Achieving Scalable Performance in Large-Scale IEEE Wireless Networks *

Size: px
Start display at page:

Download "Achieving Scalable Performance in Large-Scale IEEE 802.11 Wireless Networks *"

Transcription

1 chieving Scalable Performance in Large-Scale IEEE Wireless Networks * Ping Chung Ng, Soung Chang Liew, and Li Bin Jiang Department of Information Engineering, The Chinese University of Hong Kong {pcng3, soung, lbjiang3}@ie.cuhk.edu.hk bstract In large-scale wireless networks, interferences among nodes limit channel spatial re-use and are a main hurdle for scalable performance. There are two types of interferences: 1) physical interferences due to the receiver s inability to decode a signal when the powers received from other signals are large; and ) protocol interferences imposed by the specific multi-access protocol being used. This paper models interference types 1 and in terms of a set of inequality constraints for the IEEE CSM/C protocol. Based on the inequalities, we investigate the impact of the parameters basic-rate, data-rate, and physicalpreamble-rate, on channel spatial re-use. Regardless of the parameter settings, the total capacity in an network reaches a ceiling as the number of node n increases. We identify the fundamental causes for the non-scalable performance, and show that can be made to be scalable with a simple modification, achieving O(n) throughput without adaptive power control. We believe that this is the first paper that has demonstrated this. Keywords Wireless Networks, d hoc Networks, IEEE 80.11, Performance, nalysis, Capacity, Scalable Performance. I. INTRODUCTION driving force behind the popularity IEEE 80.11b/g wireless network is that the frequency band used is unregulated. nyone can set up a WLN quickly. This brings up a critical problem as deployments continue to spread - we may soon reach a point of radiation pollution in which densely populated wireless stations interfere with one another to cause severe performance degradations. The performance of such densely populated networks is non-scalable. The total capacity reaches a ceiling as the number of nodes increases. question is whether networks can be made to be scalable. To answer this question, we need to 1) identify the fundamental causes for the nonscalable performance; and ) to devise a strategy to overcome them. This paper does both. In a previous work of ours [1], two types of interferences have been isolated and examined separately: 1) physical interferences due to the receiver s inability to decode a signal when the powers received from other sources are large; and ) protocol interferences imposed by the specific multi-access protocol being used. This paper elaborates the impact of these interferences on scalability. * This work was sponsored by the reas of Excellence scheme established under the University Grant Committee of the Hong Kong Special dministrative Region, China (Project Number oe/e-01/99). The rest of this paper is organized as follows. In Section II, we review the model of physical constraints used in this paper. Section III derives the constraints imposed by due to its virtual and physical carrier-sensing mechanisms as well as its stop-and-wait RQ. Section IV examines the implications of the physical and protocol constraints around a link, and presents numerical results showing that there is a fundamental trade-off in networks that is preventing it from achieving scalable performance. Based on the insights obtained, we devise a scheme that make performance scalable in Section V. Section VI concludes this paper and presents promising future research arising from this work. II. PHYSICL CONSTRINTS To model physical interference, this paper adopts the protocol model in []. Consider two links, links 1 and. Let T i and R i be the transmitter and receiver of link i, respectively. The model in [] assumes link can interfere with link 1 if < ( 1 + ) and link 1 can interfere with link if (1) where is the location of node i, and > 0 is related to a i power margin. Simultaneous transmissions on links 1 and are not possible if either (1) or is true. Inequalities (1) and can be derived from a signal-to-interference requirement and typical signal power as a function of distance relationship [3]. lthough reference [] names the model a protocol model, it may not capture all interferences imposed by a specific protocol. In addition to (1) and, MC protocols may introduce additional protocol-specific constraints to further limit channel spatial re-use. III. IEEE PROTOCOL CONSTRINTS To avoid simultaneous transmissions that cause collisions, a distributed multi-access protocol can be used. multi-access protocol s function is (i) to avoid simultaneous transmissions that may lead to collisions under the physical constraints, while (ii) allowing simultaneous transmissions that are collision-free under the physical constraints. The MC protocol may fail to achieve (i) or (ii). We first derive the protocol constraints based on its carrier sensing mechanism. We assume the RTS/CTS access mode. RTS/CTS can be decoded if the distance of transmission

2 is less than the virtual carrier sensing range ( VCSRange ). Consider links 1 and, and suppose link 1 s transmission is already in progress when link has a packet to transmit. Link cannot transmit if any of the following inequalities is satisfied: R (5) R (6) If inequality were satisfied, would have received the RTS of T 1 and the NV contained in the RTS would prevent T from transmitting. Similarly, if inequality were satisfied, T would have received the CTS of R 1. In inequalities (5) and (6), R would have received the RTS of T 1 and CTS of R 1 respectively, and it would not reply to the RTS of if T sent one. Besides virtual carrier sensing, physical carrier sensing may also prevent simultaneous transmissions. For physical carrier sensing, the preamble of the PHY header is decoded. The length field in the PHY header informs the receiver of the duration of the payload that follows. When T or 1 T can decode the PHY preamble transmitted by each other, simultaneous transmissions will be prevented: < PCSRange (7) where PCSRange is the physical carrier-sensing range. Inequalities -(7) are related to simultaneous transmissions that are disallowed by through its carrier sensing mechanism. If none of -(7) is satisfied, carrier sensing cannot prevent simultaneous transmissions, but the simultaneous transmissions may not be successful if one of the following is true: R < PCSRange (8) < PCSRange (9) For (8), if T 1 transmits first followed by, then R will not attempt to receive the signal form. Similar argument applies for (9). In addition, the CK of one link may collide with the DT or CK of the other. Each atomic communication on a link i consists of a DT frame in the forward direction and an CK frame in the reverse link i in the other direction. So, simultaneous communications on two links i and j are interference-free if the link pairs i and j, i and j, i and j; and i and j are interference-free. Thus, collisions due to the RQ of could occur if one of the following is true: (10) (11) (1) (13) (14) (15) The relative size of PCSRange and VCSRange matters as far as which of the inequalities (1)-(15) are distinct. n ideal protocol will be one in which the protocol constraints overlap exactly with the physical constraints so that only (1) and are distinct. Unfortunately, that is generally not the case. IV. LOCL EFFECTS OF PHYSICL ND PROTOCOL CONSTRINTS UNDER VRIOUS TRNSMISSION RTES FOR DT, RTS/CTS/CK, ND PHY PREMBLES In this section, we evaluate the effectiveness of the protocol around a local link under various transmission-rate settings. We assume the use of 80.11b, which supports four data transmission rates, 1,, 5.5 and 11Mbps. The same methodology is applicable to 80.11g and 80.11a. TBLE I. TRNSMISSION RNGES FOR VRIOUS DT RTES. Data Rate (Mbps) TxRange (m) TBLE II. RELTIONSHIPS BETWEEN TxRange, VCSRange ND PCSRange UNDER VRIOUS TRNSMISSION RTES. PHY Preamble Rate Data Rate Basic Rate 1Mbps Mbps 1Mbps 1Mbps (1) --- Mbps 5.5Mbps 11Mbps 1Mbps Mbps 1Mbps Mbps 5.5Mbps 1Mbps Mbps 5.5Mbps 11Mbps --- (1) Table I shows the maximum transmission ranges (TxRange), adopted from [4], which assumes omni antennae. Table II shows the PCSRange, VCSRange, and transmission range (TxRange) under various transmission rates for PHY, RTS/CTS/ CK (i.e., basic rate) and DT (i.e., data rate). Typically, PHY _ rate basic _ rate data _ rate, implying TxRange VCSRane PCSRange. The settings in Table II can be grouped into four main cases: (1) TxRange = VCSRange = PCSRange; TxRange = PCSRange; TxRange < PCSRange; TxRange = VCSRange < PCSRange. Let us assume the use of the two-ray propagation model with the SIR requirement set to 10dB. From [5], the interference range due to physical constraints for R for link ( T, R ) is InRange d where d = T. That R is, there should not be another transmitter within the InRange

3 of R when T is transmitting to R. Note that InRange depends on the distance d. The VCSRange and PCSRange for the protocol constraints, on the other hand, are independent of d. Thus, may not approximate the physical constraints well. Case (1): For case (1), Fig. 1 shows the interference region, virtual carrier-sensing region and physical carrier-sensing region when T and R are separated by d = TxRange. simultaneous transmission by another node in the shaded region will cause physical interference at R but is allowed by the protocol. Figure 1. Effects of physical and protocol constraints when TxRange = VCSRange = PCSRange Consider link B inside the shaded region with T B in the shaded region. Transmitter T B (node 3) and receiver R B (node 4) cannot hear the transmission of link. transmission from node 3 to node 4 will cause a collision at R. In this case, fails to prevent collisions. Consider link B in the reverse direction in which node 4 is the transmitter and nodes 3 is the receiver. In this case, the CK of node 3 to node 4 will interfere with the DT from T to R (inequality (10)). gain, fails to prevent collision-causing simultaneous transmissions. The cross-lined region on the right side in Fig. 1 is covered by the protocol constraints but not the physical constraints. This implies simultaneous transmissions are allowed in the real physical situation, but are restricted by the protocol. Note that the smaller the d, the smaller is the shaded region; but the larger is the cross-lined region (see Fig. 3). This means that the ability for to allow proper simultaneous transmission decreases with its ability to disallow improper simultaneous transmissions. This is a fundamental deficiency of the current protocol that is preventing scalable performance. Case : For PCSRange(Mbps)=VCSRange(Mbps) or PCSRange(1Mbps) = VCSRange(1Mbps) > TxRange(11Mbps), the interference region is fully covered by the carrier-sensing region. This means that can successfully prevent collisions. However, it over-estimates the region in which simultaneous transmissions are not allowed, limiting channel spatial re-use. With the same PCSRange and VCSRange, if we have TxRange(Mbps) or TxRange(5.5Mbps), we again have the same scenario as in Case (1) in which the probability of failing to prevent collisions trade-off against the probability of preventing legitimate simultaneous transmissions. Case : For case, again, depending on the parameter setting, the interference region may or may not be fully covered by carrier sensing, and the same trade-off observed before applies. In addition, the fact that VCSRange ( Mbps) < PCSRange ( 1Mbps) means that inequalities (7)-(9) are not included in other inequalities and are distinct. In this case, the directionality of links matters. We introduce the straight dotted-line region (see Fig. ) in which if only the receiver (e.g., node 3 in the figure), but not the transmitter, is within the physical carrier-sensing range but outside the virtual carrier-sensing range of R, simultaneous transmissions from node 4 to node 3 and from T to R are still allowed by the protocol and they will succeed. However, if node 3 is transmitting to node 4 when T sends an RTS to R request for transmission, R will not reply to T because R has already heard the physical preamble of node 3. Thus, another receiver in the straight-dotted line region will not interfere with the transmission of link, but a transmitter may. Figure. Effects of physical and protocol constraints when TxRange < PCSRange Case : Discussion similar to the other cases applies here. Figure 3. reas of cross-lined and straight-dotted lined regions, and shaded region of case (1) versus d in typical settings for the four cases: (1) TxRange(Mbps) = VCSRange(Mbps) = PCSRange(Mbps)

4 TxRange(11Mbps) (Mbps) = PCSRange(Mbps) TxRange(11Mbps) (Mbps) < PCSRange(1Mbps) TxRange(11Mbps) = VCSRange(11Mbps) < PCSRange(1Mbps) Figure 3 shows the areas of cross-lined and straight-dotted lined regions against d in the four cases for typical parameter settings. s d decreases, the cross-lined and straight-dotted lined regions expand, and the difference between the network capacity under and the potential network capacity under only (1) and increases. This means the smaller the d, the more spatial-reusable resources are wasted with 80.11, a cause for non-scalable performance. Numerical Results To evaluate this non-scalable capacity, we generated random network topologies with various numbers of links in a circular plane of km radius. Figure 8 plots the NS [6] simulation results of the capacities and transport capacities [] as a function of the number of nodes in a circular plane of km radius. The total network capacities in all four cases reach a limit after 60 nodes. When node density increases, the throughput does not increase. In fact, the transport capacity goes down after 60 nodes. This is because links of shorter distance in are favored because shorter-distance links have a smaller carrier-sensing region, and the RTS/CTS of fewer other nodes can reach them to bar them transmitting. The average transport distance of a typical transmission is therefore smaller as number of nodes increases. whole area, no other transmissions are allowed. The theoretical results of [] based on physical constraints (1) and alone, however, indicate that the total network capacity should not reach a limit as the number of nodes increases, even without adaptive power control. This means that the standard fails to scale in a situation that is potentially scalable. We have focused on capacity as a performance measure in the above. In general, fairness is also a performance measure of interest. The degree of fairness achievable given a network topology can also be subjected to similar study as above. For example, reference [7] proposed an algorithm to allocate fair shares to links under the objective of max-min fairness. For details of the algorithm, we refer interested reader to [7]. V. SELECTIVE DISREGRD OF NVS For scalable performance, we need to find a way to make use of the carrier-sensing property of without having it limit spatial re-use. That is, we need to eliminate inequalities (9). We present a scheme below. We assume that VCSRange and PCSRange > Max InRange. This would be the case, for example, if the data rate is 11Mbps, basic and preamble rates are Mbps or 1Mbps. To eliminate the effect of the inequalities (9) on the protocol operation, each node could construct an interference graph (i-graph) [1] with i-edges due to (1), and (10) (15) incidents on the node s links. In an i-graph, an arrow-shape vertex represents a wireless link with the arrowhead pointing toward the receiver. There is an i-edge between vertices 1 and if (1), or (10)-(15) is satisfied. Figures 5 show an example of mapping a network topology to an i-graph. a) b) Figure 4. a) Total network capacity and b) total transport capacity verses number of nodes in a circle of km radius Both the virtual and physical carrier-sensing ranges are fixed. No other transmissions are allowed within the carrier sensing ranges of a transmitting link. The total network capacity does not scale with the number of nodes because once the carrier-sensing regions of existing transmissions cover the Figure 5. Mapping of a network topology a) to b) link-interference graph The construction of the i-graph could be based on the signal powers it hear from other links in the neighborhood. When transmitting or receiving, the nodes of a link can ignore the NV in the RTS/CTS that they hear from another nearby link if there is no such i-edge between the two links. The basic idea is to remove constraints to (9) in the protocol operation. The first algorithm below eliminates the effects of -(6); the second algorithm constructs the neighborhood i-graph for each node. The third is a feature of I. Selective Disregard of NV (SDN) (i) Each node a keeps an NV set, NVa = {NV(a, k)}, consisting of the NVs node a hears in its neighborhood, where k is the label for links. NVs heard are contained in the RTS and CTS sent by other nodes.

5 (ii) Suppose there is a packet for transmission from node a to node b (or from nodes b to a). Node a will send an RTS to b (or will reply a CTS to the RTS of b) if and only if for all k with NV(a, k) > 0, there is no i-edge between the following four vertex pairs: Vertex (a, b) and vertex k Vertex (a, b) and vertex k (link k in the reverse direction) Vertex (b, a) and vertex k Vertex (b, a) and vertex k In particular, NVs from links that do not have an i-edge with vertex (a, b) or (b, a) will be ignored II. Power Exchange for i-graph Construction (PE) ssumption: Same transmit power and receiver sensitivity for all nodes. (i) Each node a measures the powers from the RTS/CTS it hears in the neighborhood and keep it in a power set, Pa = {P(c, a)} where c is the node label of the sender. (ii) Each node a broadcasts Pa periodically using basic rate. (iii)node a constructs i-edges affecting it as follows. There is an i- edge between: Vertex (a, b) and vertex (c, d) if P(a, b) < K P(c, b) or P(c, d) < K P(a, d); Vertex (a, b) and vertex (d, c) if P(a, b) < K P(d, b) or P(d, c) < K P(a, c); Vertex (b, a) and vertex (c, d) if P(b, a) < K P(c, a) or P(c, d) < K P(b, d); Vertex (b, a) and vertex (d, c) if P(b, a) < K P(d, a) or P(d, c) < K P(b, c), where K > 1 should be sufficiently large (e.g., K = 10 for 10dB power margin) To see that PE does not miss any i-edge, without loss of generality, suppose that there should be an i-edge according to the first condition above, but node a misses it. If P(c, b) > P(a, b)/k, according to the assumption of VCSRange > Max InRange > TxRange, node b should have been able to hear the RTS/CTS sent by node c and therefore associate the measured received power with c. This is because P(a, b)/k > Po(TxRange)/K > Po(Max InRange) > Po(VCSRange), where Po(.) denotes the received power at a specific distance from the transmitter. If this is the case, in step (ii) node a should have received the values of P(a, b) and P(a, b) from node b with its periodic broadcast, and node a could not have missed the detection of this i-edge. If P(a, d) > P(c, d)/k, then P(d, a) = P(a, d) = P(c, d)/k > Po(TxRange)/K > Po(Max InRange) > Po(VCSRange). Therefore, P(c, d) and P(a, d) transmitted by node d periodically using the basic rate in step (ii) could not have been missed by node a, since the transmission range for the basic rate is VCSRange. III. Receiver Restart Mode (RS) In some commercial chips, there is a so-called re-start mode in the receiver design. If the receiver is in the midst of receiving a signal, another signal with sufficiently large power margin arrives, the receiver will switch to receive the new signal. This feature can be used to lift the limitations imposed by inequalities (7)-(9) to allow proper simultaneous transmissions. The power margin could be set to K in the PE algorithm above. If the power received from the transmitter is K times more than that from an interfering source, (7) and (9) will not come into effect. If it is less than K time, the link should not transmit simultaneously anyway by the restriction of (1),, (10)-(15). Detailed simulation of the algorithms and receiver operation on the NS platform will be explored in future work. Here, we present results from a simplified MTLB simulation experiment to study the potential advantage of SDN compared with regular Table III shows the average throughputs and transport capacities [] obtained from 500 simulation runs. In each run, a random network is created, with n nodes are randomly placed inside a circle of radius 150m. The transmit powers are kept constant as n varies. Each node could potentially transmit to all other nodes within its TxRange. That is, there is a link between a node and all other nodes within TxRange. The data rate is 11Mbps and the RTS/CTS/PHY transmission rate is Mbps. The corresponding VCSRange and TxRange ranges are respectively 437m and 3m, assuming omni antenna. With this setting, is effective in avoiding all potential collisions. But it is overly aggressive in disallowing simultaneous transmissions. SDN removes this defect. Given a random network topology, we then choose links to transmit either (i) in random order; (ii) in ascending order of the link distance; or (iii) in descending order of the link distance. For example, for (i), we randomly order the links in the network, and then we scan though the links in that order, each time allowing the link to transmit if inequalities (1),, (10)-(15) are not violated by other links already chosen to transmit. The operation of the contention-backoff mechanism in the standard is closest to (i). (ii) and (iii) simulates scenarios where priorities are given to small-hop links and large-hop links, respectively. t the end of each run, the throughput (i.e., number of transmitting links) and the transport capacity (i.e., sum of link distances of all transmitting links) are computed. s shown in Table III, the throughput and transport capacity quickly reach a limit as n increases, while those of SDN do not (for cases (i) and (ii)). Indeed, if priorities are given to links of small hops, SDN performance scales very well with n. One could argue intuitively that for very large n, the small-hop SDN throughput should be of order n + f(n), where f(n) is an increasing function of n, if the boundary effect of the area containing the nodes can be ignored. The corresponding transport capacity should be of order n + f(n) / n. To see this, suppose that the circle in the above simulation is a small area a within a large expanse of area. Given a certain node distribution in, suppose we map the position of node i, i to i = k*i, where k < 1. Suppose we also reduce the TxRange to k*txrange. The nodes in area a are then mapped to an area of a. However, the scaling does not affect the form of inequalities (1),, (10)-(15) and the throughput of the nodes within a is the same as the throughput within a previously. For the original area a, the throughput has increased by a factor of 1/k. So does the number of nodes in a. Now this is assuming TxRange has been reduced to k*txrange.

6 If this reduction had not occur and priority were given to link of small-hop as in (ii), then all the links with distances smaller than k*txrange would be considered for transmission first according to (ii). By the time we scan through all these links, the throughput in a would have increased by 1/k. The additional throughput from links with distance larger than k*txrange are icing on the cake if we can pack their transmissions in. It is also not difficult to understand the non-scalability of intuitively. The areas of the exclusion regions, a concept introduced in [] and [8], do not decrease as the node density increases. If we estimate the area of the exclusion region of a link as π (VCSRange/) and divide the area of the circular plane by this value, we get a value of 16.4, which is slightly higher than the throughput result obtained in Table III, possibly due to the slack in the packing problem. One could of course use power control and decrease the transmit power as n increases. Current standard and products, however, do not have power control. Indeed, if power control is considered, the i-edges in SDN could be decreased for additional performance improvement. That will be an interesting subject for future study. Before leaving this section, we note that SDN could also be modified to capture and work with the physical interferences from multiple nodes beyond the pair-wise physical interference model []. in networks to scale as node density increases, without the need for adaptive power control. REFERENCES [1] P. C. Ng, S. C. Liew, L. B. Jiang, Performance Evaluation Framework for IEEE d-hoc Networks, CM Workshop on Performance Evaluation of Wireless d Hoc, Sensor, and Ubiquitous Networks (PE-WSUN 04), Venice, Italy, Oct. 004 [] P. Gupta, P. R. Kumar, The Capacity of Wireless Network, IEEE Trans. on Information Theory, Vol. 46, No., pp , Mar [3] T. Rappaport, Wireless Communications: Principles and Practice, Prentice Hall, New Jersey, 00. [4] S. Bansal, R. Shorey,.. Kherani, Performance of TCP and UDP Protocols in Multi-Hop Multi-Rate Wireless Networks, IEEE WCNC 04, pril 004. [5] K. u, M. Gerla, S. Bae, How Effective is the IEEE RTS/CTS Handshake in d Hoc Networks?, IEEE GLOBECOM '0, Vol. 1, pp. 17-1, Nov. 00. [6] The Network Simulator ns, [7]. L. Huang, B. Bensaou, On Max-min Fairness and Scheduling in Wireless d-hoc Networks: nalytical Framework and Implementation, CM MobiHoc 01, pp. 1-31, Oct [8]. garwal, P. R. Kumar, Capacity bounds for ad-hoc and hybrid wireless networks. CM SIGCOMM Computer Communication Review, pp , Vol. 34, No. 3, July 004 Table III. SIMULTION RESULTS FOR ND SDN WITH RNDOM / SMLL-HOP/ LRGE-HOP TRNSMISSION PRIORITIES: T = THROUGHPUT (IN 11 MBPS) ND C = TRNSPORT CPCITY (IN 11 MBPS*KM). n T (80.11) 7./8.0/5.0 1/14/11 14/15/1 14/14/1 T (SDN) 9./11/7.0 18/5/11 6/5/13 34/93/13 C (80.11) 1.1/.66/ /.79/.0 1.9/.63/.6 1.9/.41/.5 C (SDN) 1.4/1.0/1.3./1.7/.3 3.0/.8/.9 3.6/3.6/.7 VI. CONCLUSION This paper has formulated a general framework to study the limits against spatial reuse imposed by multi-access protocols. The framework consists of isolating intrinsic physical interferences from protocol interferences imposed by the multiaccess protocol. By identifying the causes for the extraneous protocol constraints, we could devise strategies to overcome them. We have applied the framework to study the multiaccess protocol. Specifically, we have examined the local behavior around a link and global behavior of the overall network, and conclude that there is a fundamental trade-off between the protocol s ability to prevent collisions and its ability to allow legitimate spatial re-use. This trade-off cannot be removed by simply adjusting the settings for the transmission rates of RTS/CTS, DT and CK. The key to overcoming the fundamental limitations is to remove the extraneous constraints imposed by the protocol. We have demonstrated this with a scheme that allows the capacity

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks

Many-to-One Throughput Capacity of IEEE 802.11 Multi-hop Wireless Networks IEEE TRASACTIOS O MOBILE COMPUTIG, MAUSCRIPT ID Many-to-One Throughput Capacity of IEEE 80. Multi-hop Wireless etworks Chi Pan Chan, Student Member, IEEE, Soung Chang Liew, Senior Member IEEE, and An Chan,

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES. www.globalknowledge.com

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES. www.globalknowledge.com Expert Reference Series of White Papers Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES www.globalknowledge.com Wireless Bandwidth Not Necessarily as Advertised Ted Rohling, Global Knowledge

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone

More information

Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects

Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects ACCEPTED FROM OPEN CALL Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects Xueyuan Su, Yale University Sammy Chan, City University of Hong Kong Jonathan H. Manton, The University

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Estimation of Link Interference in Static Multi-hop Wireless Networks

Estimation of Link Interference in Static Multi-hop Wireless Networks Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill Microsoft Research University of Texas, Austin

More information

3. TMT for IEEE 802.11g Networks

3. TMT for IEEE 802.11g Networks 136 IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.4, April 2011 The Theoretical Maximum Throughput Calculation for the IEEE802.11g Standard Alex V. Barbosa, Marcos F.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Selfish MAC Layer Misbehavior in Wireless Networks

Selfish MAC Layer Misbehavior in Wireless Networks 1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers

GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers F. Galliano (1), N.P. Magnani (1), G. Minerva (1), A. Rolando (2), P. Zanini (3) (1) CSELT - Via G. Reiss Romoli, 274 - Torino

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks

On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

8. Cellular Systems. 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992.

8. Cellular Systems. 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992. 8. Cellular Systems References 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992. 3. G. Calhoun, Digital Cellular Radio, Artech House,

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks

Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile d Hoc Networks Yiming Liu, Victor O. K. Li, Ka-Cheong Leung, and Lin Zhang, Department of Electronic Engineering Tsinghua University,

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Cumulative Noise and 5.9 GHz DSRC Extensions for ns-2.28

Cumulative Noise and 5.9 GHz DSRC Extensions for ns-2.28 Cumulative Noise and 5.9 GHz DSRC Extensions for ns-2.28 Felix Schmidt-Eisenlohr, Marc Torrent-Moreno, Tessa Tielert, Jens Mittag, Hannes Hartenstein Institute of Telematics, University of Karlsruhe, Germany

More information

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,

More information

Spatially Limited Contention for Multi-Hop Wireless Networks

Spatially Limited Contention for Multi-Hop Wireless Networks Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

System Design in Wireless Communication. Ali Khawaja

System Design in Wireless Communication. Ali Khawaja System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

How To Understand And Understand The Power Of A Cdma/Ds System

How To Understand And Understand The Power Of A Cdma/Ds System CDMA Technology : Pr. Dr. W. Skupin www.htwg-konstanz.de Pr. S. Flament www.greyc.fr/user/99 On line Course on CDMA Technology CDMA Technology : Introduction to Spread Spectrum Technology CDMA / DS : Principle

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation

A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS

POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS Nalin Gahlaut 1, Jaya sharma 2, Sandip Vijay 3, S.C. Gupta 4 1 Doctoral Candidate, Uttarakhand Technical

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

WIRELESS networks that are widely deployed for commercial

WIRELESS networks that are widely deployed for commercial 342 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 1, JANUARY 2007 Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface Jungmin So and Nitin H. Vaidya,

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Location management Need Frequency Location updating

Location management Need Frequency Location updating Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission

More information