calls N user that the system can support for each vocoder rate is equal to N /. Using this analytical model, the capacity of an 80.11a WLAN can be estimated. A set of basic channel access parameters for the contention-based access method can be obtained from the 80.11a standard [1]. he amount of time required by each,, during each 0 ms period depends on both the vocoder rates and link speeds. he probability of each link speed is calculated based on the
4 80.11a range Vs. link speed in Fig., assuming that mobiles are uniformly distributed in a circular region. VI. QUASI-SAIC SIMULAION CONCEP WLAN capacity is additionally estimated using a system simulator that models contention-based access and a noise limited channel. he simulation results are used to validate the theoretical estimates. We use a quasi-static simulation technique, which enables a separation between link simulator and system simulator. At the system level, it is assumed that the link quality remains the same over the duration of each packet transmission. It is also assumed that errors are uncorrelated, i.e., error in prior packet does not influence the probability of error in subsequent packet. Furthermore, it is assumed that the location or distribution of error bits does not have any impact to the packet error rate, which is generally the case with a good interleaver design. Finally, it is also assumed that the CRC never fails. Based on these assumptions, the entire channel state information can be represented by a single SNR value, which remains constant over the packet duration. his SNR value can be obtained from an appropriate pathloss and propagation models. Figure 3. Summary of 80.11a WLAN capacity B. Delay For a delay-sensitive traffic such as, maintaining low and predictable delay is crucial in supporting real time traffic. he CDF for channel access delay is shown in Fig. 4 for 64 Kbps and 16 Kbps vocoder rates. VII. SYSEM SIMULAOR he system simulator is implemented in OPNE Modeler, based on the 80.11a MAC and physical layers. It also employs a statistical model that predicts PER from SNR, packet size, and modulation & coding, which is generated using the link simulator. VIII. SIMULAION RESULS In this section, the simulation results are presented, both to validate the analytic model and to provide insight into other performance metrics. Several vocoder rates, from 4 Kbps to 64 Kbps, and the capacity gain from automatic rate selection are investigated. A. Voice Capacity In Fig. 3, the capacity numbers for an 80.11a AP with contention-based access method are depicted for different combinations of vocoder rates and physical transmission rates. he simulation results are compared with the theoretical estimations from the previous section. As shown in the figure, automatic rate selection increases the WLAN capacity from the fixed 6 Mbps transmission rate. For example, with a 16 Kbps vocoder, 44 users can be supported with automatic rate selection while only 31 users can be supported without automatic rate selection. Additional users can also be supported by using a lower rate vocoder. he number of users increases from 30 to 50 when the vocoder rate decreases from 64 Kbps to 4 Kbps. In all cases, there is only a small difference between the analytical estimate and the simulation results, which can be attributed, in part, to noise in the system. Figure 4. CDF of medium access delay for selected vocoder rates. he effect of automatic rate selection is also presented. For comparison, all curves are depicted when the system reaches its maximum capacity. Even at capacity, virtually all packets experience less than ms in channel access delay, which is much lower than the 0 ms maximum delay criteria. Other simulation results show that delay increases rapidly when the system exceeds its capacity. A comparison between different vocoder rates reveals that delay is lower with lower vocoder rate. he average delay of 16 Kbps is approximately 0.5 ms smaller than the average delay of 64 Kbps. Because a packet from high rate vocoder is larger than a packet from low rate vocoder, with a 64 Kbps vocoder requires more transmission time. Consequently, other users must wait for a longer period for the current transmission to complete, resulting in a longer channel access delay. Additionally, a larger packet is more susceptible to erasure, which results in additional retransmission delay. he impact from multi-rate transmission can also be seen from the figure. Under the same vocoder rate, smaller channel access delay can be achieved via automatic rate selection. he slightly smaller delay results from the higher data rate used in the multi-rate case. However, the shallower
5 CDF curve in multi-rate simulation indicates that there is more delay jitter when automatic rate selection is used. C. Voice Capacity in the Presence of Data Users By appropriately setting up the contention parameters, higher priority can be granted to traffic over data traffic. Nevertheless, the capacity is expected to be slightly lower when data traffic is introduced. From our preliminary simulation results, the traffic is reasonably protected from low priority traffic, resulting in a graceful degradation of capacity. he contention parameter settings and data traffic model are depicted in ABLE 1. From Fig. 5, the capacity decreases by -3 users with 8 HP and 6 FP users. Figure 5. Voice Capacity in the presence of data traffic. D. Number of Stations in Backoff As previously discussed, the number of backlogged station is one parameter of the analytical model. Fig. 6 shows a relationship between packet loss rate (indication of system stability) and stations in backoff. Higher packet loss rate is achieved by increasing the number of stations. he AP is almost always in backoff, having to transmit downlink traffic to all stations. Consequently, backlogged station starts from one and goes up sharply when the packet loss rate is greater than 5%. Additionally, the number of stations in backoff seems to be insensitive to vocoder rate and link speed. ABLE I. SIMULAION PARAMEERS Contention Parameters Value CWmin/CWmax for /HP/FP 15/103; 31/103; 63/103 IFS for /HP/FP DIFS; DIFS+5; DIFS+9 30 Kbps; HP1.1, 00 Data model for HP/FP Kbps with truncated Pareto object size IX. CONCLUSIONS In this paper, both analytic and simulation techniques for estimating capacity using contention-based access are described for 80.11a WLAN. In particular, methods of modeling multi-rate links are described. Five different vocoder rates are considered in the capacity study. he analytic models assume a finite number of mobile stations, multi-rate links, and ideal channel conditions. Results for multi-rate noise limited channels are obtained from system simulation models. Packet erasures are modeled using path loss equations and quasi-static link modeling techniques. Comparisons between the analytic models and simulation results show that the analytic models provide an accurate estimate of capacity. he capacity improvement due to using ideal automatic rate selection instead of a fixed 6 Mbps link ranges from 35% to 55%, depending on vocoder rate. Additionally, the capacity can also be improved with a decrease in vocoder bit rate. REFERENCES [1] ANSI/IEEE Std 80.11a: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications; High-speed Physical Layer in the 5 GHz Band, 1999 [] ANSI/IEEE Std 80.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999 [3] IEEE Standard 80.11e, Media Access Control (MAC) Enhancements for Quality of Service (QoS), Draft 4.0, November 00 [4] M. Veeraraghavan, N. Cocker, and. Moors, Support of services in IEEE wireless LANs, Proceedings of the IEEE INFOCOM 001, pp , 001 [5] E. Ziouva and. Antonakopoulos, CBR packetized transmission in IEEE networks, Proceedings of the Sixth IEEE Symposium on Computers and Communications, pp , 001 [6] D-J. Deng and R-S. Chang, A priority scheme for IEEE DCF access method, IEICE ransactions on Communications, E8-B(1), January [7] I. Aad and C. Castelluccia, Differentiation mechanisms for IEEE 80.11, Proceedings of the IEEE INFOCOM 001, Vol. 1, pp , 001 [8] S. Simoens and D. Bartolome, Optimum Performance of Link Adaptation in HIPERLAN/ Networks, IEEE 53rd Vehicular echnology Conference, Vol., pp , Spring 001 [9] A. Doufexi, S. Armour, A. Nix, and D. Bull, A comparison of HIPERLAN/ and IEEE 80.11a, Symposium on Communications and Vehicular echnology, SCV-000, pp. 14 0, 000 [10] G. Bianchi, Performance analysis of the IEEE distributed coordination function, IEEE Journal on Selected Areas in Communications, pp , Vol. 18, no. 3, March 000 Figure 6. Packet Loss Rate Vs. Number of station in backoff. (80.11a)
Mohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationUsing Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE Networks
Using Dynamic PCF to Improve the Capacity for VoIP Traffic in IEEE 802.11 Networks Takehiro Kawata NTT Email: kawata.takehiro@lab.ntt.co.jp Sangho Shin, Andrea G. Forte Henning Schulzrinne Columbia University
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationEvaluation of the backoff procedure of Homeplug MAC vs. DCF
Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationA Backoff Algorithm for Improving Saturation Throughput in IEEE DCF
A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationJoint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading
Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara
More informationCall Admission Control for IEEE Contention Access Mechanism
Call Admission Control for IEEE 82.11 Contention Access Mechanism Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications, The University of New South Wales, Australia Email:
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationCollision Probability in Saturated IEEE Networks
in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special
More informationIEEE MAC Sublayer (Based on IEEE )
IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National
More informationA Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment
05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationEfficient Transmission of H.264 Video over WLANs
Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More informationEnhancing the DCF mechanism in noisy environment
Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationTwo-Tier WBAN/WLAN Healthcare Networks; Priority Considerations
Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationProviding Throughput Guarantees in IEEE e Wireless LANs
Providing Throughput Guarantees in IEEE 802.11e Wireless LANs Albert Banchs a, Xavier Pérez-Costa a, Daji Qiao b a Network Laboratories, NEC Europe Ltd., Heidelberg, Germany b Real-Time Computing Laboratory,
More informationThe IEEE Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs
International Journal of Wireless Information Networks, Vol. 10, No. 1, January 2003 ( 2003) The IEEE 802.11 Distributed Coordination Function in Small-Scale Ad-Hoc Wireless LANs Eustathia Ziouva and Theodore
More informationProject Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN
Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationChapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du
Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationAGOOD medium access control (MAC) protocol for wireless
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,
More informationIEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir
More informationPROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION
PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationPriority-based Transmission in IEEE Networks
Priority-based Transmission in IEEE 802.11 Networks Tomasz Janczak and Józef Wozniak janczak @ eti.pg. gda.pl., jowoz @pg. gda.pl Technical University of Gdansk Faculty of Electronics, Telecommunications
More informationRemarks On Per-flow Differentiation In IEEE
Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationInfrastructure CSMA/CA Network With Multiple Service Classes
Traffic and QoS Analysis of an Infrastructure CSMA/CA Network With Multiple Service Classes Ritabrata Roy December 13, 2002 Abstract This treatise aims at analysing a CSMS/CA network operating in an access
More informationNotes on the Inefficiency of e HCCA
Notes on the Inefficiency of 802.e HCCA C. Casetti, C.-F. Chiasserini, M. Fiore and M. Garetto Dipartimento di Elettronica, Politecnico di Torino - Italy E-mail: {casetti,chiasserini,fiore,garetto}@polito.it
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationA Modified Medium Access Control Algorithm for Systems with Iterative Decoding
A Modified Medium Access Control Algorithm for Systems with Iterative Decoding Inkyu Lee Carl-Erik W. Sundberg Sunghyun Choi Dept. of Communications Eng. Korea University Seoul, Korea inkyu@korea.ac.kr
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationSolutions to Performance Problems in VoIP Over a Wireless LAN
Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationSupporting VBR VoIP Traffic in IEEE WLAN in PCF Mode
Supporting VBR VoIP Traffic in IEEE 802.11 WLAN in PCF Mode Dongyan Chen*, Sachin Garg**, Martin Kappes** and Kishor S. Trivedi* * Center for Advanced Computing and Communications, ECE Department Duke
More informationA Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs
A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationCSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless
CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationWhen two-hop meets VoFi
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCC 00 proceedings. When two-hop meets VoFi Sathya arayanan *,
More informationMC-CDMA Based IEEE Wireless LAN
MC-CDMA Based IEEE 802.11 Wireless LAN Georgios Orfanos Jörg Habetha Ling Liu Aachen Univ. of Technology D-52074 Aachen, Germany Philips Research Laboratories, D-52066 Aachen, Germany Aachen Univ. of Technology
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationTransmission Control Protocol over Wireless LAN
Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 17 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationA Tool for Simulating IEEE e Contention-based Access
A Tool for Simulating IEEE 802.11e Contention-based Access Andreas Floros 1 and Theodore Karoubalis 2 1 Dept. of Informatics, Ionian University, Plateia Tsirigoti 7, 49 100 Corfu, Greece floros@ionio.gr
More informationQoS Support for Time-Constrained Multimedia Communications in IEEE WLANs: A Performance Evaluation
QoS Support for Time-Constrained Multimedia Communications in IEEE 8. WLANs: A Performance Evaluation José Villalón Francisco Micó Pedro Cuenca Luis Orozco-Barbosa Department of Computer Engineering, Universidad
More informationPerformance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator
Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November
More informationAnalysis of IEEE e for QoS Support in Wireless LANs
Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationAnalyzing the Impact of DCF and PCF on WLAN Network Standards a, b and g
Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b and 802.11g Amandeep Singh Dhaliwal International Science Index, Computer and Information Engineering waset.org/publication/9996677
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationIEEE Wireless LANs
Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points
More informationIEEE Throughput and Delay Analysis for mixed real time and normal data traffic
IEEE 802.11 Throughput and Delay Analysis for mixed real time and normal data traffic Matias Arenas P. and Walter Grote H. Department of Electronic Engineering, Federico Santa Maria Technical U. Avenida
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More informationEnhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead
Enhanced Protection Mechanism for Wireless LAN to Reduce Protocol Overhead 1 Dr.S. Bhargavi Professor, Dept.of ECE SJCIT, Chickballapur E-mail: bhargavisunil@gmail.com 2 Chandra Naik G Asst. Professor,
More informationPayload Length and Rate Adaptation for Throughput Optimization in Wireless LANs
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More informationNovember 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.
IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:
More informationQoS Enhancement in IEEE Wireless Local Area Networks
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com QoS Enhancement in IEEE802.11 Wireless Local Area Networks Daqing Gu and Jinyun Zhang TR-2003-67 July 2003 Abstract In this article, a
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationMobile & Wireless Networking. Lecture 7: Wireless LAN
192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationPerformance Evaluation of IEEE e
Performance Evaluation of IEEE 802.11e 1 Sandeep Kaur, 2 Dr. Jyotsna Sengupta 1,2 Dept. of Computer Science, Punjabi University, Patiala, India Abstract Providing QoS requirements like good throughput
More informationIEEE Ad Hoc Networks: Performance Measurements
IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,
More informationDOMINO: A System to Detect Greedy Behavior in IEEE Hotspots
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication
More informationA Frame Aggregation Scheduler for IEEE n
A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University
More informationEffect of Payload Length Variation and Retransmissions on Multimedia in a WLANs
Effect of Payload Length Variation and Retransmissions on Multimedia in 8.a WLANs Sayantan Choudhury Dept. of Electrical and Computer Engineering sayantan@ece.ucsb.edu Jerry D. Gibson Dept. of Electrical
More informationLesson 2-3: The IEEE x MAC Layer
Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes
More information