Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free

Size: px
Start display at page:

Download "Physical Layers MAC - Layer. Contention Free Service used for. Contention Service. used for. time bounded traffic and for contention free"

Transcription

1 Analyzing and Improving the IEEE MAC Protocol for Wireless LANs Jost Weinmiller, Hagen Woesner, Adam Wolisz Electrical Engineering Department Technical University Berlin, Sekr. FT5 Einsteinufer 25, Berlin, Germany Abstract 1 The MAC-part of the upcoming IEEE standard for wireless LANs - named 2 is based on a CSMA/CA-type access protocol with a rotating backo window and an optional RTS/CTS message exchange. In this paper, following a short presentation of we will present the results of our simulative analysis of focussing on analysis and improvements of the basic key mechanisms - the RTS/CTS message exchange and the backo algorithm. 1 Introduction Wireless LANs (WLANs) are expected to be a major growth factor for the network industry in the upcoming years. They will be used as an extension of the wired network with a wireless last link to attach the large number of mobile terminals. In order to avoid limitations of mobility due to technical boundaries, standardization is currently under work for the IEEE standard specifying physical layer (PHY) and media access control (MAC) for wireless LANs [1] as well as for the ETSI HIPERLAN [2] standard with the same task. In this paper we concentrate on the analysis of the MAC part of the IEEE protocol. In order to gain experience on the characteristics of this newly designed protocol we simulated a network cell with several stations using the Distributed Coordination Function (DCF) as the access scheme. We focussed our simulations on two key mechanisms - the backo mechanism that incorporates the collision avoidance functionality and the RTS/CTS message exchange intended to solve the hidden terminal problem in wireless LANs. 1 This work was funded by the German Research Agency DFG with a grant in the Priority Program 'Mobile Communication' 2 Distributed Foundation Wireless Medium Access Protocol In the second section we briey describe the draft standard for, in the third section we present our simulations concerning the backo mechanism followed by section 4 where we present the results of our simulations on the RTS/CTS message exchange. The paper is concluded by pointing out open questions and directions for future work. 2 Contention Free Service used for time bounded traffic and for contention free asyncronous traffic Power Saving PCF Superframe Structure BB-IR Inter Spaces RTS/CTS Contention Service used for asyncronous traffic DCF CSMA/CA with rotating backoff FH-SS DS-SS Figure 1: Structure of the Concept The IEEE standard will oer two operation modes - a distributed coordination and a centralized point-coordination mode. The MAC-part of the IEEE working group's proposal - - de- nes an access mechanism based on a CSMA scheme with collision avoidance that applies a rotating backo window mechanism. Optionally this mechanism is extended by an RTS/CTS message exchange to increase robustness towards hidden terminal scenarios. Further elements of the proposal are dierent minimal interframe spaces that enable prioritized access for urgent Physical Layers MAC - Layer

2 control messages on the one side, for the point coordination function on the other side. In point coordinated mode both coordination modes share the bandwidth usage in a superframe structure. This enables contention and contention-free service for all kinds of time-bounded, synchronous or asynchronous trac. A power saving-mode is additionally specied. The elements of the standard are illustrated in Figure 1 Generally, a station that intends to transmit and senses the channel busy will wait for the end of the ongoing transmission, then waits for a time period of DIFS 3 length, and then randomly selects a time slot within the backo window. If no other station started transmitting before this slot is reached (i.e another station that selected an earlier slot) it starts its own transmission. Collisions can now only occur in the case that two stations selected the same slot. If another station selected an earlier slot, the station freezes its backo counter, waits for the end of this transmission and now only waits for the slots remaining from the previous competition. (Figure 2) This access mechanism can optionally be extended Station A Defer Station B Defer Station C Station D DIFS Defer Backoff Backoff Remaining Backoff = Contention Window Figure 2: Access Scheme by the RTS/CTS 4 message exchange: After gaining access to the medium and before starting transmitting the data packet itself a short control packet is sent to the receiving station announcing the upcoming transmission. This packet is answered by a packet to indicate the readiness to receive the data. Both packets contain the projected length of the transmission and thus inform all stations within radio-range of both stations how long the channel will be used. The RTS/CTS message exchange has been designed to solve the hidden terminal problem: The successful exchange of the two small messages reserves the space 3 Distributed coordination Inter Space 4 Ready To Send / Clear To Send within range of the receiver and the sender for the intended transmission guaranteeing an undisturbed media for the longer data packet. 3 The Backo Mechanism The following section does not attempt to present a complete analysis of the problem but describes it in a qualitative way: As described before, the protocol attempts to give longer waiting stations an increasing possibility to gain access to the medium with the help of reduced wait-intervals after each lost competition. On the other hand, collisions only occur if two or more stations select the same slot. (These stations have to reenter the competition with an exponentially increasing value i.e. twice, 4-times if they collide again etc.) We will show, that these two facts in the design of the access mechanism has significant inuence on the system`s performance. 3.1 Probability distributions of slot selection We will take a look at the contention window and the probability that a certain slot within the contention window is selected. We assume several stations are continuously competing for access to the medium. In initial state this scheme results in an equally distributed probability for each slot to be selected. (Figure 3a) In the following cycle all stations p n (x) 0 p n (x) p n (x) Fig a slot selection probability caused by stations remaining from the previous cycle slots slot selection probability caused by new or returning stations 0 Fig b slots - selected 0 Fig c slots Figure 3: Slot selection probability distribution that have already been competing for access in the cycle before all have reduced their backo time by Selected (if Selected represents the winning slot). Still within this reduced contention window (from 0 to (- Selected)) all slots are selected with the same probability by the remaining stations.

3 If a station newly enters the competition or returns from a collision they will choose their slot with equally distributed probability however within the whole range of the contention window. This results in a slot selection probability as shown in Figure3b, the slots later than - Selected have a signicant lower probability to be chosen compared to the slots before this mark. In equilibrium state (Figure3c) after several cycles, we see that slots positioned early in the contention window have a much higher probability to be chosen. The result is a decreasing staircase function for the slot selection probability. This however causes a very much unwanted eect: slots that are more likely to be chosen also are more likely to be chosen twice or more times, in which case a collision would result. This fateful connection of slot selection probability, collision rates and resulting performance parameters can be seen in our simulations in Figure 4-6. An equally distributed probability for every slot to be chosen is the favored situation in terms of collision avoidance. 3.2 Modications of the Backo Mechanism The trivial method to solve this problem would be to have remaining stations select a new random backo time within the whole contention window in every cycle again. This however results in a certain possibility that a station waits forever to gain access - there is no mechanism to limit the maximal wait time which would make this design unsuitable for support of QoS guarantees. We investigated two other approaches to solve this problem, both of them attempt to keep the newly entering stations out of the way of the stations that have lost the previous competition i.e. away from the early slots Weighted Selection Probabilities We started o with the idea to have stations, that arrive new in the competition, select later slots with higher probabilities. We heuristically used dierent probability functions for the slot selection probabilities starting from a linear increasing function to functions of higher order. Since the distribution function for all slot selections has to be 1 for x=, the slot selection probability function changes into: f(x) = n + 1 xn n n+1 0; 1 x For the linearly increasing probability function (n=1) we don't get signicantly improving behavior, however we achieve higher throughput with increasing exponents n up to a certain maximum. We got best results with n in the area of 10. The obvious drawback of this scheme is that even if load is low in the WLAN and thus there would be no need to choose late slots since no stations are waiting for access from previous cycles the late slots are chosen anyway. This causes a slight increase in average access delay but since delay caused by collision adds up much more to the overall delay the reduced collision probability of the modied scheme can be considered advantageous (as shown in section 3.3) Load Adaptive Selection The second approach limits newly entering stations to slots that undoubtedly are not selected by stations from the previous cycle. If the winning slot in the previous competition cycle was at position Selected, all the other stations that lost this competition cycle will have a slot position below (- Selected). Therefore we restrict new entering stations in their slot selection process to the slots between (- Selected) and i.e. if slot 4 was the winning slot in the previous competition and there are 32 slots overall, new stations only get to chose between slot 29 and 32. We can assume that, if the network is running under high load, that the winning slot in the previous competition is likely to have been positioned early in the contention window since this small backo time is likely to be the remains of a larger backo time from the competition cycles before. Early position of the winning slot is a sign of `rough' competition and can eventually be interpreted as a sign of high load. Our scheme can thus be seen as a load adaptive scheme applying dierent degrees of access control depending on the load. 3.3 Simulations and Results For our simulations we used PTOLEMY [3], an object oriented simulation tool, developed at the University of California Berkeley which proved suitable for our intentions due to its ability for concurrent process oriented simulations. We simulated a WLAN that uses 's distributed coordination function as the access scheme with a network throughput of 2Mbit/s. Our setup involves 8 stations with and without hidden terminals. The channel and packet source model is basically the same as it is described in [4], i.e. poisson distributed packet sources in a wireless channel model. In addition to that we simulated the signal run time, which can be left out if one only considers a range of a microcell, but which becomes considerable at distances of m and more.the packet sources are simulated as Poisson processes with an attached

4 innite queue, the packet sizes are read from a trace le of an Ethernet [5]. We simulated with the following xed values: DIFS=32ms, Slottime=4ms, PHY preamble= 30 byte, min=32 Slots, max=256 Slots, RTS/CTS o. The values for DIFS and slottime for have been dened longer later on - over 30ms for DIFS and s for the (DSSS-)slottime slot # slot # slot # Fig. a Fig b Fig. c Figure 4: Distribution of slot selection for a) DFW- MAC, b) weighted, c) load adaptive scheme Our results show a signicantly better distributed slot selection probability for our modied schemes. (Slots above are only selected from colliding stations that choose their backo slot in the enlarged contention window. Therefore the more slots are selected above the more collisions have occurred.) Figure 4a shows the expected steady decrease in slot selection towards later slots, Figure 4b obviously has more equally distributed slot selections, however still shows a good number of selections beyond, i.e. has more collisions than the third scheme in Figure 4c. Figure 5 presents the corresponding collision rates where the advantages of the two modied schemes become obvious.. The remarkable result of the above gure is, that under high load, we get almost no collisions for the load adaptive scheme. The lower rate of collisions of course results in a signicant increase in throughput and decrease in mean access delay (Figure6). The peak for the collision rate of the load adaptive Throughput in % Load adaptive scheme Weighted Backoff Delay in ms Weighted Backoff Load adaptive scheme Figure 6: Throughput and mean access delay over load, all three schemes % of collided packets scheme in the lower load range (Figure5) results from the fact that at this point there may be many stations entering the contention phase at one time, that, if limited to few slots, will collide. This obviously is inuenced by the simulation approach, especially the source modelling (innite queue). In order to `atten` the collision rate curve, our rst intention was to work not with the latest number of free slots, but with a mean of the last n cycles. This didn`t lead to any signicant improvement - the collision rate even increased with n. Nevertheless, this mean seems to be a good measure for the overall net load. In another aporiginal scheme % of collided packets simplified scheme Weighted Figure 7: Load adaptive schemes (original and simpli- ed version) compared to Load adaptive Figure 5: Collision rates over load, all three schemes proach we conducted one promising simulation where every station selects from those slots, that were later than its own last winning access, no matter if this happened in the previous cycle or any time before that. I.e. if that station last gained access with slot p, it

5 will select its next slot in the range between -p and. This mechanism also does not demand continuous monitoring of the network and its main advantage is that dierent stations have dierent ranges to select from at the same time. We performed simulations of this simpler strategy (Figure 7). The result shows slightly lower collision rates in the low load range but also slightly higher collision rates for higher load. 4 RTS/CTS Message Exchange In radio networks the 'hidden terminal scenario' poses a special problem on MAC design. This scenario is explained in Figure 8: If station B is send- RTS A B C D CTS =Area of reception from Station B =Area of reception from Station C =Area of reception from StationB and C + + =reserved space after RTS/CTS Figure 8: Hidden Terminal Situation ing to station C the medium appears busy only for the stations located within the range of the sending station B - other stations cannot sense a signal and consider the medium idle. Therefore station D might start a transmission since it does not notice B's ongoing transmission. However since the receiving station C is within range of B and D and thus receives two signals at once it will not receive any undisturbed signal (whether destined for it or not). This collision however cannot be detected at the sending station B unless it notices the lacking acknowledgment from station C after a certain time-out. 4.1 RTS/CTS in To solve this situation the RTS/CTS mechanism, developed in [7] and analyzed in [8], has been integrated into : Each station competes for access as described in section 2. When the RTS/CTS mechanism is applied, the winning station does not send data packets right away but sends a RTS packet to the receiving station, that responds with a CTS packet. If a station captures a RTS packet from another station and it is not the destination of the RTS packet it reads the intended transmission duration from the RTS packet and stays silent for that time. The same happens if only a CTS packet is received i.e. by a station outside of the transmission range of the sender but within the range of the receiver. This guarantees that all stations within range of either sender or receiver have knowledge of the transmission as well as of the duration of it. The eects of the RTS/CTS mechanism are as follows It increases bandwidth eciency by its reduced collision probability since the ongoing transmission has been made known everywhere within the range of it It increases bandwidth eciency since if collisions occur they do not occur with the long data packets but with the relative small control packets It decreases bandwidth eciency since it transmits two additional packets without any payload It decreases bandwidth eciency since it reserves geographical space for its transmission where or when it might actually not need it. Due to the above listed eects of the RTS/CTS mechanism, the draft standard allows its usage but does not demand it. Usage policy is set on a per-station-basis with the help of a manageable object RTS Threshold, determining the payload-size, above which RTS/CTS should be used. This parameter is not xed in the draft standard and has to be set separately by each station. The packet size is the only parameter that is used to decide whether the mechanism is applied. 4.2 RTS/CTS in the hidden terminal scenario As explained above the RTS/CTS mechanism was introduced to solve the hidden terminal problem. Therefore our rst simulations intended to evaluate the eects of this mechanism in this case. We continued with simulations on RTS/CTS in the fully meshed case to determine dependencies and usage parameters. We simulated the following scenario: 8 stations are present in a cell, where station 1 is "hidden" to stations 2 and 3, and vice-versa. All of the \outer" stations (1,2 and 3) try to send data to the \inner" stations. The positions and the destinations of data trac are shown in Figure9. The result of these simulations (Figure10 without RTS/CTS and Figure11 with RTS/CTS) was that using the RTS/CTS message exchange does not completely solve the hidden terminal problem, even though signicant improvements can be achieved.

6 Meter Meter Figure 9: Map of the stations in the hidden terminal simulation Throughput per station in % stations 5,7 stations 4,6 station 8 stations 1,2,3 Offered Load per station in % Figure 10: Throughput per Station, Hidden Terminals, RTS/CTS o Throughput per station in % all other stations stations 2,3 station 1 Offered Load per station in % Figure 11: Throughput per station, Hidden Terminals, RTS/CTS on The breakdown of inbound data trac in the case of higher load stems from the fact that the mutually hidden stations become synchronized by an earlier data exchange in the area between them. In result, they start their backo counters at the same time but they are unable to detect the begin of transmission of the other station. Figure10 shows, that the stations that are hidden to other stations hardly get any packets through due to the above mentioned synchronization eect. The stations that attempt to send towards the `hidden stations' have signicantly lower throughput than the two stations 5 and 7 that only send to non-hidden stations. The rst group successfully gets packets through, however many acknowledgment packets are destroyed by trac from the hidden stations. Figure11 shows that still the hidden terminal scenario is not solved: Station 1 still hardly gets any packets through, but its throughput is improved compared to the gure without RTS/CTS. The same goes for stations 2 and 3 - all of the hidden stations benet from the captured CTS packets. The non-hidden terminals all achieve the same (high) throughput due to the fact that outbound trac is protected by the RTS packets. 4.3 Determining RTS Threshold In order to determine the RTS Threshold parameter, we simulated a scenario with 8 stations without hidden terminal scenario. We determined the gain or loss of throughput and delay versus load, if RTS/CTS is used, depending on the packet size. Since the packet size on the wireless channel consists of the MAC-layer packet size and the physical layers preamble the length of this latter part has to be taken into account when determining the RTS Threshold parameter. Our simulations gave larger "best" values for RTS Treshold for larger physical preambles (Figure 12). Since this physical preamble has dierent lengths depending on the channel used - for the dened physical layers in the specication those values are 128 bits plus a variable number of stu bits for the 2.4GHz FHSS channel, 192 bits for the 2.4GHz DSSS channel and between 96 and 112 slots of 250ns length plus 32 bits for the baseband infrared channel - this value has to be taken into account when conguring the RTS Threshold parameter. This gets even more dicult in the case of the 2.4GHz FHSS channel as well as for the infrared channel, where no xed length is added but a variable number of bits or timeslots, respectively. We can say that for the proposed PHY preamble sizes of the draft standard we recommend, based on our simulations, a value of around byte MPDU size for the RTS threshold.

7 Total throughput in % RTS/CTS on Total throughput in % RTS_threshold =256 RTS/CTS off RTS/CTS on Fig. a Total throughput in % Fig. b RTS/CTS off RTS_threshold= RTS/CTS on RTS/CTS off Fig. c Figure 12: Throughput vs. Load, a) PHY preamble=0 bytes b) PHY preamble=30 bytes a) PHY preamble= bytes 4.4 Asymmetric Usage Policy The use of RTS/CTS in the draft standard is managed on a per-station basis. This can result in asymmetric congurations in the network, e.g. one station does never use the mechanism, all the others do. We simulated such an asymmetric conguration to determine whether the stations behaving dierent than the rest might win performance at the cost of the others, whether they will loose or whether they will cause degradation of the overall network performance. The results can be seen in Figure 13. It showed that Total throughput per group in % using RTS/CTS not using RTS/CTS % Offered Load per group Figure 13: Throughput vs. Load 4 Stations use RTS/CTS, 4 Stations don't there is no individual gain for a station which does (for whatever reason) not behave like the others, but that there is a small decrease in the overall performance. 5 Conclusions In the previous sections we presented the results of our simulative analysis of two key mechanisms within the distributed coordination function MAC protocol - the backo strategy and the RTS/CTS message exchange. Without adding much to the protocols complexity we can gain up to 25% in throughput and decrease the average access delay at about % by applying a modied backo scheme. We also showed that the RTS/CTS mechanism does not completely solve the hidden terminal case, however some improvements can be achieved. In our future work we will experiment with dierent approaches how to apply the RTS/CTS mechanism e.g. based on load condition. One (or several) experienced collision may be interpreted as a sign for high load making the use of RTS/CTS advisable - the next attempt to access the media would have to be preceded by a RTS/CTS exchange. Another topic for further work could be the exploitation of the hidden terminal scenario: Since the collision can only occur at the receiving side of the communication it is not necessary to reserve space around the sending side. A station only hearing the RTS packet and the data packets but not the CTS packet can assume, that it is out of range of the receiving station and thus will not disturb the ongoing upstream communication (downstream ACKs will be disturbed!). References [1] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specications, Draft Standard IEEE , P802.11/D1; The editors of IEEE [2] HIPERLAN Functional Specication Section 6 MAC Layer, Draft Version 0.6, ETSI Secretariat, December 1994 [3] PTOLEMY, anonymous ftp site: ftp.ptolemy.eecs.berkeley.edu, www: Copyright The Regents of the University of California. [4] A Wireless MAC Protocol comparison, W. Diepstraten; IEEE working paper P /51, May 1992 [5] High Time-Resolution Measurement and Analysis of LAN Trac: Implications for LAN Interconnection; W Leland, D Wilson; INFOCOM '91, ftp://ftp.bellcore.com/pub/wel /Lel- and+wilson INFOCOM 91.ps.Z [6] On the Self-similar nature of Ethernet trac (extended version), W. Leland et al.ieee Transactions on Networking, Vol 2, No 1, Feb 1994 [7] MACA - A new Channel Access Method for Packet Radio, P. Karn, ARRL/CRRL Amateur Radio 9th Computer Networking Conference, Sept [8] MACAW: A Media Access Protocol for Wireless LAN's; V. Bharghavan, A. Demers, S. Shenker, L Zhang, SIGCOM 94

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs

Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Presented at IFIP TC6 Workshop Personal Wireless Comm. April 95 Prague, Czech Rep. Analyzing the RTS/CTS Mechanism in the DFWMAC Media Access Protocol for Wireless LANs Jost Weinmiller*, Hagen Woesner*,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV Wireless networks 1 Overview Wireless networks basics IEEE 802.11 (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV 2 Wireless Networks Autonomous systems of mobile hosts connected by wireless

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Remarks On Per-flow Differentiation In IEEE

Remarks On Per-flow Differentiation In IEEE Remarks On Per-flow Differentiation In IEEE 82.11 Imad Aad and Claude Castelluccia PLANETE project, INRIA Rhône-Alpes ZIRST - 655, Avenue de l Europe - Montbonnot. 38334 Saint Ismier Cedex - France [imad.aad,

More information

Analysis of IEEE e for QoS Support in Wireless LANs

Analysis of IEEE e for QoS Support in Wireless LANs Analysis of IEEE 802.11e for QoS Support in Wireless LANs Stefan Mangold, Sunghyun Choi, Guido R. Hiertz, Ole Klein IEEE Wireless Communications, December 2003 Presented by Daeseon Park, Student No.2005-30231

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS

EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

A Finite State Model for IEEE Wireless LAN MAC DCF

A Finite State Model for IEEE Wireless LAN MAC DCF First International Conference on Emerging Trends in Engineering and Technology A Finite State Model for IEEE 802.11 Wireless LAN MAC DCF Dillip Kumar Puthal and Bibhudatta Sahoo Department of Computer

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Enhancing the DCF mechanism in noisy environment

Enhancing the DCF mechanism in noisy environment Enhancing the DCF mechanism in noisy environment 1 LICP EA 2175 Université de Cergy-Pontoise 3 Av Adolph Chauvin 9532 Cergy-Pontoise France Email: {adlen.ksentini, mohamed.naimi}@dept-info.u-cergy.fr Adlen

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

Effect of Hidden Terminals on the Performance of IEEE MAC Protocol

Effect of Hidden Terminals on the Performance of IEEE MAC Protocol Effect of Hidden Terminals on the Performance of IEEE 8.11 MAC Protocol Sumit Khurana, Anurag Kahol, Anura P. Jayasumana Colorado State University Ft. Collins, Colorado, U.S.A. fkhurana, kaholg@cs.colostate.edu,

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information