Co-existence of WiFi and ZigBee
|
|
- Blaise Andrews
- 5 years ago
- Views:
Transcription
1 Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1
2 Coexistence of ZigBee and WiFi Spatial coexistence ZigBee (monitoring & control) WiFi (Internet access) Frequency-domain coexistence (spectrum sharing) 20MHz Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 2 2
3 State-of-art for coexistence management Both ZigBee and WiFi rely on built-in MAC mechanism CSMA/CA, i.e., Listen-Before-Talk Designed for same type of devices Is the built-in CSMA/CA effective? Some small-scale measurement studies show: severe collisions occur under moderate-to-high WiFi traffic Evidence from the real-world: In a 90-ZigBee-node network for building energy monitoring: 50+% ZigBee nodes suffer connection loss during WiFi peak hours. [C-J. M. Liang, N. B. Priyantha, J. Liu, and A. Terzis, Surviving Wi-Fi Interferenc e in Low Power ZigBee Networks, in Proc. of ACM SenSys 2010] Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 3 3
4 Why CSMA fails? Heterogeneous MAC/PHY properties => coexistence difficulty Scheduling conflict ZigBee has TDMA which is incompatible with WiFi s CSMA direct collision Disparate transmit power levels WiFi : around15 dbm; ZigBee: below 0 dbm asymmetric interference WiFi s transmissi on range Asymmetric inter ference region ZigBee s transmi ssion range Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 4 4
5 Collision occurs even if both use CSMA and can hear Disparate time resolution: MAC-layer time slots: 9us for WiFi, but 320us for ZigBee WiFi s preemption of ZigBee Different communication mechanisms OFDM for WiFi; DSSS for ZigBee No negotiation mechanism Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 5 5
6 New solution: Cooperative Busy Tone (CBT) Principles of CBT: Make ZigBee visible to WiFi, without interfering with ZigBee s transmission Allow ZigBee to coexist and contend with WiFi in frequency, spatial, and temporal domains Preserve carrier-sensing-based spectrum etiquette Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 6 6
7 CBT Overview WiFi client signaler ZigBee TX ZigBee signaler DATA switching time ACK WiFi AP ZigBee TX WiFi TX CCA, backoff DATA ACK A separate node (signaler) emits a busy-tone to make WiFi aware of ZigBee The busy tone harbingers the data pkt, and continues throughout the DATA-ACK transmission, so as to prevent WiFi s preemption. Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 7 7
8 Challenges and solutions How to prevent the busy-tone from interfering with the ZigBee data packet? => Frequency flip When should the signaler send the busy-tone? => CBT scheduler Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 8 8
9 Signaler frequency flip Avoids signaler interfering with ZigBee data packet: Busy tone Transmitter sends data packet on some channel Signaler sends busy-tone on an adjacent channel Returns to the original channel after sending the busy-tone Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 9 9
10 Busy-tone scheduler objectives Schedule the signaler s busy-tone to: Reduce WiFi s preemptions of ZigBee transmissions Minimize negative influence on WiFi performance Protect both TDMA and CSMA modes of ZigBee Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 10 10
11 Busy-tone scheduler: TDMA mode CCA attempts frequency flip Harbinger time How early can signaler start the first CCA, harbinger time? H s H s too large: busy-tone wastes channel time too small: no idle slot may be sensed, aborting busy-tone H s Analytical framework: relates H s to network performance an d optimizes it. Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 11 11
12 Busy-tone scheduler: CSMA mode backoff CCA switching frequency flip Key parameter: busy-tone duration T b T b T b too large: busy-tone wastes channel time too small: data/ack may not be protected Analytical framework: relates to network performance and makes a tradeoff between channel utilization and the effectiveness of CBT Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 12 T b 12
13 Performance analysis and parameter optimization Network model: Topology: ZigBee and WiFi networks co-located with signal er within WiFi xmitter s sensing range ( ) Traffic: Poisson with arrival rates and Parameters: λ Traffic intensity, z Λ λ Λ Transmit power, z w Use legacy ZigBee or CBT w λ z S z W t λw Z Topology: ZigBee xmitter within range of WiFi xmitter ( ) t W t or not ( ) Z t W t Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 13 13
14 Performance analysis and parameter optimization, cont d Performance metrics: Normalized throughput: and Approach: Γ z Γw Assume ZigBee does not affect WiFi traffic (low power and low duty-cycle) Analyze collision probability under each parameter setting Analyze throughput based on collision probability: Focus primarily on temporal collision probability Incorporate spatial collision probability (capturing node locations and capture effect) Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 14 14
15 ZigBee s TDMA with WiFi Collision probability of legacy ZigBee Tag an arbitrary packet from ZigBee xmitter, and calculate its collision probability with randomly arriving W t packets (assuming ZigBee does not affect WiFi s traffic) Z t Collision probability of CBT Relate CCA failure rate to harbinger time H s Relate collision probability to CCA failure rate Collision probability as a function of,,, etc. Γ w Γ z H s Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 15 15
16 ZigBee TDMA mode with WiFi, cont d Network performance: Z t Model transmission attempts of as a renewal reward process ZigBee throughput = mean reward rate = Prob.[no collision] data packet size Average amount of data sent within an attempt Mean service time of a data packet Includes retransmission, ACK, and switching time WiFi throughput approximated using a simpler model: Depends on whether or not Z W Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 16 t t 16
17 ZigBee s CSMA with WiFi Performance of legacy ZigBee Derive mean service time, based on a Markov chain model BS i : i-th backoff & CCA stage P tx: Transmission probability (after CCA) P d : Data packets collision probability P : ACK packets collision probability a Depends on WiFi s traffic intensity Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 17 17
18 ZigBee CSMA mode with WiFi, cont d Performance of CBT : Similar Markov chain model Also depends on key parameter: busy tone duration Tb T b If = data packet duration + max backoff&cca duration, then collision probability 0 Otherwise, the collision probability is bounded: Bound depends on T b Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 18 18
19 Spatial collision probability I e Probability that a packet cannot be decoded, given that temporal collision already occurred (Accounts for capture effect and random node locations) Approximate I e in a random topology: Result: Depends on transmit power Λ z, Λ w and capture threshold 19 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 19
20 Evaluation results Simulation Implementation of CBT (TDMA & CSMA modes) in ns-2 Real experiments Legacy ZigBee: based on openzb in TinyOS, running on micaz motes CBT: implementation of signaler in GNURadio, running on USRP2 software radio Synchronize USRP signaler to micaz coordinator for CBT s TDMA, using short notification messages Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 20 20
21 Temporal collision probability ZigBee= 250Kbps, 8pkts/s, 63B/pkt Markers = simulation results; lines = analytical results Analysis matches simulation CBT significantly reduces collision rate of data/ack pkts Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 21 21
22 Spatial collision probability Prob. that ZigBee cannot decode collided pkt (accounting for capture effect and random node locations) d t Zt W t Zt W t Out of interference range Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 22 22
23 Normalized throughput: TDMA mode Sweet spot CBT makes 2 throughput improvement under moderate to high WiFi traffic Negligible degradation of WiFi throughput, compared to legacy ZigBee CBT may have lower throughput than legacy under light WiFi traffic (a sweet spot exists) Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 23 23
24 Impact of harbinger time in TDMA mode Larger K larger more overhead, higher ZigBee m H s throughput under high WiFi interference Under low duty-cycle ZigBee traffic (below 0.05), WiFi throughput is virtually unaffected by harbinger time Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 24 24
25 Experimental testbed configuration Node locations: Nodes A and B are WiFi All other nodes are ZigBee (MICAz motes) Only TDMA mode implemented CBT signaler implemented in GNURadio on USRP2 software radio 25 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 25
26 Testbed results: Collision probability (TDMA mode) For randomly selected links: CBT reduces collision rate by 60+% for most links Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 26 26
27 Testbed results: Impact on WiFi (TDMA mode) WiFi packet delay: CBT and legacy ZigBee have similar effects on WiFi p erformance WiFi performance essentially unaffected when ZigBee traffic load < 2% Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 27 27
28 Conclusions Traditional CSMA fails in heterogeneous networks Due to disparate MAC/PHY properties CBT resolves collision between ZigBee/WiFi Busy-tone scheduler: ensure busy-tones protect data pkts Frequency flip: preventing signaler/transmitter interference Stochastic models for performance analysis and optimization Extensions to other heterogeneous networks: WiFi/Bluetooth ( ), WiFi/WiMax (802.11y), whitespace networks, Macro- and femto-cells (MobiCom 10),. Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 28 28
MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES
MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES N.Meenakshi 1 1 (M.E Communication Systems, Anna University, Chennai, India, meenu.ece19@gmail.com) Abstract- The wireless local area network
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationImpact of IEEE n Operation on IEEE Operation
2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini
More informationIEEE modifications and their impact
Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationModeling of Partially Overlapping Wireless Personal Area Networks
Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationPresented by: Murad Kaplan
Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More information4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.
4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data
More informationZigBee/ David Sanchez Sanchez.
ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationPractical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren
Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationAvailability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks
Sensors 2009, 9, 2088-2116; doi:10.3390/s90302088 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationLecture 17: Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationWireless Sensor Networks 8th Lecture
Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationCoordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks
Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member,
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationEmbedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş
More informationBridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang
Bridging Link Power Asymmetry in Mobile Whitespace Networks Sanjib Sur and Xinyu Zhang University of Wisconsin - Madison 1 Wireless Access in Vehicles Wireless network in public vehicles use existing infrastructure
More informationLiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink
LiRa: a WLAN architecture for Visible Light Communication with a Wi-Fi uplink Sharan Naribole, Shuqing Chen, Ethan Heng and Edward Knightly Naribole Visible Light Communication System (VLC) Dual-purposing
More informationMAC protocols for ad hoc networks
MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationPage 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance?
Overview 18-759: Wireless Networks Lecture 15: WiFi Self-Organization Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/
More informationSpatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication
Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Ziwen Zhao, Sebastian S. Szyszkowicz, Tamer Beitelmal, Halim Yanikomeroglu Carleton University Ottawa, Canada Contents
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Wireless Links, WiFi, Cellular Internet Access, and Mobility Slides derived from those available on the Web site of the book Computer Networking, by Kurose
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationTarek Sheltami. CCSE COE 3/8/2008 1
Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationGranting Silence to Avoid Wireless Collisions
Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route
More informationExperimental Validation of a Coexistence Model of IEEE and IEEE b/g Networks
Experimental Validation of a Coexistence Model of IEEE 802.15.4 and IEEE 802.11b/g Networks Wei Yuan, Xiangyu Wang, Jean-Paul M. G. Linnartz and Ignas G. M. M. Niemegeers Philips Research, High Tech Campus
More informationScienceDirect. Evaluating the Energy Overhead Generated by Interferences within the 2.4 GHz Band for a Hybrid RFID Network
Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 69 ( 2014 ) 210 215 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, 2013 Evaluating the Energy
More informationCOEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT
COEXISTENCE MODEL OF ZIGBEE& IEEE 802.11b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT Neha Gandotra, Vishwanath Bijalwan, Manohar Panwar Abstract IEEE 802.15.4 standard is used for low rate, short distance
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless
More informationDouble-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs
Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationLocally Scheduled Packet Bursting for Data Collection in Wireless Sensor Networks
Locally Scheduled Packet Bursting for Data Collection in Wireless Sensor Networks Ren-Shiou Liu, Kai-Wei Fan, Prasun Sinha Dept. of Computer Science and Engineering, The Ohio State University, 395 Dreese
More informationErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference
ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference Daniele Croce, Pierluigi Gallo, Domenico Garlisi, Fabrizio Giuliano, Stefano Mangione, Ilenia Tinnirello Department of Electrical
More informationCS 410/510 Sensor Networks Portland State University
CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute
More informationDesign and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005
Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationMetronome: Spectrum Sharing in Heterogeneous Wireless Networks. Ramki Gummadi (MIT)
Metronome: Spectrum Sharing in Heterogeneous Wireless Networks Ramki Gummadi (MIT) Joint work with Hari Balakrishnan (MIT) Srinivasan Seshan (CMU) COMSNETS 2009 1 Motivation Heterogeneous wireless n/w
More informationLecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW
Lecture 25: 802.11 CSE 123: Computer Networks Alex C. Snoeren HW4 due NOW Lecture 25 Overview 802.11 Wireless PHY layer overview Hidden Terminals Basic wireless challenge RTS/CTS Virtual carrier sense
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationCross-layer Analysis of the End-to-end Delay Distribution in Wireless Sensor Networks
Cross-layer Analysis of the End-to-end Delay Distribution in Wireless Sensor Networks unbo Wang, Mehmet C. Vuran and Steve Goddard Department of Computer Science and Engineering University of Nebraska-Lincoln
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More information