, while the capacity scales as Θ (n)

Size: px
Start display at page:

Download ", while the capacity scales as Θ (n)"

Transcription

1 Scalability of Wireless Networks Capacity with ower Control Wang Hei Ho and Soung Chang Liew Department of Information Engineering he Chinese University of Hong Kong {whho4, Abstract eference [] showed that wireless networks with capacity scalable with the number of nodes, n, are achievable in theory. he transport capacity scales as Θ ( n), while the capacity scales as Θ (n). eference [2], on the other hand, showed that the capacity of IEEE 802. networks does not scale with n due to its carrier sensing mechanism. he previous work, however, has not considered the use of power control. he main contributions of this paper are two-fold: ) the demonstration that 802. networks are scalable with power control; 2) however, with power control, an enhanced MAC protocol called Selective Disregard of NAVs (SDN) can achieve substantially higher capacity. Specifically, capacity within 90% of the theoretical optimal capacity of infrastructure networks is achievable. Keywords Wireless Networks, WLAN, ower Control, 802., Network Capacity, Scalability, CSMA/CA, Ad-hoc Networks I. INODUCION hysical-interference and protocol carrier-sensing constraints against simultaneous transmissions by links [] [2] limit spatial re-use in wireless networks. he physical-interference constraints are due to a receiver s inability to decode its signal when the powers received from other interfering signals are large. he protocol carrier-sensing constraints are due to the carrier-sensing mechanism of the multi-access protocol used [2]. he 802. carrier-sensing constraints, in particular, cause the 802. network capacity to be non-scalable [2]. A variant of 802. for achieving scalable capacity, Selective Disregard of NAVs (SDN), was introduced in [2]. he main idea of SDN is to eliminate those 802. carrier-sensing constraints that are extraneous. Without power control, the original 802. networks are non-scalable, but SDN networks are [2]. he previous work, however, has not considered the use of power control. his paper considers the implication of power control for capacity scalability in 802. and SDN wireless networks. II. SIMULANEOUS-ANSMISSION CONSAINS WIH OWE CONOL A. Constraints of SDN SDN removes the extraneous 802. carrier-sensing constraints so that the capacity is largely limited only by the physical-interference constraints [2]. So, the constraints in SDN are basically physical-interference constraints. We model the interference constraints using a pair-wise interference model []. Consider the power relationship from node a to node b, ( a, b) = k a / r, where (a, b) is the power received by node b from the transmission by node a, a is the transmit power of node a, r is distance between the two nodes, >2 is the path-loss exponent, and k is a constant. Let i and i denote the transmitter and receiver of link i. For brevity, we will also use i and i to denote their positions in the following. Consider two links, and 2. With no power control (i.e., = 2 = = 2 ), link 2 can interfere with link if 2 < K () 2 < K (2) 2 < K (3) 2 < K (4) where K > (e.g., 0dB) is the power margin required for proper signal detection. Constraints () (4) correspond to DAA-DAA collision, DAA-ACK collision, ACK-DAA collision and ACK-ACK collision, from link 2 to link respectively. Similarly, link can also interfere with link 2 with four constraints of the same form. When power control is introduced, the transmit powers of nodes, 2, and 2 may be different. Assuming all nodes use the same receive power threshold, constraints () (4) become 2 < K 2 (5) 2 < K 2 (6) 2 < K 2 (7) 2 < K 2 (8) B. Constraints of 802. For 802. wireless networks, in addition to the constraints in Section A, protocol carrier-sensing constraints further limit the network capacity. Consider links and 2 again, and suppose that link is transmitting. hen, assuming all nodes use the same carrier-sensing power threshold, link 2 cannot transmit to link if any of the following constraints holds [2]: < VCSange( ) (9) 2 < VCSange( ) (0) 2 < CSange( ) () 2 < VCSange( ) (2) 2 < VCSange( ) (3) 2 < CSange( ) (4) 2 where VCSange( a ) is the virtual carrier sensing range due to the transmissions of S/CS by node a with transmit power /05/$ IEEE 70

2 a ; and CSange( a ) is the physical carrier sensing range due to the DAA transmission by node a. A similar set of inequalities can be obtained when we consider the case where link transmits first. he case of no power control is a special case in which VCSange( a )=VCSange and CSange( a ) =CSange, where VCSange and CSange are constants. III. LINK-INEFEENCE GAH FO HYSICAL CONSAINS Node Graph Carrier Sensing Link i-graph capacity per unit area will reach a limit eventually as the number of As increases. hat is, more As do not bring about higher capacity! Intuitively, if power control is introduced so that VCSange and CSange are also scaled by the size of grids, some of the inter-grid interferences can be prevented and we should observe network capacity that scales with node density. CSange xange CSange xange Link Link 2 (a) Figure. Mapping of a network topology a) to b) i-graph. A Link-Interference Graph (i-graph) can be used to represent the physical constraints graphically. In an i-graph, an arrow-shape vertex represents a wireless link with the arrowhead pointing toward the receiver. here is a directional interference edge (i-edge) from vertex 2 to vertex if any of the constraints (5) (8) is satisfied. Figures a and b show an example of mapping a network topology to an i-graph. IV. SCALABILIY OF NEWOK CAACIY: ANALYICAL DISCUSSION Consider an infinitely large infrastructure-mode wireless network with multiple Access oints (A) laid out in a grid topology. Each grid is associated with an A, which serves as the base station for the clients located within the grid. Clients are randomly placed within the grid. What would happen to the total network capacity when we increase the number of As by reducing the grid size, while maintaining the same number of clients per A? he increase of node density as such is analogous to decreasing the scale on which a map is drawn (Figure 2). he location (x,y) is translated to (ax,ay), where a <. If the distance between two nodes before scaling is d, the distance after the transformation is ad. For SDN without power control, we only need to consider constraints () (4). hey are invariant to this scaling, as a on both sides of the inequality will cancel out. hus, the expected network capacity per unit area will scale with the number of As. his is because the expected capacity of a smaller grid is the same as the expected capacity in the original larger grid before transformation. d d3 d2 a* d (b) a* d3 Figure 2. Change in node density as network scales networks without power control are limited by constraints () (4) and (9) (4). Since the carrier sensing ranges are constants, they will cover more neighbor grids when the node density increases (Figure 3). hus, the network a* d2 Figure 3. Effect of CSange in 802. as network scales. We define two types of power control here. he first is Uniformly-Scaled ower Control (USC), in which all nodes use the same transmit power adjusted according to the node density (grid size). he second is Adaptive ower Control (AC), in which different nodes may use different transmit powers. he latter will be discussed in the next section. For SDN with USC, constraints (5) (8) need to be considered. However, with uniform transmit powers, constraints (5) (8) are the same as () (4). herefore, the network capacities of SDN with and without USC are the same. A non-uniform power control scheme (see Section V) is needed to boost the network capacity in SDN. For 802. with USC, in addition to constraints (5) (8), we have constraints (9) (4). Constraints (9) (4) will make the network capacity of 802. with USC less than that of SDN with or without USC. V. ADAIVE OWE CONOL (AC) FO SDN here are two shortcomings to USC: ) With respect to SDN, it does not bring about any capacity advantage. 2) It may be suboptimal in scenarios in which links are non-uniformly distributed. Specifically, in USC the transmit powers of all nodes are kept the same, and a link s transmit power is not adapted to what the link sees from other links in its neighborhood. he goal of AC is to overcome these limitations. his section addresses the AC for SDN, which aims to reduce the number of i-edges in the network. he algorithm consists of successive iterations. We assume that initially the transmit powers of nodes are high. Each iteration chooses a particular link and attempts to reduce the number of attacking i-edges emanating out of that link by reducing the transmit powers of its transmitter and receiver. here are two issues: in each iteration, (i) which link should be chosen; (ii) how to adjust the transmit powers. Addressing (i) and (ii) requires knowledge of the current transmit powers used by the nodes, { i }, and the power-gain matrix [G(i, j)], where G(i, j) = (i, j)/ i is the power-gain function from node i to node j. his section is divided into four parts. art A discusses the maximum power a link can be adjusted down by issue (ii) above. art B considers the order in which nodes are chosen for power adjustment issue (i) above. art C introduces an 7

3 algorithm for nodes to find out { i } and G(i, j) in their neighborhood for the computations in art A and art B. art D presents simulation results of the different strategies proposed in art B. A. er-iteration ower Adjustment We now consider the power adjustment of a chosen link. o reduce the i-edges from a link to other links, we may reduce the transmit powers of the transmitter and receiver of that link. he larger the power reduction, the more i-edges are likely to be eliminated. However, there is a bound on the power reduction, as explained below. In each per-iteration power adjustment, we assume the transmit powers of links other than the chosen link remain unchanged. When adjusting the transmit power of the chosen link, we must make sure that ) the connectivity between its transmitter and receiver can be maintained; 2) the VCSange is enough to cover interfering nodes; and 3) the power reduction does not create new i-edges from other links to the chosen link. Note that reducing power as such will not create new i-edges from the chosen link to other links.. Ensuring the reduced power satisfy the minimum decodable threshold: Suppose link is the chosen link. Assume that G(, ) and G(, ) are known (see the ower Exchange Algorithm in art C). hen, to guarantee connectivity from to, the minimum transmit power of is xth min ( ) = xth = (5) (, ) G(, ) where x th is the receive power threshold for signal detection. Similarly, the minimum transmit power of is xth min( ) = xth = (6) (, ) G(, ) 2. Ensuring the VCSange is enough to cover interfering nodes: his requirement is to ensure that virtual carrier sensing in SDN continues to work well. Let M (M ) denote the set of nodes whose transmissions can interfere with reception at ( ). So, before ( ) transmits, it has to be able to forewarn the nodes in M (M ) not to transmit via virtual carrier sensing. Otherwise, the ACK (DAA) from ( ) to ( ) might be corrupted by transmissions by the nodes in M (M ). his can be achieved in two ways. Either the S of or the CS of must reach the nodes in M or M. hus, we have adjusted ( ) x VCS th / G(, m) m M or M (7) O adjusted ( ) x VCS th / G(, m) m M or M (8) where x VCS th is the receiver sensitivity threshold for S/CS (i.e., carrier-sensing threshold) which is generally required to be smaller than x th so that VCSange is larger than xange. For example, if S/CS are transmitted at /r VCS the rate of DAA, as an approximation, we may set x VCS th = x th / r VCS. Note that in the above: (i) We have assumed the same transmit power is used to carry DAA/ACK and S/CS. (ii) (7) and (8) are an O relationship. When adjusting the transmit powers of and, as long as one of them is satisfied, the condition is fulfilled. 3. Ensuring the reduced power is stronger than neighbors pair-wise interferences: o ensure that no new i-edges are formed when and reduce their transmit powers, let N and N be respectively the set of transmitting and receiving nodes of those neighboring links without i-edges to link originally. We require adjusted ( ) K n G(n, ) / G(, ) n N (9) adjusted ( ) K n G(n, ) / G(, ) n N (20) Note that N and N do not need to cover all nodes in the network. In particular, they need to cover only nodes that can potentially interfere with and. Specifically, only node n that satisfies the following needs to be considered: (i) (n, ) > (, )/K x th /K if node n is to be included in N (ii) (n, ) > (, )/K x th /K if node n is to be included in N Steps, 2, and 3 are combined as follows. First, we set adjusted ( ) to the maximum allowed by (5) and (9). hen, we set adjusted ( ) to the maximum allowed by (6) and (20). hen, we see if either the resulting adjusted ( ) and adjusted ( ) satisfies (7) or (8). If yes, we are done. If not, we adjust either adjusted ( ) or adjusted ( ) upward until either (7) or (8) is fulfilled. In general, the computation time for each per-iteration power adjustment is O(n), where n is the number of nodes, thanks to steps 2 and 3. B. ower Control Scheduling Strategies We would like to study the importance of the order of links for power control, based on a link-by-link power adjustment nature. We consider the strategies for choosing a link for power adjustment in each iteration referred to as ower Control Scheduling Strategies. Specifically, two strategies are considered. heir performance results are presented in art D. In this paper, we assume there is a central node that knows the power transfer relationships among links and decides which link to control its power in each iteration. In real practice, we will implement AC in a distributed manner, in which no central node is needed. In distributed algorithms, every node only needs to monitor the local conditions surrounding them and multiple nodes may adjust their powers simultaneously. It turns out the distributed versions of the centralized algorithms discussed here can be easily devised. Due to space limitation, detailed discussions of the distributed algorithms are relegated to a separate paper. Generally speaking, good centralized algorithms also yield good distributed algorithm. In addition, it is also essential to understand centralized algorithms as benchmarks even though our ultimate goal is distributed versions of them. Let us denote the number of attacking i-edges of link l by i a (l) i.e., number of i-edges from l to other links; and the number of defending i-edges of link l by i d (l) i.e., number of i-edges from other links to l. Strategy : Choose the link with the largest i a : he intuition of this strategy is as follows. he link with the largest 72

4 number of attacking i-edges is the link that seriously interferes with neighboring links. By reducing its power first, we can increase the chance that more i-edges can be reduced in the iteration. Note that the power adjustment steps in art A is a defensive one in that it ensures that no new i-edges to the chosen link is created, rather than i-edges from it to others are eliminated. hus, even with the best intention of Strategy here, there is no guarantee that i-edges can be identified for elimination in each iteration. In case of a tie in which multiple links have the same i a, we will pick the one with the smallest i d. If there are multiple links with the same i a and i d,, one of the links will be chosen in random. he reader is referred to the description of Strategy 2 for the motivation for considering a link with the smallest i d. seudocode of Strategy : //LinkSet is the set for link waiting for power control LinkSet = all links; While (LinkSet!= NULL){ L = arg max_l in LinkSet (i a(l)); If L >, L = arg min_l in L (i d(l)) else m = link in L; If L >, m = a random link in L; erform per-iteration power adjustment on m; emove m from LinkSet } Figure 4. seudocode of Strategy. he overall AC algorithm of Strategy is shown in Figure 4. Once a link is picked for power adjustment, it will not be picked again. A round consists of the considerations of all links. We choose a link only once in each round because otherwise it is possible for the chosen link to be chosen again in the next iteration because it still has the largest i a. his will result in an infinite loop. We may run the algorithms for several rounds to continue to reduce the i-edges. In our simulation experiment, however, we have found that typically after one round, only a few additional i-edges can be eliminated in future rounds. Since Strategy loops for n iterations in each round, and in each iteration O(n) computations are needed, the computation time for one round of Strategy is O(n 2 ). Strategy 2: Choose the link with the smallest i d : he intuition of this strategy is as follows. With respect to step 2 of the per-iteration power adjustment algorithm in art A, having fewer defending i-edges to consider may allow us to lower the power by a larger amount. Hence, this may increase the likelihood of an attacking i-edge being eliminated. hat is, whereas Strategy maximizes the number of candidate i-edges for elimination, Strategy 2 maximizes that the chance that a candidate i-edge can be eliminated. seudocode of Strategy 2: //LinkSet is the set for link waiting for power control LinkSet = all links; While (LinkSet!= NULL){ L = arg min_l in LinkSet (i d(l)); If L >, L = arg max_l in L (i a(l)) else m = link in L; If L >, m = a random link in L; erform per-iteration power adjustment on m; emove m from LinkSet } Figure 5. seudocode of Strategy 2. In case of a tie in which multiple links have the same i d we will pick the one with the largest i a, If there are multiple links with the same i a and i d,, one of the links will be chosen in random. he overall AC algorithm for Strategy 2 is shown in Figure 5. Similar to Strategy, once a link is picked for power control, it will not be picked again in each round to avoid infinite looping of the algorithm. As with Strategy, the computation time of Strategy 2 is also O(n 2 ). C. ower Exchange Algorithm In [2], a ower Exchange Algorithm (E) has been proposed for establishing the i-graph of a network. Our per-iteration power adjustment procedure in art A requires not only the knowledge of the current i-edges, but also the power-transfer relationship between nearby nodes so that we can ensure no new i-edges are created after power adjustment. If we assume the presence of a central node, such information can be gathered for the algorithms in arts A and B. We extend the E in [2] for our purpose here. he E algorithm here is a local algorithm in that each node finds out the i-edges and potential i-edges in its neighborhood. he nodes then can send this information to the central node for execution of the algorithms in arts A and B. estart Mode in the receiver design is assumed [2]. In this mode, a receiver will switch to receive a stronger signal even if it is in the midst of sensing a weaker signal not targeted for it. he E packets are special packets periodically broadcasted by nodes to exchange power information with neighbors. We assume the transmit powers of these packets are the same as the transmit powers of regular packets like DAA/ACK/S/CS. Consider an arbitrary node a. he E packets sent by node a contain three types of information: () Active links: (a, b) or (b, a), where b is any other node which forms an active link with a; (2) ransmit power a of node a; (If node a is an A, we assume it uses different a for different client stations and establishes multiple links with clients) (3) ower set, as described below. he identity of the sender of a E packet is implicit in the MAC address of the E packet.. Each node a monitors the power it receives from other nodes and keep this information in a power set (a)={(b, a), (c, a), }. For this purpose, the powers of the E packets from nodes b, c, can be measured by node a. 2. Each node a periodically broadcasts a E packet at a rate lower than the data rate. 3. Node a gathers information from the E packets received from its neighbors. he proof of the correct operation of AC with E will be deferred to another paper due to the space limit here. D. Comparison of Scheduling Strategies We now present the performance results of the two strategies. We used MALAB to simulate an infrastructure topology with 25 As placed uniformly in a square-grid manner over a x km 2 domain. 25 client stations are placed randomly in the domain so that each A on average has five associated clients. In addition to the two strategies, for benchmarking purposes, we also considered the random 73

5 strategy in which a random link is chosen in each iteration. Figure 6 shows the number of remaining i-edges versus the number of iterations. We iterated only one round (see art B) so that the total number of iterations is equal to the number of links (i.e., 25). It can be seen that the number of remaining i-edges of the random case is always more than that of the two strategies, with Strategy 2 having the best performance. It is interesting to note that the gaps between the remaining i-edges for different strategies widen and then narrow as the number of iterations increases. Specifically, the remaining i-edges for the different strategies converge to values that differ by only 20 to 30 i-edges at the end. his means that at convergence, the different strategies do not yield significantly different network capacities. increasing at around 5 Mbps. he other three schemes capacities increase almost linearly. For 802. with USC, the total network capacity is around 32% of the optimal capacity. It is clear that SDN performs much better than % of the optimal capacity can be achieved with SDN without power control. With AC, SDN can achieve about 93% of the optimal capacity. Figure 6. Number of remaining i-edges versus number of iterations. VI. SCALABILIY OF NEWOK CAACIY: NUMEICAL ESULS We generated grid topologies in a x km 2 domain with randomly placed clients in MALAB. Initially, there are four As with transmit power 28.8mW. ogether the four As cover the whole domain. For 802., we set VCSange = CSange = 2.78 x xange. We vary the number of As in the domain while fixing the client-to-a ratio to 5:. We connect each client to its closest A to form a link and identify the contentions between the links based on constraints (5) (8) for SDN and (5) (8) and (9) (4) for In generating the network capacity, we go through the As in the domain randomly; and for each A, we randomly choose a link to transmit, provided that its ability to transmit successfully is permitted by the underlying constraints. We define network capacity as the total number of links that can be selected as such. For USC, we scale the xange of nodes so that As just cover a grid area. For AC, we adopt Strategy 2 as the power control scheduling strategy. he performance results here pertain to the power assignments after one round of the execution of the Strategy-2 AC algorithm. Figure 7 shows the simulation results. he dashed line is the ideal maximum achievable capacity, which is the total number of As in our case. We see that 802. without power control saturates very quickly. Specifically, its capacity stops Figure 7. Simulation results of total network capacity against number of As. VII. CONCLUSION able I. Capacity scalability of 802. and SDN with and w/o power control. IEEE 802. SDN w/o power control Non-scalable 78% scalable with power control 32% scalable 93% scalable his paper has investigated the capacities of 802. and SDN wireless networks with power control. able I summarizes our findings. In essence, although power control can solve scalability problem, different scalable networks may have different degrees of scalability. Although two schemes may both have network capacities that scale linearly with the number of As, the slope of the linear curve may be different. he ratio of the slope of the curve to the slope of the optimal curve gives the degree of optimality. hus, we may say that 802. with power control is 32% scalable; while SDN with power control is 93% scalable. Due to space limitation, our investigations on other power control strategies, including distributed implementations of the power control algorithms will be reported elsewhere. EFEENCES []. Gupta,.. Kumar, he Capacity of Wireless Network, IEEE rans. On Information heory, Vol. 46, No. 2, pp , Mar [2]. C. Ng, S. C. Liew, L. Jiang, Achieving Scalable erformance in Large-Scale IEEE 802. Wireless Networks, IEEE Wireless and Communications and Networking Conference (WCNC 05), Mar [3] L. Jiang and S. C. Liew, emoving Hidden Nodes in IEEE 802. Wireless Networks, IEEE Vehicular echnology Conference, Sep [4] Vikas Kawadia and.. Kumar, rinciples and rotocols for ower Control in Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, pp , vol.23, no. 5, January [5] J.. Monks, V. Bharghavan, and W. Hwu, A power controlled multiple access protocol for wireless packet networks, IEEE INFOCOM. 200, vol.20, pp., April

Keywords Wireless Networks, WLAN, Power Control, , Network Capacity, Scalability, CSMA/CA, Ad-hoc Networks, Hidden Nodes, Exposed Nodes.

Keywords Wireless Networks, WLAN, Power Control, , Network Capacity, Scalability, CSMA/CA, Ad-hoc Networks, Hidden Nodes, Exposed Nodes. Distributed Adaptive Power Control in IEEE 80. Wireless Networks Wang Hei Ho and Soung Chang Liew Department of Information Engineering The Chinese University of Hong Kong {whho4, soung}@ie.cuhk.edu.hk

More information

Investigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks

Investigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks JOUNAL OF NEWOKS, VOL. 5, NO. 4, AIL 21 459 Investigating the Optimum Carrier Sensing ange Using ransmission elation Graph in Wireless Ad hoc Networks Chongqing Zhang Department of Network Engineering,

More information

An Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5,

An Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5, Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi Networks* An Chan and Soung Chang

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Link Scheduling in Multi-Transmit-Receive Wireless Networks

Link Scheduling in Multi-Transmit-Receive Wireless Networks Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks XinMing Zhang, Guoqing Qiu,

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Wireless Network Capacity. Nitin Vaidya

Wireless Network Capacity. Nitin Vaidya Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such

More information

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS

PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON 802.11 AD HOC NETWORKS Alexandre Andrade Pires and JosC Ferreira de Rezende GTA - COPPE Universidade Federal do Rio de Janeiro, Brazil Ernail: {andrude,

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety

MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks

Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Yue Wang,DahMingChiu 2, and John C.S. Lui Dept. of Computer Science & Engineering, The Chinese University of

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C.

Assigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C. Published in IET Communications Received on 14th April 2008 Revised on 20th March 2009 Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks P.C.

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

RECENTLY, there has been extensive research towards understanding

RECENTLY, there has been extensive research towards understanding IEEE/ACM TRANSACTIONS ON NETWORKING 1 Inducing Multiscale Clustering Using Multistage MAC Contention in CDMA Ad Hoc Networks Xiangying Yang, Member, IEEE, and Gustavo de Veciana, Senior Member, IEEE Abstract

More information

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

Throughput Analysis of CSMA Wireless Networks with Finite Offered-load

Throughput Analysis of CSMA Wireless Networks with Finite Offered-load 1 Throughput Analysis of CSMA Wireless Networks with Finite Offered-load Caihong Kai and Shengli Zhang School of Computer and Information, Hefei University of Technology, Hefei, China Department of Communication

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

I. INTRODUCTION. performance metric; we defer considerations of important topics such as per node throughput fairness to later work.

I. INTRODUCTION. performance metric; we defer considerations of important topics such as per node throughput fairness to later work. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Optimizing 802.11 Wireless Mesh Networks Based on Physical Carrier Sensing Hui Ma, Student Member, IEEE, Rajiv Vijayakumar, Sumit Roy, Fellow, IEEE, and Jing Zhu,

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

INVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE

INVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE International Journal of Computer cience and Communication Vol. 2, No. 2, July-December 2011, pp. 559-564 INVETIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL TATION FOR RANDOM FAILURE Manish

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Cooperative and Opportunistic Transmission for Wireless Ad Hoc Networks. IEEE Network, Jan./Feb., 2007 Jeng-Long Chiang Nov.

Cooperative and Opportunistic Transmission for Wireless Ad Hoc Networks. IEEE Network, Jan./Feb., 2007 Jeng-Long Chiang Nov. Cooperative and Opportunistic Transmission for Wireless Ad Hoc Networks IEEE Network, Jan./Feb., 2007 Jeng-Long Chiang Nov. 8, 2007 Outline Introduction Distributed Cooperative Rate Adaption (DCRA) DCRA

More information

A Dynamic Channel Allocation Mechanism for IEEE Networks

A Dynamic Channel Allocation Mechanism for IEEE Networks A Dynamic Channel Allocation Mechanism for IEEE 802.11 Networks Marcel William Rocha da Silva, José Ferreira de Rezende Abstract The great popularity of IEEE 802.11 along with channel scarcity may lead

More information

POWERCONTROL FOR WIRELESS

POWERCONTROL FOR WIRELESS International Journal of Scientific & Engineering Research, Volume 5, Issue 8,August-2014 1071 JOINT SCHEDULING AND POWERCONTROL FOR WIRELESS ADHOC NETWORKS AGAINST MULTIPLE ACCESS INTERFERENCE. Oladimeji

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Mahdi Shakiba-Herfeh Department of Electrical and Electronics Engineering METU, Ankara, Turkey 68 Email: mahdi@eee.metu.edu.tr

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI

Detecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

Distributed Data Aggregation Scheduling in Wireless Sensor Networks Distributed Data Aggregation Scheduling in Wireless Sensor Networks Bo Yu, Jianzhong Li, School of Computer Science and Technology, Harbin Institute of Technology, China Email: bo yu@hit.edu.cn, lijzh@hit.edu.cn

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks

Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks International Journal of Computer Applications (975 8887) Volume 55 No.1 October 1 Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless ersonal

More information

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks

Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets

Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets 1 Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets Zhili Guo, Student Member, IEEE, Yao Wang, Fellow, IEEE, Elza Erkip, Fellow, IEEE, Shivendra Panwar, Fellow, IEEE,

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

Time Series Prediction as a Problem of Missing Values: Application to ESTSP2007 and NN3 Competition Benchmarks

Time Series Prediction as a Problem of Missing Values: Application to ESTSP2007 and NN3 Competition Benchmarks Series Prediction as a Problem of Missing Values: Application to ESTSP7 and NN3 Competition Benchmarks Antti Sorjamaa and Amaury Lendasse Abstract In this paper, time series prediction is considered as

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE Hang Su, Student Member, IEEE, and Xi Zhang, Senior Member, IEEE

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE Hang Su, Student Member, IEEE, and Xi Zhang, Senior Member, IEEE IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE 2009 593 Modeling Throughput Gain of Network Coding in Multi-Channel Multi-Radio Wireless Ad Hoc Networks Hang Su, Student Member,

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Coordinated carrier aggregation for campus of home base stations

Coordinated carrier aggregation for campus of home base stations 2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Is Topology-Transparent Scheduling Really Inefficient in Static Multihop Networks? IEEE Wireless Communications Letters, 2013, v. 2 n. 6, p.

Is Topology-Transparent Scheduling Really Inefficient in Static Multihop Networks? IEEE Wireless Communications Letters, 2013, v. 2 n. 6, p. Title Is Topology-Transparent Scheduling Really Inefficient in Static Multihop Networks? Author(s) Liu, Y; Li, VOK; Leung, KC; Zhang, L Citation IEEE Wireless Communications Letters, 2013, v. 2 n. 6, p.

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks

An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks P.Sivanesan Department of Information Technology Kurinji College of Engineering and Technology Tiruchirappalli, Tamilnadu, India

More information