, while the capacity scales as Θ (n)
|
|
- Pamela Hodge
- 5 years ago
- Views:
Transcription
1 Scalability of Wireless Networks Capacity with ower Control Wang Hei Ho and Soung Chang Liew Department of Information Engineering he Chinese University of Hong Kong {whho4, Abstract eference [] showed that wireless networks with capacity scalable with the number of nodes, n, are achievable in theory. he transport capacity scales as Θ ( n), while the capacity scales as Θ (n). eference [2], on the other hand, showed that the capacity of IEEE 802. networks does not scale with n due to its carrier sensing mechanism. he previous work, however, has not considered the use of power control. he main contributions of this paper are two-fold: ) the demonstration that 802. networks are scalable with power control; 2) however, with power control, an enhanced MAC protocol called Selective Disregard of NAVs (SDN) can achieve substantially higher capacity. Specifically, capacity within 90% of the theoretical optimal capacity of infrastructure networks is achievable. Keywords Wireless Networks, WLAN, ower Control, 802., Network Capacity, Scalability, CSMA/CA, Ad-hoc Networks I. INODUCION hysical-interference and protocol carrier-sensing constraints against simultaneous transmissions by links [] [2] limit spatial re-use in wireless networks. he physical-interference constraints are due to a receiver s inability to decode its signal when the powers received from other interfering signals are large. he protocol carrier-sensing constraints are due to the carrier-sensing mechanism of the multi-access protocol used [2]. he 802. carrier-sensing constraints, in particular, cause the 802. network capacity to be non-scalable [2]. A variant of 802. for achieving scalable capacity, Selective Disregard of NAVs (SDN), was introduced in [2]. he main idea of SDN is to eliminate those 802. carrier-sensing constraints that are extraneous. Without power control, the original 802. networks are non-scalable, but SDN networks are [2]. he previous work, however, has not considered the use of power control. his paper considers the implication of power control for capacity scalability in 802. and SDN wireless networks. II. SIMULANEOUS-ANSMISSION CONSAINS WIH OWE CONOL A. Constraints of SDN SDN removes the extraneous 802. carrier-sensing constraints so that the capacity is largely limited only by the physical-interference constraints [2]. So, the constraints in SDN are basically physical-interference constraints. We model the interference constraints using a pair-wise interference model []. Consider the power relationship from node a to node b, ( a, b) = k a / r, where (a, b) is the power received by node b from the transmission by node a, a is the transmit power of node a, r is distance between the two nodes, >2 is the path-loss exponent, and k is a constant. Let i and i denote the transmitter and receiver of link i. For brevity, we will also use i and i to denote their positions in the following. Consider two links, and 2. With no power control (i.e., = 2 = = 2 ), link 2 can interfere with link if 2 < K () 2 < K (2) 2 < K (3) 2 < K (4) where K > (e.g., 0dB) is the power margin required for proper signal detection. Constraints () (4) correspond to DAA-DAA collision, DAA-ACK collision, ACK-DAA collision and ACK-ACK collision, from link 2 to link respectively. Similarly, link can also interfere with link 2 with four constraints of the same form. When power control is introduced, the transmit powers of nodes, 2, and 2 may be different. Assuming all nodes use the same receive power threshold, constraints () (4) become 2 < K 2 (5) 2 < K 2 (6) 2 < K 2 (7) 2 < K 2 (8) B. Constraints of 802. For 802. wireless networks, in addition to the constraints in Section A, protocol carrier-sensing constraints further limit the network capacity. Consider links and 2 again, and suppose that link is transmitting. hen, assuming all nodes use the same carrier-sensing power threshold, link 2 cannot transmit to link if any of the following constraints holds [2]: < VCSange( ) (9) 2 < VCSange( ) (0) 2 < CSange( ) () 2 < VCSange( ) (2) 2 < VCSange( ) (3) 2 < CSange( ) (4) 2 where VCSange( a ) is the virtual carrier sensing range due to the transmissions of S/CS by node a with transmit power /05/$ IEEE 70
2 a ; and CSange( a ) is the physical carrier sensing range due to the DAA transmission by node a. A similar set of inequalities can be obtained when we consider the case where link transmits first. he case of no power control is a special case in which VCSange( a )=VCSange and CSange( a ) =CSange, where VCSange and CSange are constants. III. LINK-INEFEENCE GAH FO HYSICAL CONSAINS Node Graph Carrier Sensing Link i-graph capacity per unit area will reach a limit eventually as the number of As increases. hat is, more As do not bring about higher capacity! Intuitively, if power control is introduced so that VCSange and CSange are also scaled by the size of grids, some of the inter-grid interferences can be prevented and we should observe network capacity that scales with node density. CSange xange CSange xange Link Link 2 (a) Figure. Mapping of a network topology a) to b) i-graph. A Link-Interference Graph (i-graph) can be used to represent the physical constraints graphically. In an i-graph, an arrow-shape vertex represents a wireless link with the arrowhead pointing toward the receiver. here is a directional interference edge (i-edge) from vertex 2 to vertex if any of the constraints (5) (8) is satisfied. Figures a and b show an example of mapping a network topology to an i-graph. IV. SCALABILIY OF NEWOK CAACIY: ANALYICAL DISCUSSION Consider an infinitely large infrastructure-mode wireless network with multiple Access oints (A) laid out in a grid topology. Each grid is associated with an A, which serves as the base station for the clients located within the grid. Clients are randomly placed within the grid. What would happen to the total network capacity when we increase the number of As by reducing the grid size, while maintaining the same number of clients per A? he increase of node density as such is analogous to decreasing the scale on which a map is drawn (Figure 2). he location (x,y) is translated to (ax,ay), where a <. If the distance between two nodes before scaling is d, the distance after the transformation is ad. For SDN without power control, we only need to consider constraints () (4). hey are invariant to this scaling, as a on both sides of the inequality will cancel out. hus, the expected network capacity per unit area will scale with the number of As. his is because the expected capacity of a smaller grid is the same as the expected capacity in the original larger grid before transformation. d d3 d2 a* d (b) a* d3 Figure 2. Change in node density as network scales networks without power control are limited by constraints () (4) and (9) (4). Since the carrier sensing ranges are constants, they will cover more neighbor grids when the node density increases (Figure 3). hus, the network a* d2 Figure 3. Effect of CSange in 802. as network scales. We define two types of power control here. he first is Uniformly-Scaled ower Control (USC), in which all nodes use the same transmit power adjusted according to the node density (grid size). he second is Adaptive ower Control (AC), in which different nodes may use different transmit powers. he latter will be discussed in the next section. For SDN with USC, constraints (5) (8) need to be considered. However, with uniform transmit powers, constraints (5) (8) are the same as () (4). herefore, the network capacities of SDN with and without USC are the same. A non-uniform power control scheme (see Section V) is needed to boost the network capacity in SDN. For 802. with USC, in addition to constraints (5) (8), we have constraints (9) (4). Constraints (9) (4) will make the network capacity of 802. with USC less than that of SDN with or without USC. V. ADAIVE OWE CONOL (AC) FO SDN here are two shortcomings to USC: ) With respect to SDN, it does not bring about any capacity advantage. 2) It may be suboptimal in scenarios in which links are non-uniformly distributed. Specifically, in USC the transmit powers of all nodes are kept the same, and a link s transmit power is not adapted to what the link sees from other links in its neighborhood. he goal of AC is to overcome these limitations. his section addresses the AC for SDN, which aims to reduce the number of i-edges in the network. he algorithm consists of successive iterations. We assume that initially the transmit powers of nodes are high. Each iteration chooses a particular link and attempts to reduce the number of attacking i-edges emanating out of that link by reducing the transmit powers of its transmitter and receiver. here are two issues: in each iteration, (i) which link should be chosen; (ii) how to adjust the transmit powers. Addressing (i) and (ii) requires knowledge of the current transmit powers used by the nodes, { i }, and the power-gain matrix [G(i, j)], where G(i, j) = (i, j)/ i is the power-gain function from node i to node j. his section is divided into four parts. art A discusses the maximum power a link can be adjusted down by issue (ii) above. art B considers the order in which nodes are chosen for power adjustment issue (i) above. art C introduces an 7
3 algorithm for nodes to find out { i } and G(i, j) in their neighborhood for the computations in art A and art B. art D presents simulation results of the different strategies proposed in art B. A. er-iteration ower Adjustment We now consider the power adjustment of a chosen link. o reduce the i-edges from a link to other links, we may reduce the transmit powers of the transmitter and receiver of that link. he larger the power reduction, the more i-edges are likely to be eliminated. However, there is a bound on the power reduction, as explained below. In each per-iteration power adjustment, we assume the transmit powers of links other than the chosen link remain unchanged. When adjusting the transmit power of the chosen link, we must make sure that ) the connectivity between its transmitter and receiver can be maintained; 2) the VCSange is enough to cover interfering nodes; and 3) the power reduction does not create new i-edges from other links to the chosen link. Note that reducing power as such will not create new i-edges from the chosen link to other links.. Ensuring the reduced power satisfy the minimum decodable threshold: Suppose link is the chosen link. Assume that G(, ) and G(, ) are known (see the ower Exchange Algorithm in art C). hen, to guarantee connectivity from to, the minimum transmit power of is xth min ( ) = xth = (5) (, ) G(, ) where x th is the receive power threshold for signal detection. Similarly, the minimum transmit power of is xth min( ) = xth = (6) (, ) G(, ) 2. Ensuring the VCSange is enough to cover interfering nodes: his requirement is to ensure that virtual carrier sensing in SDN continues to work well. Let M (M ) denote the set of nodes whose transmissions can interfere with reception at ( ). So, before ( ) transmits, it has to be able to forewarn the nodes in M (M ) not to transmit via virtual carrier sensing. Otherwise, the ACK (DAA) from ( ) to ( ) might be corrupted by transmissions by the nodes in M (M ). his can be achieved in two ways. Either the S of or the CS of must reach the nodes in M or M. hus, we have adjusted ( ) x VCS th / G(, m) m M or M (7) O adjusted ( ) x VCS th / G(, m) m M or M (8) where x VCS th is the receiver sensitivity threshold for S/CS (i.e., carrier-sensing threshold) which is generally required to be smaller than x th so that VCSange is larger than xange. For example, if S/CS are transmitted at /r VCS the rate of DAA, as an approximation, we may set x VCS th = x th / r VCS. Note that in the above: (i) We have assumed the same transmit power is used to carry DAA/ACK and S/CS. (ii) (7) and (8) are an O relationship. When adjusting the transmit powers of and, as long as one of them is satisfied, the condition is fulfilled. 3. Ensuring the reduced power is stronger than neighbors pair-wise interferences: o ensure that no new i-edges are formed when and reduce their transmit powers, let N and N be respectively the set of transmitting and receiving nodes of those neighboring links without i-edges to link originally. We require adjusted ( ) K n G(n, ) / G(, ) n N (9) adjusted ( ) K n G(n, ) / G(, ) n N (20) Note that N and N do not need to cover all nodes in the network. In particular, they need to cover only nodes that can potentially interfere with and. Specifically, only node n that satisfies the following needs to be considered: (i) (n, ) > (, )/K x th /K if node n is to be included in N (ii) (n, ) > (, )/K x th /K if node n is to be included in N Steps, 2, and 3 are combined as follows. First, we set adjusted ( ) to the maximum allowed by (5) and (9). hen, we set adjusted ( ) to the maximum allowed by (6) and (20). hen, we see if either the resulting adjusted ( ) and adjusted ( ) satisfies (7) or (8). If yes, we are done. If not, we adjust either adjusted ( ) or adjusted ( ) upward until either (7) or (8) is fulfilled. In general, the computation time for each per-iteration power adjustment is O(n), where n is the number of nodes, thanks to steps 2 and 3. B. ower Control Scheduling Strategies We would like to study the importance of the order of links for power control, based on a link-by-link power adjustment nature. We consider the strategies for choosing a link for power adjustment in each iteration referred to as ower Control Scheduling Strategies. Specifically, two strategies are considered. heir performance results are presented in art D. In this paper, we assume there is a central node that knows the power transfer relationships among links and decides which link to control its power in each iteration. In real practice, we will implement AC in a distributed manner, in which no central node is needed. In distributed algorithms, every node only needs to monitor the local conditions surrounding them and multiple nodes may adjust their powers simultaneously. It turns out the distributed versions of the centralized algorithms discussed here can be easily devised. Due to space limitation, detailed discussions of the distributed algorithms are relegated to a separate paper. Generally speaking, good centralized algorithms also yield good distributed algorithm. In addition, it is also essential to understand centralized algorithms as benchmarks even though our ultimate goal is distributed versions of them. Let us denote the number of attacking i-edges of link l by i a (l) i.e., number of i-edges from l to other links; and the number of defending i-edges of link l by i d (l) i.e., number of i-edges from other links to l. Strategy : Choose the link with the largest i a : he intuition of this strategy is as follows. he link with the largest 72
4 number of attacking i-edges is the link that seriously interferes with neighboring links. By reducing its power first, we can increase the chance that more i-edges can be reduced in the iteration. Note that the power adjustment steps in art A is a defensive one in that it ensures that no new i-edges to the chosen link is created, rather than i-edges from it to others are eliminated. hus, even with the best intention of Strategy here, there is no guarantee that i-edges can be identified for elimination in each iteration. In case of a tie in which multiple links have the same i a, we will pick the one with the smallest i d. If there are multiple links with the same i a and i d,, one of the links will be chosen in random. he reader is referred to the description of Strategy 2 for the motivation for considering a link with the smallest i d. seudocode of Strategy : //LinkSet is the set for link waiting for power control LinkSet = all links; While (LinkSet!= NULL){ L = arg max_l in LinkSet (i a(l)); If L >, L = arg min_l in L (i d(l)) else m = link in L; If L >, m = a random link in L; erform per-iteration power adjustment on m; emove m from LinkSet } Figure 4. seudocode of Strategy. he overall AC algorithm of Strategy is shown in Figure 4. Once a link is picked for power adjustment, it will not be picked again. A round consists of the considerations of all links. We choose a link only once in each round because otherwise it is possible for the chosen link to be chosen again in the next iteration because it still has the largest i a. his will result in an infinite loop. We may run the algorithms for several rounds to continue to reduce the i-edges. In our simulation experiment, however, we have found that typically after one round, only a few additional i-edges can be eliminated in future rounds. Since Strategy loops for n iterations in each round, and in each iteration O(n) computations are needed, the computation time for one round of Strategy is O(n 2 ). Strategy 2: Choose the link with the smallest i d : he intuition of this strategy is as follows. With respect to step 2 of the per-iteration power adjustment algorithm in art A, having fewer defending i-edges to consider may allow us to lower the power by a larger amount. Hence, this may increase the likelihood of an attacking i-edge being eliminated. hat is, whereas Strategy maximizes the number of candidate i-edges for elimination, Strategy 2 maximizes that the chance that a candidate i-edge can be eliminated. seudocode of Strategy 2: //LinkSet is the set for link waiting for power control LinkSet = all links; While (LinkSet!= NULL){ L = arg min_l in LinkSet (i d(l)); If L >, L = arg max_l in L (i a(l)) else m = link in L; If L >, m = a random link in L; erform per-iteration power adjustment on m; emove m from LinkSet } Figure 5. seudocode of Strategy 2. In case of a tie in which multiple links have the same i d we will pick the one with the largest i a, If there are multiple links with the same i a and i d,, one of the links will be chosen in random. he overall AC algorithm for Strategy 2 is shown in Figure 5. Similar to Strategy, once a link is picked for power control, it will not be picked again in each round to avoid infinite looping of the algorithm. As with Strategy, the computation time of Strategy 2 is also O(n 2 ). C. ower Exchange Algorithm In [2], a ower Exchange Algorithm (E) has been proposed for establishing the i-graph of a network. Our per-iteration power adjustment procedure in art A requires not only the knowledge of the current i-edges, but also the power-transfer relationship between nearby nodes so that we can ensure no new i-edges are created after power adjustment. If we assume the presence of a central node, such information can be gathered for the algorithms in arts A and B. We extend the E in [2] for our purpose here. he E algorithm here is a local algorithm in that each node finds out the i-edges and potential i-edges in its neighborhood. he nodes then can send this information to the central node for execution of the algorithms in arts A and B. estart Mode in the receiver design is assumed [2]. In this mode, a receiver will switch to receive a stronger signal even if it is in the midst of sensing a weaker signal not targeted for it. he E packets are special packets periodically broadcasted by nodes to exchange power information with neighbors. We assume the transmit powers of these packets are the same as the transmit powers of regular packets like DAA/ACK/S/CS. Consider an arbitrary node a. he E packets sent by node a contain three types of information: () Active links: (a, b) or (b, a), where b is any other node which forms an active link with a; (2) ransmit power a of node a; (If node a is an A, we assume it uses different a for different client stations and establishes multiple links with clients) (3) ower set, as described below. he identity of the sender of a E packet is implicit in the MAC address of the E packet.. Each node a monitors the power it receives from other nodes and keep this information in a power set (a)={(b, a), (c, a), }. For this purpose, the powers of the E packets from nodes b, c, can be measured by node a. 2. Each node a periodically broadcasts a E packet at a rate lower than the data rate. 3. Node a gathers information from the E packets received from its neighbors. he proof of the correct operation of AC with E will be deferred to another paper due to the space limit here. D. Comparison of Scheduling Strategies We now present the performance results of the two strategies. We used MALAB to simulate an infrastructure topology with 25 As placed uniformly in a square-grid manner over a x km 2 domain. 25 client stations are placed randomly in the domain so that each A on average has five associated clients. In addition to the two strategies, for benchmarking purposes, we also considered the random 73
5 strategy in which a random link is chosen in each iteration. Figure 6 shows the number of remaining i-edges versus the number of iterations. We iterated only one round (see art B) so that the total number of iterations is equal to the number of links (i.e., 25). It can be seen that the number of remaining i-edges of the random case is always more than that of the two strategies, with Strategy 2 having the best performance. It is interesting to note that the gaps between the remaining i-edges for different strategies widen and then narrow as the number of iterations increases. Specifically, the remaining i-edges for the different strategies converge to values that differ by only 20 to 30 i-edges at the end. his means that at convergence, the different strategies do not yield significantly different network capacities. increasing at around 5 Mbps. he other three schemes capacities increase almost linearly. For 802. with USC, the total network capacity is around 32% of the optimal capacity. It is clear that SDN performs much better than % of the optimal capacity can be achieved with SDN without power control. With AC, SDN can achieve about 93% of the optimal capacity. Figure 6. Number of remaining i-edges versus number of iterations. VI. SCALABILIY OF NEWOK CAACIY: NUMEICAL ESULS We generated grid topologies in a x km 2 domain with randomly placed clients in MALAB. Initially, there are four As with transmit power 28.8mW. ogether the four As cover the whole domain. For 802., we set VCSange = CSange = 2.78 x xange. We vary the number of As in the domain while fixing the client-to-a ratio to 5:. We connect each client to its closest A to form a link and identify the contentions between the links based on constraints (5) (8) for SDN and (5) (8) and (9) (4) for In generating the network capacity, we go through the As in the domain randomly; and for each A, we randomly choose a link to transmit, provided that its ability to transmit successfully is permitted by the underlying constraints. We define network capacity as the total number of links that can be selected as such. For USC, we scale the xange of nodes so that As just cover a grid area. For AC, we adopt Strategy 2 as the power control scheduling strategy. he performance results here pertain to the power assignments after one round of the execution of the Strategy-2 AC algorithm. Figure 7 shows the simulation results. he dashed line is the ideal maximum achievable capacity, which is the total number of As in our case. We see that 802. without power control saturates very quickly. Specifically, its capacity stops Figure 7. Simulation results of total network capacity against number of As. VII. CONCLUSION able I. Capacity scalability of 802. and SDN with and w/o power control. IEEE 802. SDN w/o power control Non-scalable 78% scalable with power control 32% scalable 93% scalable his paper has investigated the capacities of 802. and SDN wireless networks with power control. able I summarizes our findings. In essence, although power control can solve scalability problem, different scalable networks may have different degrees of scalability. Although two schemes may both have network capacities that scale linearly with the number of As, the slope of the linear curve may be different. he ratio of the slope of the curve to the slope of the optimal curve gives the degree of optimality. hus, we may say that 802. with power control is 32% scalable; while SDN with power control is 93% scalable. Due to space limitation, our investigations on other power control strategies, including distributed implementations of the power control algorithms will be reported elsewhere. EFEENCES []. Gupta,.. Kumar, he Capacity of Wireless Network, IEEE rans. On Information heory, Vol. 46, No. 2, pp , Mar [2]. C. Ng, S. C. Liew, L. Jiang, Achieving Scalable erformance in Large-Scale IEEE 802. Wireless Networks, IEEE Wireless and Communications and Networking Conference (WCNC 05), Mar [3] L. Jiang and S. C. Liew, emoving Hidden Nodes in IEEE 802. Wireless Networks, IEEE Vehicular echnology Conference, Sep [4] Vikas Kawadia and.. Kumar, rinciples and rotocols for ower Control in Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, pp , vol.23, no. 5, January [5] J.. Monks, V. Bharghavan, and W. Hwu, A power controlled multiple access protocol for wireless packet networks, IEEE INFOCOM. 200, vol.20, pp., April
Keywords Wireless Networks, WLAN, Power Control, , Network Capacity, Scalability, CSMA/CA, Ad-hoc Networks, Hidden Nodes, Exposed Nodes.
Distributed Adaptive Power Control in IEEE 80. Wireless Networks Wang Hei Ho and Soung Chang Liew Department of Information Engineering The Chinese University of Hong Kong {whho4, soung}@ie.cuhk.edu.hk
More informationInvestigating the Optimum Carrier Sensing Range Using Transmission Relation Graph in Wireless Ad hoc Networks
JOUNAL OF NEWOKS, VOL. 5, NO. 4, AIL 21 459 Investigating the Optimum Carrier Sensing ange Using ransmission elation Graph in Wireless Ad hoc Networks Chongqing Zhang Department of Network Engineering,
More informationAn Chan and Soung Chang Liew Department of Information Engineering, The Chinese University of Hong Kong {achan5,
Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi Networks* An Chan and Soung Chang
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationLink Scheduling in Multi-Transmit-Receive Wireless Networks
Macau University of Science and Technology From the SelectedWorks of Hong-Ning Dai 2011 Link Scheduling in Multi-Transmit-Receive Wireless Networks Hong-Ning Dai, Macau University of Science and Technology
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationCoordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks
2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks XinMing Zhang, Guoqing Qiu,
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationWireless Network Capacity. Nitin Vaidya
Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such
More informationPROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON AD HOC NETWORKS
PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON 802.11 AD HOC NETWORKS Alexandre Andrade Pires and JosC Ferreira de Rezende GTA - COPPE Universidade Federal do Rio de Janeiro, Brazil Ernail: {andrude,
More informationAd Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime
247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information
More informationMC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety
RTSS 2018 MC-Safe: Multi-Channel Real-time V2V Communication for Enhancing Driving Safety Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang Dept. of Electrical and Computer Engineering
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationMAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users
MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing
More informationTopology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co
Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,
More informationCharacterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks
Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Yue Wang,DahMingChiu 2, and John C.S. Lui Dept. of Computer Science & Engineering, The Chinese University of
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationAssigning channels by link directionality in a medium access control protocol for IEEE ad hoc networks P.C. Ng 1 D.J. Edwards 1 S.C.
Published in IET Communications Received on 14th April 2008 Revised on 20th March 2009 Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks P.C.
More informationOn exploiting spatial reuse in wireless ad hoc networks
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationNETWORK coding is an area that has emerged in 2000 [1],
450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider
More informationLOW-DENSITY PARITY-CHECK (LDPC) codes [1] can
208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationRECENTLY, there has been extensive research towards understanding
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Inducing Multiscale Clustering Using Multistage MAC Contention in CDMA Ad Hoc Networks Xiangying Yang, Member, IEEE, and Gustavo de Veciana, Senior Member, IEEE Abstract
More informationWireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach
Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach Biljana Stojkoska, Ilinka Ivanoska, Danco Davcev, 1 Faculty of Electrical Engineering and Information
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationDynamic Power Control MAC Protocol in Mobile Adhoc Networks
Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationNear Optimal Broadcast with Network Coding in Large Sensor Networks
in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationImplementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point
International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh
More informationThroughput Analysis of CSMA Wireless Networks with Finite Offered-load
1 Throughput Analysis of CSMA Wireless Networks with Finite Offered-load Caihong Kai and Shengli Zhang School of Computer and Information, Hefei University of Technology, Hefei, China Department of Communication
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationGeographical Routing Algorithms In Asynchronous Wireless Sensor Network
Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-
More informationI. INTRODUCTION. performance metric; we defer considerations of important topics such as per node throughput fairness to later work.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Optimizing 802.11 Wireless Mesh Networks Based on Physical Carrier Sensing Hui Ma, Student Member, IEEE, Rajiv Vijayakumar, Sumit Roy, Fellow, IEEE, and Jing Zhu,
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationAN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS
AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationINVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE
International Journal of Computer cience and Communication Vol. 2, No. 2, July-December 2011, pp. 559-564 INVETIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL TATION FOR RANDOM FAILURE Manish
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationCooperative and Opportunistic Transmission for Wireless Ad Hoc Networks. IEEE Network, Jan./Feb., 2007 Jeng-Long Chiang Nov.
Cooperative and Opportunistic Transmission for Wireless Ad Hoc Networks IEEE Network, Jan./Feb., 2007 Jeng-Long Chiang Nov. 8, 2007 Outline Introduction Distributed Cooperative Rate Adaption (DCRA) DCRA
More informationA Dynamic Channel Allocation Mechanism for IEEE Networks
A Dynamic Channel Allocation Mechanism for IEEE 802.11 Networks Marcel William Rocha da Silva, José Ferreira de Rezende Abstract The great popularity of IEEE 802.11 along with channel scarcity may lead
More informationPOWERCONTROL FOR WIRELESS
International Journal of Scientific & Engineering Research, Volume 5, Issue 8,August-2014 1071 JOINT SCHEDULING AND POWERCONTROL FOR WIRELESS ADHOC NETWORKS AGAINST MULTIPLE ACCESS INTERFERENCE. Oladimeji
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationRouting with Mutual Information Accumulation in Energy-Limited Wireless Networks
Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Mahdi Shakiba-Herfeh Department of Electrical and Electronics Engineering METU, Ankara, Turkey 68 Email: mahdi@eee.metu.edu.tr
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationLesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008
Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial
More informationDetecting Sybil Nodes in Wireless Networks. *: SIS Dept., UNC Charlotte **: ECE Dept., WPI
Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding Weichao Wang*, DiPu**, and Alex Wyglinski** *: SIS Dept., UNC Charlotte **: ECE Dept., WPI Motivation Network coding technique
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationA Two-phase Distributed Training Algorithm for Linear SVM in WSN
Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear
More information/99/$10.00 (c) 1999 IEEE
COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US
More informationDistributed Data Aggregation Scheduling in Wireless Sensor Networks
Distributed Data Aggregation Scheduling in Wireless Sensor Networks Bo Yu, Jianzhong Li, School of Computer Science and Technology, Harbin Institute of Technology, China Email: bo yu@hit.edu.cn, lijzh@hit.edu.cn
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationACENTRAL question in the study of multihop networks
1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationReducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks
International Journal of Computer Applications (975 8887) Volume 55 No.1 October 1 Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless ersonal
More informationDesign Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks
Design Principles for Distributed Channel Assignment in Wireless Ad Hoc Networks Michelle X. Gong Scott F. Midkiff Shiwen Mao The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic
More informationITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS
ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial
More informationWireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets
1 Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets Zhili Guo, Student Member, IEEE, Yao Wang, Fellow, IEEE, Elza Erkip, Fellow, IEEE, Shivendra Panwar, Fellow, IEEE,
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationTime Series Prediction as a Problem of Missing Values: Application to ESTSP2007 and NN3 Competition Benchmarks
Series Prediction as a Problem of Missing Values: Application to ESTSP7 and NN3 Competition Benchmarks Antti Sorjamaa and Amaury Lendasse Abstract In this paper, time series prediction is considered as
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE Hang Su, Student Member, IEEE, and Xi Zhang, Senior Member, IEEE
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 5, JUNE 2009 593 Modeling Throughput Gain of Network Coding in Multi-Channel Multi-Radio Wireless Ad Hoc Networks Hang Su, Student Member,
More informationAnalysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm
International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationResource Allocation in Contention-Based WiFi Networks
The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),
More informationOPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS
Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:
More informationCoordinated carrier aggregation for campus of home base stations
2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations
More informationA New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time
A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail
More informationProject Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN
Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work
More informationFu-Yi Hung ALL RIGHTS RESERVED
009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick
More informationSimulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks
Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden
More informationIs Topology-Transparent Scheduling Really Inefficient in Static Multihop Networks? IEEE Wireless Communications Letters, 2013, v. 2 n. 6, p.
Title Is Topology-Transparent Scheduling Really Inefficient in Static Multihop Networks? Author(s) Liu, Y; Li, VOK; Leung, KC; Zhang, L Citation IEEE Wireless Communications Letters, 2013, v. 2 n. 6, p.
More informationECE442 Communications Lecture 3. Wireless Local Area Networks
ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using
More informationAn Enhanced IEEE Retransmission Scheme
An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationGraph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network
Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER Aimin Tang and Xudong Wang, Senior Member, IEEE
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5871 A-Duplex: Medium Access Control for Efficient Coexistence Between Full-Duplex and Half-Duplex Communications Aimin Tang
More informationDynamic bandwidth management for multihop wireless ad hoc networks
Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr
More informationAn Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks
An Enhanced Transmission Power Controlled MAC Protocol for Ad Hoc Networks P.Sivanesan Department of Information Technology Kurinji College of Engineering and Technology Tiruchirappalli, Tamilnadu, India
More information