A More Reliable and Efficient Usage of the 5,9 GHz Band for Cooperative ITS
|
|
- Julian Wheeler
- 5 years ago
- Views:
Transcription
1 A More Reliable and Efficient Usage of the 5,9 GHz Band for Cooperative ITS Katrin Sjöberg, Halmstad University 4 th ETSI TC IT Workshop, February 7-9, 2012
2 Cooperative ITS Wireless communication is one of the key components to achieve cooperative ITS No communication no cooperation Focus herein is on ad hoctechnologies, i.e., ITS-G5/IEEE p Road traffic safety applications Broadcasted position messages and hazard warnings 2 Cooperative = acting together willingly for a common goal
3 ETSI ITS-G5 3 Profile standard of IEEE p Physical and medium access control layers ES Adapting p to the European spectrum Requirement on Decentralized Congestion Control (DCC) Management Applications Facilities Network&Transport Access Technologies Security
4 ETSI ITS-G5 MAC Carrier sense multiple access with collision avoidance(csma/ca) Senses the channel before transmitting Predetermined listening period Backoff procedure invoked if channel sensed busy Only invoked once due to broadcast communicatoin Problems: Cannot handle overloaded situations! Scalability problem leads to unbounded channel access delay and simultaneous transmissions 4 Medium access control (MAC) is responsible for scheduling transmissions and minimize interference.
5 Challenges for Cooperative ITS supporting road traffic safety [ad hoc, ad hoc, ad hoc, ad hoc, ad hoc, ad hoc, ad hoc, ad hoc, ad hoc] SCALABILITY The performance of the vehicular ad hoc network (VANET) is very much dependent on the number of ITS equipped vehicles within radio range! 5
6 STF395 The scalabilityissueleadtoinvestigationswithinwg4 in ETSI TC ITS Phase 1 (finished) Develop decentralized congestion control(dcc) for ITS-G5 Main goal: tokeepthe networkstable(controlthe networkload) Tools: restrictdata trafficinjected, usedifferent transfer rates and power control Co-existence between ITS-G5 and CEN DSRC Phase 2 (finished, described herein) InvestigateiftimeslottedMAC approachesfor VANET is able to cope with the scalability issue 6 STF = Specialist Task Force
7 Time-slotted MAC approaches Time Division Multiple Access Carrier Sense Multiple Access 7
8 STF395 phase 2 Two time slotted MAC approaches were investigated in the VANET scenario with broadcast data traffic Self-organizing time division multiple access (STDMA) Mobile slotted Aloha(MS-Aloha) Both STDMA and MS-Aloha have been benchmarked against CSMA/CA of ITS-G5 Two technical reports(tr) have been produced No DCC mechanisms have been investigated 8
9 STDMA Alreadyin commercialusein a collisionavoidancesystems for the shipping industry Automatic Identification System (AIS) NodesareALWAYS grantedchannelaccess regardlessofthe numberofnodesin the system More nodes than slots: The nodesselecta slotfor transmission at the same timeas the node situated furthest away from itself Channel access is always GUARANTEED! Can handle overloaded situations! Needssynchronization, position information and supports fixed packet sizes determined by the transfer rate 9
10 MS-Aloha Specifically designed for VANET Each node appends to its frames a frame information(fi) field containing info about the perceived slot allocation Prevention of URBAN HIDDEN TERMINALS 3-hop coordination to MINIMIZE INTERFERENCE Implicit ACKNOWLEDGEMENTS also in broadcast More nodes than slots: Slot reuse based on received power levels Channel access is always GUARANTEED! Pre-emption: leveraged for COEXISTENCE with CSMA/CA Needs synchronization and support fixed packet sizes determined by the transfer rate 10
11 STDMA simulations 2 Hz/800B, 25 dbm Highway scenario 12 lanes In the blue curve of CSMA, it is not restricted to 25% channel load, as usually foreseen in ITS-G5. STDMA can reach more than 4 times better performance than CSMA! The red curve shows CSMA result for 25% channel load. 44 vehicles/lane/km ~ 260 vehicles within 500 m from every TX 11
12 MS-Aloha simulations Urban scenario 4 Hz/800B, 20 dbm Lightly loaded network: No benefits expected from DCC If PDR is restricted to the reception by nodes in the centre of crossroads, the difference gets higher: ~30% CSMA/CA and ~90% MS-Aloha at 0-20metres Here interference by HT is heavier and reception is safety critical HT prevention is coupled with scalability under heavy congestion (additional simulations) 12
13 Conclusions STDMA and MS-Aloha utilize the frequency band more efficiently due to scheduling STDMA and MS-Alohacanloadthe channelto100% and aboveif necessary STDMA and MS-Aloha provide a higher reliability Transmissions are synchronized and scheduled in space STDMA and MS-Aloha are scalable Allows coordinated simultaneous transmissions CSMA needs congestion control methods Candegradeperformanceofroad trafficsafetyapplicationsin the long run A time-slottedmac approach is a viablesolution for a second generation of ITS equipped vehicles A migration pathfrom CSMA toa time-slottedmac protocolis not yet specified 13
14 STF395 phase 2 information Twotechnicalreports(TR) havebeenproducedand they are publicly available at TR STDMA recommendedparameters and settings for cooperative ITS TR Performance evaluation of self-organizing TDMA as medium access control method applied to ITS STF395 phase 2 members Katrin Sjöberg, Halmstad University, Sweden (STF leader) Riccardo Scopigno, ISMB, Italy Dieter Smely, Kapsch, Austria Elisabeth Uhlemann, Halmstad University, Sweden 14
15 Thankyou for your attention Questions? 15
DECENTRALIZED CONGESTION CONTROL FOR ITS G5
DECENTRALIZED CONGESTION CONTROL FOR ITS G5 ETSI STF469 Dieter Smely 6 th ITS Workshop, Feb 2014, Berlin, Germany ETSI 2013 All rights reserved Overview Introduction Basics Solutions Conclusions 2 ETSI
More informationETSI ITS Workshop, 7 9 February 2012, Doha
ETSI ITS Workshop, 7 9 February 2012, Doha Session 3: EC Mandate for CEN and ETSI Standardization Christoph Wöste, Chairman TC ITS WG4 ETSI 2012. All rights reserved WG 4 (Media and Medium Related) Activities
More informationChallenging Vehicular Scenarios for Self-Organizing Time Division Multiple Access
EUROPEAN COOPERATION IN THE FIELD OF SCIENTIFIC AND TECHNICAL RESEARCH EURO-COST 1 SOURCE: Institute of Telecommunications, Technische Universität Wien, Vienna, Austria 2 Christian Doppler Laboratory for
More informationComparing LIMERIC and DCC Approaches for VANET Channel Congestion Control
Comparing LIMERIC and DCC Approaches for VANET Channel Congestion Control Bin Cheng Joint work with Ali Rostami, Marco Gruteser Rutgers University, USA Gaurav Bansal, John B. Kenney Toyota InfoTechnology
More informationMAC Protocols for VANETs
MAC Protocols for VANETs Alexandru Oprea Department of Computer Science University of Freiburg Click to edit Master subtitle style Ad Hoc Networks Seminar Based on: Hamid Menouar and Fethi Filali, EURECOM
More informationMedium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks
Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks Md. Imrul Hassan ihassan@swin.edu.au Centre for Advanced Internet Architecture (CAIA) Swinburne University of Technology
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationENSC 427, Spring 2012
ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO
More informationJoint usage of p and LTE-V2V for reliable control of heterogeneous vehicle platoon
Joint usage of 802.11p and LTE-V2V for reliable control of heterogeneous vehicle platoon Outline Introduction and Motivation Platoon management Communication solutions (LTE-V2V and 802.11p) Research plans
More informationMAC Layer Performance of ITS G5
MAC Layer Performance of ITS G5 Optimized DCC and Advanced Transmitter Coordination 4 th ETSI TC ITS Workshop Doha, February 7-9, 2012 Marc Werner, Radu Lupoaie, Sundar Subramanian, Jubin Jose mwerner@qualcomm.com
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationBasic RF properties. World Class Standards. Dieter Smely. Workshop; July 2011 Ispra. ETSI All rights reserved
CEN DSRC / ITS-G5 coexistence Basic RF properties Workshop; July 2011 Ispra Dieter Smely ETSI 2011. All rights reserved Workshop, Coexistence between CEN DSRC and ITS-G5 Index Signal properties Interference
More informationMd. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne University, Australia
Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC with and without Retransmissions Md. Imrul Hassan, Hai L. Vu, and Taka Sakurai Centre for Advanced Internet Architectures, Faculty of ICT Swinburne
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationVANETs. Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe
VANETs Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute for Telematics, University of Karlsruhe April 15 th 2005 Marc Torrent Moreno 1 Main Motivation
More informationTechnical Report Intelligent Transport Systems (ITS); STDMA recommended parameters and settings for cooperative ITS; Access Layer Part
TR 102 861 V1.1.1 (2012-01) Technical Report Intelligent Transport Systems (ITS); STDMA recommended parameters and settings for cooperative ITS; Access Layer Part 2 TR 102 861 V1.1.1 (2012-01) Reference
More informationTowards Real-Time Media Access in Vehicular Ad-Hoc Networks
Towards Real-Time Media Access in Vehicular Ad-Hoc Networks Steffen Moser, Jochen Weiß and Frank Slomka Institute of Embedded Systems/Real-Time Systems Faculty of Engineering and Computer Science Ulm University,
More informationETSI TC ITS WORKSHOP February 2011 Venice Italy. ETSI All rights reserved
ETSI TC ITS WORKSHOP 09-11 February 2011 Venice Italy ETSI 2011. All rights reserved WG1 STANDARDIZATION ACTIVITIES Lan LIN, Hitachi, ETSI TC ITS WG1 Vice-Chairman ETSI 2011. All rights reserved Transportation
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationComparing LIMERIC and DCC approaches for VANET Channel Congestion Control
Comparing LIMERIC and DCC approaches for VANET Channel Congestion Control Gaurav Bansal, Bin Cheng, Ali Rostami, Katrin Sjoberg ɕ, John B. Kenney, and Marco Gruteser Toyota InfoTechnology Center, USA Rutgers
More informationarxiv: v2 [cs.ni] 31 May 2017
A Geometric Analysis Method for Evaluation of Coexistence between DSRC and Wi-Fi at 5.9 GHz Seungmo Kim and Carl Dietrich Tx vehicle s Tx range Colliding vehicle s Tx range arxiv:75.8954v [cs.ni] 3 May
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationEffect of Transmission Parameters on Efficiency and. Reliability of V2V Networks
Effect of Transmission Parameters on Efficiency and Reliability of V2V Networks Raymond Yim Mitsubishi Electric Research Labs 21 Broadway, Cambridge MA 2139, USA yim@merl.com Fei Ye University of Washington
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationIntelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014
Intelligent Transportation Systems Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014 Outline Wireless Access for Vehicular Environments (WAVE) IEEE 802.11p IEEE
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationResVMAC: A Novel Medium Access Control Protocol for Vehicular Ad hoc Networks
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 109C (2017) 432 439 The 8th International Conference on Ambient Systems, Networks and Technologies (ANT 2017) ResVMAC:
More informationPERFORMANCE ANALYSIS OF V2V DSRC COMMUNICATIONS WITH RECONFIGURABLE ANTENNA
19th ITS World Congress, Vienna, Austria, 22/26 October 212 AP-74 PERFORMANCE ANALYSIS OF V2V DSRC COMMUNICATIONS WITH RECONFIGURABLE ANTENNA Rong-Terng Juang Automotive Research & Testing Center, Taiwan
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationA Novel Mac Based Congestion Control System for VANET with Adaptive Routing
A Novel Mac Based Congestion Control System for VANET with Adaptive Routing Mahanthgouda 1, Sridhara. K 2 1 M. Tech, Department of Electronics and Communication Engineering Poojya Doddappa Appa College
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationImproving Safety Messages Dissemination in IEEE e Based VANETs Using Controlled Repetition Technique
2010 Sixth International Conference on Wireless and Mobile Communications Improving Safety Messages Dissemination in IEEE 802.11e Based VANETs Using Controlled Repetition Technique Ghazal Farrokhi, Saadan
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationDeep Learning-aided Application Scheduler for Vehicular Safety Communication
Deep Learning-aided Application Scheduler for Vehicular Safety Communication Mohammad Irfan Khan, François-Xavier Aubet, Marc-Oliver Pahl, Jérôme Härri EURECOM, Campus SophiaTech, 45 route des Chappes,
More informationMAC + PHY Modeling & Multilayer Simulation of DSRC V2V Network
MAC + PHY Modeling & Multilayer Simulation of DSRC V2V Network Cynthia Cudicini - MathWorks 2015 The MathWorks, Inc. 1 Vehicular Communications Vehicle-to-Vehicle (V2V) Vehicle-to-Infrastructure (V2I)
More informationMEDIUM ACCESS CONTROL IN VEHICULAR NETWORKS BASED ON THE UPCOMING IEEE P STANDARD
MEDIUM ACCESS CONTROL IN VEHICULAR NETWORKS BASED ON THE UPCOMING IEEE 802.11P STANDARD Katrin Bilstrup,, Elisabeth Uhlemann,, and Erik G. Ström, Centre for Research on Embedded Systems, Halmstad University,
More informationObservations on OMNeT++ Real-Time Behaviour
Observations on OMNeT++ Real-Time Behaviour Christina Obermaier, Christian Facchi 7. September 2017 Outline 1. Inter Vehicle Communication 2. HIL Testing with OMNeT++ 3. Timing Observations 4. Conclusion
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationA Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network
A Hybrid MAC Mechanism for Multiple Load Intelligent Vehicle Transportation Network Yuan LIU 1, Yuhao WANG* 1, Siyue CHEN 2, Xiao LI 1 and Zhengfa RAO 1 1 Department of Electronic and Information Engineering,
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationTDMA-based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis and Open Research Issues
TDMA-based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis and Open Research Issues Mohamed Hadded, Paul Muhlethaler, Anis Laouiti, Rachid Zagrouba, Leila Azouz Saidane To cite
More informationThe Challenges of Robust Inter-Vehicle Communications
The Challenges of Robust Inter-Vehicle Communications IEEE VTC2005-Fall Marc Torrent-Moreno, Moritz Killat and Hannes Hartenstein DSN Research Group Institute of Telematics University of Karlsruhe Marc
More informationV2X Communications for Autonomous Driving Roadmap for WiF-V2X and Cellular-V2X. Jérôme Härri IEEE Vehicular Networking Conference November 27 th 2017
V2X Communications for Autonomous Driving Roadmap for WiF-V2X and Cellular-V2X Jérôme Härri IEEE Vehicular Networking Conference November 27 th 2017 Cooperative Communication for Automated Driving - WiFi-based
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationG 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob
G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationUncoordinated Multiple Access for Vehicular Networks
Uncoordinated Multiple Access for Vehicular Networks Mikhail Ivanov, Fredrik Brännström, Alexandre Graell i Amat, Petar Popovski Chalmers University of Technology, Gothenburg, Sweden Aalborg University,
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationEnabling Efficient and Accurate Large-Scale Simulations of VANETs for Vehicular Traffic Management
Enabling Efficient and Accurate Large-Scale Simulations of VANETs for Vehicular Traffic Management 1, Felix Schmidt-Eisenlohr 1, Hannes Hartenstein 1, Christian Rössel 2, Peter Vortisch 2, Silja Assenmacher
More informationCHAPTER 4 CROSS LAYER INTERACTION
38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationITS Standardization. Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech
ITS Standardization Oyunchimeg Shagdar, Inria Thierry Ernst, Mines Paris Tech JNCT: Les Journées Nationales des Communication dans les Transports 29 Mai 2013 ITS: Intelligent Transportations Systems Systems
More informationCAR 2 CAR Communication Consortium
CAR 2 CAR Communication Consortium DCC Workshop Audi, Ingolstadt, Germany July 11 th 2012 ETSI DCC Standardization Activities Report of the ETSI STF 420/447 activities Jérôme Härri, EURECOM Joint work
More informationReducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories
, October 21-23, 215, San Francisco, USA Reducing Message Loss in DSRC Networks using Dynamic Distribution of Safety Messages over EDCA Access Categories Mohammad A. Alsmirat, Saleh Yousef Al-Rifai, and
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/
More informationEL2745 Principles of Wireless Sensor Networks
EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology
More informationAnalysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs
Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs, Felix Schmidt-Eisenlohr, Moritz Killat, Jérôme Härri, Hannes Hartenstein Decentralized Systems and Network Services
More informationVANET Protocols DSRC, WAVE, IEEE 1609, IEEE p, Priority
VANET Protocols DSRC, WAVE, IEEE 1609, IEEE 802.11p, Priority Fall 2010 Dr. Michele Weigle CS 795/895 Vehicular Networks References WAVE Overview R. Uzcategui and G. Acosta-Marum, "WAVE: A Tutorial", IEEE
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationVANETs. When applications drive communications. Institute of Telematics, University of Karlsruhe. Decentralized Systems and Network Services
VANETs When applications drive communications Marc Torrent-Moreno, Prof. Hannes Hartenstein Decentralized Systems and Network Services Institute of Telematics, University of Karlsruhe Marc Torrent Moreno
More informationModeling of Partially Overlapping Wireless Personal Area Networks
Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationSupporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
sensors Article Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies Ali Balador 1,2, *, Elisabeth Uhlemann 1, Carlos T. Calafate 3 and Juan-Carlos Cano 3 1
More informationRequirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC)
Requirements Analysis of IP and MAC Protocols for Dedicated Short Range Communications (DSRC) James T. Yu, jyu@cs.depaul.edu School of Computer Science, Telecommunications, and Information Systems DePaul
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More information3 rd ETSI TC ITS Workshop Session 7
3 rd ETSI TC ITS Workshop Session 7 Motorway operator s expectations towards ITS cooperative systems standardization Jacques Boussuge, Director Operations, ASECAP/ASFA 11/02/2011 ASECAP Association Européenne
More informationEnhancing Vehicular Ad-hoc Network (VANET) Performance by Congestion Control Algorithm
International Journal of Computer Networks and Communications Security VOL. 4, NO. 6, JUNE 2016, 177 182 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Enhancing
More informationLecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW
Lecture 24: 802.11 CSE 123: Computer Networks Stefan Savage HW4 due NOW About the final Similar in style to midterm Some combination of easy questions, short answer and more in-depth questions Sample final
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationData Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication
Data Dissemination in Ad Hoc Networks Based on Inter-Vehicle Communication Lars Wischhof, Prof. Hermann Rohling {l.wischhof, rohling}@tu-harburg.de Technical University of Hamburg-Harburg, Germany Overview
More informationA Simulation Framework for V2V Wireless Systems
A Simulation Framework for V2V Wireless Systems CHRISTIAN NELSON, CARL GUSTAFSON, FREDRIK TUFVESSON DEPARTMENT OF ELECTRICAL AND INFORMATION TECHNOLOGY, LUND UNIVERSITY, SWEDEN IN COLLABORATION WITH ALEXEY
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationMC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety
RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering
More informationA SURVEY AND QUALITATIVE ANALYSIS OF MAC PROTOCOLS FOR VEHICULAR AD HOC NETWORKS
MENOUAR LAYOUT 9/18/06 3:34 PM Page 2 I NTER-VEHICULAR C OMMUNICATIONS A SURVEY AND QUALITATIVE ANALYSIS OF MAC PROTOCOLS FOR VEHICULAR AD HOC NETWORKS HAMID MENOUAR AND FETHI FILALI, EURECOM MASSIMILIANO
More informationCONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS
CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS Five-Phase Reservation Protocol A single-channel time division multiple access (TDMA)-based broadcast scheduling protocol. Nodes use a contention
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationChapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.
Chapter 6 Local Area Networks and Media Access Control School of Info. Sci. & Eng. Shandong Univ. 6.1 MULTIPLE ACCESS COMMUNICATIONS FIGURE 6.1 Multiple access communications FIGURE 6.2 Approaches to sharing
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More information