New CDMA-Based MAC Protocol for Ad Hoc Networks

Size: px
Start display at page:

Download "New CDMA-Based MAC Protocol for Ad Hoc Networks"

Transcription

1 ew CDMA-Based MAC Protocol for Ad Hoc etworks Thamer Al-Meshhadany and Wessam Ajib Computer ciences Department, Université du Québec à Montréal 2, avenue du Président-Kennedy Montréal, Québec, Canada H2X 3Y7 Phone # 3227; fax thamer@labunix.uqam.ca, ajib.wessam@uqam.ca Abstract It is widely accepted that Ad Hoc networks are at the leading edge of the resear in the domain of wireless networking. These networks are not supported by infrastructure to connect the mobile hosts, thereby they have to be self configured, self organized and the resources have to be allocated in a distributed manner. The medium access control (MAC) layer is seen as the bottleneck for the throughput in wireless Ad hoc networks. Hence, we propose in this work a new Multiannel MAC protocol. The proposed protocol can be based on Code Division Multiple Access (CDMA) or Frequency Division Multiple Access (FDMA). A annel can be represented by one spreading code in CDMA systems or by one frequency band in FDMA case. In our analysis and simulations, we assume that the protocol is based on CDMA tenique. We consider one annel for control packets and multiple annels for transmitting data information. We propose that the reservation of a data cannel is done implicitly using the common annel. We show through computer simulations that our proposition of Multiannel MAC protocol improves significantly the communication performance in wireless Ad Hoc networks, even when the introduced overhead is considered. I. ITRODUCTIO Ad Hoc networks consist of terminals that are distributed in a geographical zone and connected together without infrastructure. Hence, They have to be self configured, self organized and the resources have to be allocated in a distributed manner. The medium access control (MAC) protocol in these networks encounters two major phenomena that limit the network capacity []. These phenomena are the hidden and exposed terminals. The first one causes higher rate of packet collisions; whereas, the second phenomena causes a loss in the resources. Many MAC protocols are proposed to overcome these problems. However, the proposed solutions are in general either of high cost or/and complex and they haven t completely eliminated these problems. In this paper, we propose a new multiannel MAC protocol for wireless Ad Hoc networks. The proposed protocol is based on CDMA tenique and uses spreading codes to identify different annels. However, the method considered in this protocol for annel identification allows us to utilize other multiple access tenique su as Frequency Division Multiple Access (FDMA) tenique where ea annel is represented by a frequency band in one radio transceiver systems. It can also be applied to a multi-radio systems where ea radio transceiver may correspond to one annel. In the proposed protocol, we consider one common control annel on whi RT (Request to send) and CT (clear to send) packets are exanged, and several data annels used for data packets transmission. We assume that time is divided into frames that are also divided into slots. By inserting a synronization interval at the beginning of ea frame in the control annel, the synronization among the terminals is established. The reservation of a particular data annel for one transmission is realized by the control annel. Obviously, all the terminals have to monitor the common control annel in order to identify and reserve the data annel. The rest of this paper is organized as follows. In ection II, we discuss the related works with a particular focus on the CDMA-based protocols. ection III describes our proposed multiannel MAC protocol for wireless Ad Hoc networks. imulation environments and results analysis are presented in ection IV showing the improvement of the performance realized. In terms of simplicity, efficiency and flexibility, a discussion is established in section V. Finally, we conclude this paper in ection VI. II. RELATED WORK MAC protocols based on CDMA for Ad Hoc networks return to [], in whi the authors have proposed two different protocols. According to these protocols, the codes are pre assigned to the terminals. The transmitted packets consist of data and a header used mainly to identify the destination. Hence, the packet s data is transmitted on a transmitter-based code, but the packet s header is either transmitted on a common code (the first protocol) or transmitted on the receiver code (the second protocol). Hence, the number of used spreading codes relies completely on the network size. In the receiving mode, a terminal monitors either a common code, in the first case, or a receiver-based code in the second case. ubsequently, even though the rate of occurred collisions is reduced, the collisions still happen for the packets transmitted on the common code in the first protocol or for the ones transmitted on the receiver code in the second protocol. A pairwise code assignment has been proposed in [2]. It centrally assigns codes to ea transmitter-receiver pair (link) su that no two adjacent edges have the same code. Accordingly, ea terminal must maintain many codes to connect with the neighbored terminals. The overhead, caused by the /07/$ IEEE 9

2 exange and the broadcast of code assignment signalling messages, is relatively high. The number of used codes have been minimized in [3] where the authors have shown that the minimization problem is P-complete. Another way of thought is to make use of handshaking control packets to sense the annel. The handshaking packets were first introduced by MACA (Multiple Access with Collision Avoidance) protocol in [4]. The sender and receiver terminals exange two control packets, namely Ready To end (RT) and Clear To end (CT) before sending the data packet. Two protocols based on common-transmitter based (MACA/C-T) and receiver-transmitter based (MACA/R-T) are proposed in [5]. These protocols can be considered as variants to the ones presented in [] except that the new proposed protocols take into consideration the RT/CT packets. Thus, collisions occur only at the level of the control packets (RT and CT) exange. On the other hand, sending the data with the receiver s code was investigated in [6]. However, it is well-known that the big disadvantage of this kind of protocols is that it can t support multicast services. The authors of [7] have proposed a distributed algorithm of code assignment in whi the number of available codes is at least d (d )+2 where d is the maximum number of one-hop neighbours any terminal can have. An important aracteristic of this protocol is the existence of a common annel that is used to exange the code assignment information between the terminals. In [8], the authors have proposed a dual reservation MAC protocol in whi +2 codes are used ( codes for data, one common code for control messages and one code for broadcasting). Ea terminal has three lists that contain the following information: available codes list, occupied codes list and forbidden codes list. The code used for transmitting data packets between two terminals is dynamically assigned after negotiations using the control messages. A. Muqattash and M. Krunz have proposed a multiannel MAC protocol in [9]. In this proposition, the bandwidth is divided into two frequency annels. One annel is used to exange control messages and the other annel is used for the data transmission. All terminals use the common code on the control annel; whereas, on the data annel, only one code is assigned to ea terminal for data transmission. Although the proposed solution reduces the number of occurred collisions, the hardware implementation is complex and of high cost. In [0], two phases coding multiannel MAC protocol was proposed. They assume that one terminal have to take the responsibility to assign the codes for the terminals in its cell. In fact, this protocol will be more suitable to wireless LA 802. DCF. In [], Asynronous Multiannel Coordination Protocol (ACMP) is devised. It is based on 802. Distributed Coordination protocol (DCF). It uses a dedicated control annel and multiple data annels. The terminals contend on the control annel by exanging RT/CT packets in order to reserve a data annel. III. PROPOED MULTI-CHAEL CDMA-BAED MAC PROTOCOL In this work, we propose a new MAC protocol based on CDMA for Ad Hoc networks. We assume + codes: one common code for RT and CT packets transmission and codes for Data and ACK packets transmission. ubsequently, there are + virtual annels. Time is divided into frames and ea frame is divided into slots. The number of slots per frame in data annel is equal to that one in control annel. In order to ensure the synronization among the terminals, ea control frame starts by a synronization interval (Y). When a terminal wakes up or enters into a geographical zone of one Ad Hoc network, it has to wait until the next synronization interval in order to ensure the synronization with the other terminals. Ea slot in the control annel is divided into two fields. The first is used by the sender to transmit RT packet whereas the second is used by the receiver to respond with CT packet. We assume that the number of slots in one control frame is equal to the number of data annels (codes). Thereby, the slot s number during whi RT/CT packets are exanged between two terminals represents the data annel on whi the data will be transmitted. The procedure of medium access contention is described in the following. All terminals permanently tune to the common code and monitor the control annel. When an active terminal has data to transmit, it waits until the next slot in the control annel and then it transmits a RT packet during the RT field but if the terminal was out of the network coverage or it was inactive, it has to wait firstly until the next synronization interval and then it tries to transmit a RT packet on the first slot in the frame. If this terminal is the only transmitting terminal in this field, the destination terminal will receive correctly the RT packet and will respond with a CT packet. Otherwise, a collision will occur and the collided terminals will backoff for other slots. As all terminals tune to the common code, all terminals overhear the RT/CT packets transmission and they can make benefits from this exanged information. In this work, this is not used because we assume that ea connection is made only for one frame. However, if we extend this work to ensure the reservation for multiple frames, the data s size could be indicated in the RT and/or in the CT packets in order to estimate the number of required data frame. Upon receiving the CT packet, the sender terminal tunes to the corresponding data annel. When the RT/CT packets are successfully exanged and a data frame is reserved, the sender terminal starts transmitting the data at the beginning of the next data annel frame. The destination terminal receives data and replies with an acknowledgment packet on the same data annel. Thus, ea successful RT/CT packets exange reserves only one frame in the data annel. If the sender has more than one data frame, it has to aieve 92

3 Idle annel Frame successful RT/CT exange unsuccessful RT/CT exange Fig.. Data and control frame structure Idle annel Data transmission o RT/CT exange00 Y ACK successful RT/CT packets exange for ea data frame. The procedure is shown in figure. The figure illustrates an example of different successful and unsuccessful RT/CT exanges. We notice that when a RT packet is not transmitted or a RT packets collision occurs (denoted by unsuccessful RT/CT packets exange) during one slot of the common annel, the next frame in the corresponding data annel of that slot will be idle (slots and in frame M). When RT/CT packets exange is successful as in slots 2, 3 and, one data frame is reserved on the corresponding data annel for ea transmission. In this way, the data annel reservation is simply aieved. Contrary to many distributed multiannel MAC protocols for wireless Ad Hoc networks proposed in the literature, our proposed protocol is simple since it uses the slot number as an implicit indicator for the data annel. In other words, when a terminal transmits RT packet in a slot, all terminals including the destination terminal know whi data annel will be used for the transmission of data by the sender. Hence, the terminals do not need to transmit any signalling packets to reserve a data annel. Furthermore, the proposed protocol is able to be extended in order to include more complicated functions su as multiple frame reservation. The information about the annels (corresponding to different codes in CDMA systems) reserved for a particular terminal for data transmission is provided implicitly to the corresponding terminal. A. imulation environments IV. IMULATIO REULT In order to evaluate the performance of our proposed multiannel MAC protocol, our computer simulations are aieved using etwork imulator (-2). As the latter only considers the standard protocols for the medium access control like IEEE 802., Carrier ensing Multiple Access (CMA), Time Division Multiple Access (TDMA) protocols and others that all are based on one annel, we had to modify the protocol of IEEE 802. and TDMA protocols in order to aieve our model implementation. In our simulations, we assume that the maximum number of data annels is eight, hence there is up to eight flows can be simultaneously established during one frame. In other words, sixteen terminals can be connected one-to-one. We also assume there is no interference form one pair connection on another connections. When the number of flows is less than or equal to the number of slots, the maximum throughput can be aieved if we consider no RT packets transmission collision. In the simulations, we consider eight slots per frame, corresponding to eight data annels. We assume that the RT, CT and ACK packets have the same structure and the same size as in 802. standards. The maximum size of data packet is up to 800 bytes. We consider 30 terminals in geographical zone of m 2, in other word, all terminals are in same sensing zone. The traffic generated is Constant Bit Rate CBR. The implementation parameters are depicted in the table I. 93

4 TABLE I IMULATIO MODEL PARAMETER Parameter value Basic rate 2 Mbps (RT/CT) Data rate 2 Mbps (DATA/ACK) Y 44 usec (36 bytes) Packet size 000 bytes RT/CT header 20/4 bytes DATA/ACK header 28/4 bytes Channel switing delay 0 sec cenario 30 terminals slight decrease in the throughput of 802. protocol due to the increases in the rate of packet collisions. Contrary, the throughput with our MAC protocol increases when the packet arrival rate increases. However, our proposition performs the aggregate throughput for Ad Hoc networks in comparison with other protocols. In fact, our proposed protocol does not need any signalling packets to reserve a data annel, contrary to other protocols that need an exange of signaling packets packets whi introduces a waste of time and resources in order to reserve one data annel. In other word, our proposed protocol avoids the Ping-Pong phenomena between the communicated terminals in order to reserve the data annel. B. Results analysis In this section, we provide an evaluation of the performance of our proposed multiannel CDMA-based MAC protocol and we compare it by the performance of IEEE 802. based Ad Hoc network with one annel. Figure 2 depicts the aggregate throughput as a function of the number of annels. We notice from figure 2 that our proposed MAC protocol gives higher throughput in function of the number of used annels. In fact, the throughput (defined by the rate of packets correctly transmitted) of 802.-based Ad Hoc network is almost fixed since only one annel is used. On the other hand, the throughput increases linearly with the number of annels using our MAC protocol. When all annels are used and the number of active terminals (transmitting terminals) is more than the number of annel, the throughput becomes invariant. This behaviour is expected because the saturated case is reaed. Throughput(pkt/s) Our proposition umber of annels Fig. 2. Throughput as a function of number of annels Another profile of results is depicted in figure 3 where the throughput versus the packet arrival rate is provided. When the traffic is low, the behaviour of our proposition likes the behaviours of other propositions including IEEE 802. protocol. But, when the packet arrival rate increases, the performance of 802. gets saturated, even, we notice a Throughput (kbps) Fig DCF Our proposition Packet arrival rate per flow Throughput as a function of packet arrival rate per flow V. DICUIO AD FUTUR WORK This section presents our future works and provides some discussion about the flexibility, simplicity and efficiency that caracterizes our proposed multi-annel MAC protocol based on CDMA tenique. We can say that our proposed seme is efficient, simple and flexible. It is efficient because connections can be aieved at the same time where is the number of used spreading codes that in turn corresponds to the number of slots in one frame in the control annel. The seme is simple because it uses a simple algorithm of code allocation. By the the number of the slot used for control packets, the sender terminal implicitly tells the destination terminal about the data annel on whi the data will be transmitted. Moreover, the proposed seme is flexible because its structure is open for future developments. The protocol can be applied to systems that use FDMA as access tenique. Even, the protocol can be applied to the actual 802. system if we consider that one annel is used as control annel and the rest of annels as data annels. The data annel is reserved during the control annel monitored by all terminals. In this work, a terminal can establish only one connection because it has only one simple transceiver but if this terminal 94

5 has multi-transmitters and multi-users detection receiver, it can reserve up to connections during one frame under certain conditions, i.e. this terminal can use all the data codes at the same time. Our proposed MAC protocol can be improved in order that ea terminal will be able to reserve the necessary frames by using only one RT/CT packets exange. The sender terminal has to indicate the amount of transmitted data in order to estimate the number of required data frames. A data annel can be simply reserved by adding busy tone at the beginning of the corresponding slot in the control frame. The busy tone will prevent the other terminals to contend on this annel. The impact of Multiple Access Interference MAI on the resources allocation is not studied in this work. Hence, in order to complete this work, the impact of MAI and the power control must be studied. [] J. hi, T. alonidi and E. W. Knightly, tarvation Mitigation Through Multi-Channel Coordination in CMA Multi-hop Wireless etworks, MobiHoc 06, May VI. COCLUIO In this paper, we presented the Multiannel MAC Protocol and its use in wireless ad hoc networks to improve network performance. The most significant advantage of this protocol is that several connections can occur concurrently using multiple annels. The annel allocation and identification are simply aieved by transmitting RT/CT packet in one slot in the control annel. The slot s number represents the number of a corresponding data annel. By this, the hidden and exposed terminals are eliminated. We evaluated the performance using the ns-2 simulator in term of throughput when the multiannel MAC protocol in wireless ad hoc networks is used. The evaluation results show that higher network throughput can be obtained. REFERECE [] E.. OUA and J. A. ILVETER, preading Code Protocols for Distributed pread-pectrum Packet Radio etworks, IEEE Transactions on communications, Vol. 36, o. 3, Mar 988. [2] L. Hu, Distributed Code Assignements for CDMA Packet Radio etworks, IEEE/ACM Transactions on etworking, Vol., o. 6, December 993. [3] A. A. Bertossi and M. A. Bonuccelli, Code Assignment for Hidden Terminal Interference Avoidance in Multihop Packet Radio etworks, IEEE/ACM Transactions on etworking, Vol. 3, o. 4, August 995. [4] P. Karn, MACA-A ew Channel Access Method for Packet Radio, ARRL/CRRL Amateur Radio Computer etworking Conf., 990.* [5] M. Joa-g and I-Tai Lu, pread pectrum Medium Access Protocol with Collision Avoidance in Mobile Ad-Hoc Wireless etwork, IFOCOM 99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications ocieties, Volume 2, pp: , 2-25 Mar 999. [6] R. Fantacci, A. Ferri and D. Tari, A MAC tenique for CDMA based Ad-Hoc network, IEEE Wireless Communications and etworking Conference, pp: , Mar [7] J. J. Garcia-Luna-Aceves and J. Raju, Distributed assignment of codes for multihop packet-radio networks, in Proc. MILCOM, pp: ,, vol., 997. [8] M. Jia, H. Chen and Y. Yuan, A Dual Reservation MAC Protocol based on CDMA for Ad hoc etworks, Asia-Pacific Conference on Communications, pp: 53-56, October [9] A. Muqattash and M. Krunz, CDMA-Based MAC Protocol for Wireless Ad Hoc etworks, MobiHoc 03:The Fourth ACM International ymposium on Mobile Ad Hoc etworking and Computing, pp: 53-64, June [0] L. Zhang, B-H oongtwo-phase Coding Multiannel MAC Protocol With MAI Mitigation for Mobile Ad Hoc etworks, IEEE Communications letters, Vol. 8, o. 9, eptember

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks

A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks A Jamming-Based MAC Protocol for Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering National Chiao Tung University

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Link Layer II: MACA and MACAW

Link Layer II: MACA and MACAW Link Layer II: MACA and MACAW COS 463: Wireless Networks Lecture 5 Kyle Jamieson [Parts adapted from J. Kurose, K. Ross, D. Holmar] Medium access: Timeline Packet radio Wireless LAN Wired LAN ALOHAnet

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS Five-Phase Reservation Protocol A single-channel time division multiple access (TDMA)-based broadcast scheduling protocol. Nodes use a contention

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks

A Jamming-Based MAC Protocol to Improve the. Performance of Wireless Multihop Ad Hoc. Networks A Jamming-Based MAC Protocol to Improve the Performance of Wireless Multihop Ad Hoc Networks Shiang-Rung Ye, You-Chiun Wang, and Yu-Chee Tseng Department of Computer Science and Information Engineering

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 fjamal,

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C.

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C. Published in IET Communications Received on 14th April 2008 Revised on 20th March 2009 Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks P.C.

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks P.Sivanesan Department of Information Technology Kurinji College of Engineering and Technology Tiruchirappalli, Tamilnadu, India

More information

Wireless Local Area Network (IEEE )

Wireless Local Area Network (IEEE ) Wireless Local Area Network (IEEE 802.11) -IEEE 802.11 Specifies a single Medium Access Control (MAC) sublayer and 3 Physical Layer Specifications. Stations can operate in two configurations : Ad-hoc mode

More information

Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies

Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies European Wireless 2009 1 Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies Anders Grauballe, Mikkel Gade Jensen, Achuthan Paramanathan,

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

IEEE Ad Hoc Networks: Performance Measurements

IEEE Ad Hoc Networks: Performance Measurements IEEE 8.11 Ad Hoc Networks: Performance Measurements Giuseppe Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 561 Pisa, Italy Email: g.anastasi@iet.unipi.it Eleonora Borgia,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control

Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Achieving MAC Fairness in Wireless Ad-hoc Networks using Adaptive Transmission Control Zhifei Li School of Computer Engineering Nanyang Technological University Singapore, 639798 Sukumar Nandi Dept. of

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks

Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks Accurate and Energy-efficient Congestion Level Measurement in Ad Hoc Networks Jaewon Kang Computer Science Rutgers University jwkang@cs.rutgers.edu Yanyong Zhang Electrical & Computer Engineering Rutgers

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control

A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Proceedings of the World Congress on Engineering and Computer Science 28 WCECS 28, October 22-24, 28, San Francisco, USA A QoS Enabled MAC Protocol for Wireless Ad hoc Networks with Power Control Mahasweta

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Exploiting Processing Gain in Wireless Ad Hoc Networks Using Synchronous Collision Resolution* Medium Access Control Schemes

Exploiting Processing Gain in Wireless Ad Hoc Networks Using Synchronous Collision Resolution* Medium Access Control Schemes Exploiting Processing Gain in Wireless Ad Hoc Networks Using Synchronous Collision Resolution* Medium Access Control Schemes John A. Stine The MITRE Corporation McLean, VA -758 Abstract Signal spreading

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Lecture 6 Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence

Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Fine-Tuning the Femtocell Performance in Unlicensed Bands: Case of WiFi Co-existence Sima Hajmohammad Université du Québec à Montréal Montreal, Canada haj mohammad.sima@courrier.uqam.ca Halima Elbiaze

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information