1 The International Arab Journal of Information Technology, Vol. 6, No. 4, October Mobility and QoS of and e Wireless LAN Standards Fedoua Didi 1, Houda Labiod 2, Guy Pujolle 3, and Mohamed Feham 1 1 Department of the University of Tlemcen, University Abou Bekr Belkaid of Tlemcen, Algeria 2 Department INFRES in Computer Science, Enst of Paris, France 3 University Pierre and Marie Curie, France Abstract: Quality of service is a key problem in wireless environments where bandwidth is scarce and channel conditions are time varying and sometimes implies highly packet losses. IEEE b/g/a wireless LAN are the most widely used WLAN standards today, and the IEEE e quality of service enhancement standard exists and introduces quality of service support for multimedia applications. This paper compares the propositions of standard IEEE e with the standard IEEE without quality of service, a simulation of these standards is performed by using the network simulator simulator. We test also the mobility and the roaming of stations. A discussion is presented in detail using simulation-based evaluations and we let us confirm the quality of service of IEEE e compared to IEEE , but we have detected some weaknesses of e. It starves the low priority traffic in case of high load, and leads to higher collision rates, and did not make a good estimate of weight of queues, so there is an unbalance enters the flows with high priorities. Keywords: IEEE , Medium access control, quality of service, distributed coordination function, point coordination function, hybrid coordination function. Received January 18, 2008; accepted May 20, Introduction IEEE Wireless LAN (WLAN)  is one of the most deployed wireless technologies all over the world and is likely to play a major role in next generation wireless communications networks. The main characteristics of WLAN technologies are simplicity, flexibility, mobility and cost effectiveness. This technology provides people with a ubiquitous communications and computing environment in offices, hospitals, campuses, factories, airports, stock markets, etc. Simultaneously, multimedia applications have experienced an explosive growth. People are now requiring receiving high speed video, audio, voice and Web services even when they are moving in offices or travelling around campuses. However, multimedia applications require some quality of service support such as guaranteed bandwidth, delay, jitter and error rate. Guaranteeing those Quality of Service (QoS) requirements in WLAN is very challenging due to the QoS unaware functions of its Medium Access Control (MAC) layer and the noisy and variable PHYsical (PHY) layer characteristics. In this paper we compare the two standards and e to look at their QoS, mobility and roaming, by using a simulation with Network Simulator (NS) and present a detailed discussion of results. The paper is organized as follows. Section 2 introduces an overview of IEEE WLAN and section 3 introduces the QoS enhancement standard e. In section 4, we present the model of simulation with its parameters and a detailed discussion of results. Finally, we conclude the paper in section Description of Standard The IEEE WLAN standard covers the MAC sub-layer and the PHY layer of the Open System Interconnection (OSI) network reference model . Logical Link Control (LLC) sub-layer is specified in the IEEE standard. This architecture provides a transparent interface to the higher layer users: STAtions (STAs) may move, roam through an WLAN and still appear as stationary to LLC sub-layer and above. This allows existing TCP/IP protocols to run over IEEE WLAN just like wired Ethernet deployed. We can show  different standardization activities done at IEEE PHY and MAC layers. The standard comprises three PHY layers, which are an InfraRed (IR) base band PHY; a Frequency Hopping Spread Spectrum (FHSS) radio and Direct Sequence Spread Spectrum (DSSS) radio. These entire choices support both 1 and 2Mbps PHY rate. In 1999, the IEEE define two high rate: b in the 2.4GHz band with 11Mbps, based on DSSS technology; and a in the 5GHz band with 54Mbps, based on Orthogonal Frequency Division
2 404 The International Arab Journal of Information Technology, Vol. 6, No. 4, October 2009 Multiplexing (OFDM) technology. Recently, g is finalized to be an extension of b with 54Mbps in the 2.4GHz band The MAC Sub-Layer of It defines two medium access coordination functions, the basic Distributed Coordination Function (DCF) and the optional Point Coordination Function (PCF) . Asynchronous transmission is provided by DCF which operate in contention-based period, and synchronous transmission is provided by PCF that basically implements a polling-based access which operate in contention free period. A group of STAs coordinated by DCF or PCF is formally called a BaSic Set (BSS). The area covered by BSS is the Basic Service Area (BSA), like a cell in a cellular mobile network. Two modes exist: ad-hoc mode and infrastructure mode. The first mode forms an Independent BSS (IBSS) where the STAs can directly communicate with each other by using only the DCF, without any connectivity to any wired backbone. In the second mode, the STAs communicate with the wired backbone through the bridge of Access Point (AP), which can use both DCF and PCF Distributed Coordination Function DCF is a distributed medium access scheme based on Carrier Sense Multiple Accesses with Collision Avoidance (CSMA/CA) protocol. In this mode, the STAs must sense the medium before transmitting a packet, if the medium is found idle for an interval of time longer than a Distributed InterFrame Space (DIFS); the STA can transmit the packet immediately , meanwhile other STAs defer their transmission and adjusting their Network Allocation Vector (NAV) which is a local timer. Then the backoff process starts, the STA compute a random: Backoff_timer=rand [0, CW]*slot time (1) where CWmin CW (window contention parameter) CWmax, and slot time depends on the PHY layer type. The backoff timer is decreased only when the medium is idle. Each time the medium becomes idle, the STA waits for a DIFS and continuously decrements the backoff timer. As soon as the backoff expires, the STA is authorized to access the medium. Obviously, a collision occurs if two or more STAs start transmission simultaneously. If the acknowledgement, used to notify that the transmitted frame has been successfully received as shown in Figure 1, is not received, the sender assumes that a collision was occurred, so it schedules a retransmission and enters the backoff process again. To reduce the probability of collisions, after each unsuccessful transmission attempt, the CW is doubled until a predefined maximum value CWmax is reached. But after each successful transmission, the CW is reset to a fixed minimum value CWmin. To resolve the problem of hidden stations, an optional RTS/CTS scheme is introduced. The source sends a short RequestToSend RTS frame (20 bytes) before each data transmission, as shown in Figure 2, and the receiver replies with a ClearToSend CTS frame (14 bytes) if it is ready to receive. Two carrier sensing mechanisms are possible, PHY carrier sensing at air interface and virtual carrier sensing at PHY MAC layer. Virtual carrier sensing can be used by an STA to inform all other STAS in the same BSS how long the channel will be reserved for its frame transmission. On this purpose, the sender can set a duration field in the MAC header of data frames, or in the RTS and CTS control frames. Then other STAS can update their NAVS to indicate this duration, and will not start transmission before the updated NAV timers reach zero. Figure 1. Basic DCF CSMA/CA. Figure 2. RTS/CTS access scheme PCF: Point Coordination Function PCF uses a centralised polling scheme, which requires the AP as a Point Coordinator (PC) in a BSS. The channel access time is divided into periodic intervals named beacon intervals, as shown in Figure 4. The beacon interval is composed of a Contention-Free Period (CFP) and a Contention Period (CP). During the CP, the PC maintains a list of registered STAs and polls each STA according to its list. Then, when a STA is polled, its gets the permission to transmit data frame. Since every STA is permitted a maximum length of frame to transmit, the maximum CFP duration for all the STAs can be known and decided by the PC, which
3 Mobility and QoS of and e Wireless LAN Standards 405 is called CFP_max_duration. The time used by the PC to generate beacon frames is called Target Beacon Transmission Time (TBTT). In the beacon, the PC denotes the next TBTT and broadcast it to all the others in the BSS. In order to ensure that no DCF STAs are able to interrupt the operation of the PCF, a PC waits for a PCF InterFrame Space (PIFS), which is shorter than DIFS, to start the PCF. Then, all the others STAs set their NAVs to the values of CFP_max_duration time, or the remaining duration of CFP in case of delayed beacon. During the CP, the DCF scheme is used, and the beacon interval must allow at least one DCF data frame to be transmitted. A typical medium access sequence during PCF is shown in Figure 3. When a PC polls an STA, it can piggyback the data frames to the STA together with the CF-poll, then the STA sends back data frame piggybacked with an ACK after a SIFS interval. When the PC polls the next STA, it piggybacks not only the data frame to the destination, but also an ACK to the previous successful transmission. Note that almost all packet transmissions are separated by the SIFS except for one scenario: if the polled STA does not respond the PC within a PIFS period, the PC will poll the following STA. Silent STAs are removed from the polling list after several periods and may be polled again at beginning of the next CFP. At any time, the PC can terminate the CFP by transmitting a CF-end packet, then all the STAs in the BSS should reset their NAVs and attempt to transmit during the CP. Normally, PCF uses a round robin scheduler to poll each STA sequentially in the order of polling list, but priority based polling mechanisms can also be used if different QoS levels are requested by different STAs. mechanisms. One main feature of HCF is to introduce four Access Category (AC) queues and eight Traffic Stream (TS) queues at MAC layer. When a frame arrives at MAC layer, it is tagged with Traffic Priority Identifier (TID) according to its QoS requirements. This can take the values from 0 to 15. The frames with TID values from 0 to 7 are mapped into four AC queues using EDCA access rule. On the other hand, frames with TID values from 8 to 15 are mapped into eight TS queues using HCF controlled channel access rule. The reason of separating TS queues from AC queues is to support strict parameterized QoS at TS queues while prioritized QoS is supported at AC queues. Another main feature of the HCF is the concept of Transmission OPortunity (TXOP), which is the time interval permitted, for a particular STA to transmit packets. During the TXOP, there can be a series of frames transmitted by an STA separated by SIFS. The TXOP is called either EDCA-TXOP, when it is obtained by winning a successful EDCA contention; or polled-txop, when it is obtained by receiving a QoS CF-poll frame from the QoS-enhanced QP (QAP). The maximum value of TXOP is called TXOPLimit, which is determined by QAP Enhanced Distributed Coordination Function The Enhanced Distributed Coordination Function (EDCA) is designed for the contention-based prioritized QoS support. Figure 4 shows that in EDCA, each QoS-enhanced STA (QSTA) has 4 queues ACs, to support 8 User Priorities (UPs). Therefore, one or more UPs are mapped to the same AC queue, as shown in Figure 5. This comes from the observation that usually eight kinds of applications do not transmit frames simultaneously, and using less ACs than UPs reduces the MAC layer overheads. Each AC queue works as an independent DCF STA and uses its own backoff parameters. Figure 3. PCF and DCF cycles . 3. Description of e Standard 3.1. Hybrid Coordination Function There are many new features in e draft 4.2 . In this section, we will briefly describe Hybrid Coordination Function (HCF). HCF is composed of two access methods: contention-based channel access (called EDCA) and controlled channel access Figure 4. EDCA proposed by e. Figure 5. Mapping between UP and AC.
4 406 The International Arab Journal of Information Technology, Vol. 6, No. 4, October 2009 The first one uses different InterFrame Space (IFS) sizes for different ACs. Figure 6 shows the detailed timing diagram of the EDCA scheme. A new kind of IFS called Arbitrary IFS (AIFS) is used in EDCA, instead of DIFS in DCF. AIFS [AC] = AIFSN [AC] * SlotTime + SIFS. (2) where the default value of the Arbitration Inter Frame Spacing Number (AIFSN) is defined as either 1 or 2 . When AIFSN=1, high priority queues AC1, AC2 and AC3 have AIFS value equal to PIFS. When AIFSN=2, the low priority queue AC0 has AIFS value of DIFS. When a frame arrives at an empty AC queue and the medium has been idle longer than AIFS [AC] +SlotTime, the frame is transmitted immediately. If the channel is busy, the arriving packet in each AC has to wait until the medium becomes idle and then defer for AIFS+SlotTime. So the AC with the smaller AIFS has the higher priority. For example, the earliest transmission time for high priority queue is to wait for PIFS+SlotTime=DIFS, while the earliest transmission time for best effort queue is to wait for DIFS+ SlotTime. Figure 6. EDCA channel access IFS relationships. The second method consists in allocating different CW sizes for different ACs. Assigning a short CWsize to high priority AC ensures that in most cases, highpriority AC is able to transmit packets ahead of lowpriority one. If the backoff counters of two or more parallel ACs in one QSTA reach zero at the same time, a scheduler inside the QSTA will avoid the virtual collision by granting the EDCA-TXOP to the highest priority AC. At the same time, the other colliding ACs will enter a backoff process and double the CW sizes as if there is an external collision. In this way, EDCA is supposed to improve the performance of DCF under congested conditions. The default values of AIFSN [AC], CWmin [AC], CWmax [AC] and TXOPLimit [AC] are announced by the QAP in beacon frames, and the e standard also allows the QAP to adapt these parameters dynamically depending on network conditions . But how to adapt to the channel has not been defined by the standard and remains an open research issue. To improve the throughput performance, EDCA packet bursting can be used in e, meaning that once a QSTA has gained an EDCA-TXOP, it can be allowed to send more than one frame without contending for the medium again. After getting access to the medium, the QSTA can send multiple frames as long as the total access time does not exceed the TXOPLimit bound determined by QAP. To ensure that no other QSTA interrupts the packet bursting, SIFS is used between packet bursts. If a collision occurs; the EDCA bursting is terminated. This mechanism can reduce the network overhead and increase throughput by multiple transmissions using SIFS and burst acknowledgements. However, bursting may also increase the jitter, so TXOPLimit should not be longer than the time required for the transmission of the largest data frame HCF Controlled Channel Access The HCF controlled channel access mechanism (HCCA) is designed for the parameterized QoS support, which combines the advantages of PCF and DCF. HCCA can start the controlled channel access mechanism in both CFP and CP intervals, whereas PCF is only allowed in CFP. Figure 7 is an example of typical e beacon interval, which is composed of alternated modes of optional CFP and CP. During the CP, a new contention-free period named Controlled Access Phase (CAP) is introduced. CAPs are several intervals during which frames are transmitted using HCCA. HCCA can start a CAP by sending downlink QoS-frames or QoS CP-Poll frames to allocate polled-txop to different QSTAs after the medium remains idle for at least PIFS interval. Then the remaining time of the CP can be used by EDCA. This flexible contention-free scheme makes PCF and CFP useless and thus optional in the e standard. By using CAP, the HCF beacon interval size can be independent of targeted delay bounds of multimedia applications. For example, in order to support audio traffic with a maximum latency of 20 ms using PCF, the beacon interval should be no more than 20ms since the fixed portion of CP forces the audio traffic to wait for the next poll. On the other hand, the HCCA can increase the polling frequency by initiating CAP at any time, thus guarantee the delay bound with any size of beacon interval. So there is no need to reduce the beacon interval size that increases the overheads. Moreover, the problem of beacon delay in PCF is solved, because in HCF, a QSTA is not allowed to transmit a frame if the transmission cannot be finished before the next TBTT. Figure 7. A typical e HCF beacon interval.
5 Mobility and QoS of and e Wireless LAN Standards 407 In HCCA, QoS guarantee is based on the Traffic SPECification (TSPEC) negotiation between the QAP and the QSTAs. Before transmitting any frame that requires the parameterized QoS, a virtual connection called TS is established. In order to set up a TS, a set of TSPEC parameters (such as mean data rate, nominal frame size, maximum service interval, delay bound, etc.) are exchanged between the QAP and the corresponding QSTAs. Based on these TSPEC parameters, the QAP scheduler computes the duration of polled-txop for each QSTA, and allocates the polled-txop to each QSTA. Then the scheduler in each QSTA allocates the TXOP for different TS queue according to the priority order. A simple round-robin scheduler is proposed in the IEEE e draft 4.2 . The simple scheduler uses the following mandatory TSPEC parameters: mean data rate, nominal MAC frame size and maximum service interval or delay bound. Note that the maximum service interval requirement of each TS corresponds to the maximum time interval between the start of two successive TXOPs. If this value is small, it can provide low delay but introduce more CF-Poll frames. If different TS have different maximum service interval requirements, the scheduler will select the minimum value of all maximum service interval requests of all admitted streams for scheduling. Moreover, the QAP is allowed to use an admission control algorithm to determine whether or not to allow new TS into its BSS. When TS is set up, the QAP attempts to provide QoS by allocating the required bandwidth to the TS. During a CFP, the medium is fully controlled by QAP. During a CP, it can also grab the medium whenever it wants (after a PIFS idle time). After receiving a QoS CF-poll frame, a polled QSTA is allowed to transmit multiple MAC frames denoted by Contention-Free Burst (CFB), with the total access time not exceeding the TXOPLimit. All the other QSTAs set their NAVs with the TXOPLimit plus a slot time. By this way, they will not contend for the medium during that period. If there are no frames to be sent to the QAP, the polled QSTA will send a QoS- Null frame to the QAP which can poll another QSTA. 4. Simulation-Based Evaluations of Qos Enhanced Schemes In , , and , different simulations have been conducted with different topology and parameters of EDCA. To evaluate the performance of DCF and EDCA schemes, we consider the topology shown in Figure 8 and uses NS-2 , and , there is no mobility in the system, each station operates at IEEE b PHY and transmits three types of traffic (audio, video and data traffic) to each other. The EDCA and DCF MAC parameters are listed in Tables 1 and 2. We use RTP/UDP/IP traffic sources. We vary the load rate by increasing the number of STAs from 0 to 6. Figure 9 shows the simulation results for the bandwidth, and latency. We can see that average throughput of three kinds of flows per STA are stable and sufficient as long as the channel load rate is less than 70% at the 25 th second, after all flows degrade themselves dramatically in DCF, but not in EDCA. And we let us notice, that there is a high rate loss of packets in DCF, and a low rate loss of packets in EDCA. We see also that latency is good for all flows, but at the 25 th second, it increases significantly in DCF. On the other hand, in EDCA only data suffer by a high latency. The evolution of latency in DCF, in function of channel load rate is dramatic for all flows after 70% rate, but in EDCA after 60% only data flow degrade themselves. Parameters Table 1. EDCA Parameters. Audio PCM Vidéo MPEG4 Vidéo VBR Data CWmin CWmax AIFSN Packet Size (Bytes) Packet Interval (ms) Sending Rate (KB/s) AP Table 2. DCF Parameters. SIFS 16µs MAC header 28bytes Infrastructure mode (PCF) DIFS 34µs PLCP header length 4µs ACK size 14bytes Preamble length 20µs PHY rate 36Mbps CWmin 15 Slot time 9µs WCmax 1023 (a) Ad hoc mode (DCF). (b) Wired network. Figure 8. Simulation Topology used (DCF and EDCF).
6 408 The International Arab Journal of Information Technology, Vol. 6, No. 4, October 2009 STA7 to STA12 transmits a Variable Bit Rate (VBR) video flow with Arrival period almost equal to 26, Packet size almost equal to 660, Sending rate almost equal to 200 and a priority of 5. STA13 to STA18 transmits a MPEG4 video flows with Arrival period=2, Packet size=800, Sending rate=3200 and a priority of 4. Let us notice that latency of VBR flows fluctuate and increase dramatically, what is not the case of the other flows. This is with the fact that the AP is unable to make a good estimate of the size of the queues for a good scheduling. Figure 9. Throughput and latency performance for DCF and EDCA. Figures 10 and 11 show the advantages of HCCA compared to EDCA, we simulate a topology with 13 STAs (STA 0 is the AP), six STAs transmit each one an audio flow, and the six others transmit a video flow (CBR MPEG4) at AP. We notice that the throughput (D) is stable and distributed well on all the STAs by HCF, which is not the case for EDCA, where D fluctuate too much quickly, what indicates a bad management of the bandwidth. For EDCA, the latency increases all gently when the channel load rate increases but only for audio flows, for the video flows, the latency increase brutally. For HCCA, the evolution of latency is the same for all flows. Figure 12 shows the limitations of HCCA by a simulation of 19 STAs (the STA 0 is the AP) and STA1 to STA6 transmits a PCM Audio flows with inter arrival time of 4.7ms, Packet size of 160 bytes, Sending rate of 64Kbps and a priority of 6. Figure 10. Throughput for EDCA and HCF Controlled channel access. Figure 11. Channel load versus latency for EDCA and HCCA. Figure 12. Latency and evolution of latency for HCCA. Figure 13. Topology of simulated networks. For simulate the mobility of stations, we use an IBSS of seven mobiles stations (number 0 to 6) in ad hoc mode by using the DCF protocol, and the stations number 3 and 4 as shown in Figure 13. Another network with two AP (two BSS) of 13 nodes, stations number 0 to 5 are wired stations and connected with the two AP numbers 6 and 7. We have also five mobiles stations numbered for 8 to 12, all move by changing BSS (roaming), as shown in Figure 13. We use data communications within scenario like noted in the Table 3 for the first topology and Table 4 for the second topology. Figure 14 (a), which represents the cumulative sum of all sent and received packets by network, shows that it increase quickly, after it stabilize between 14, 2s and 20, 02s because there is only one communication in the network, after it increase, thing completely normal. Figure 14 (b), which represents the throughput for sending packets (packets per s), shows that for the two periods between 14-16s and 24-26s, there are brutal falls of throughput, corresponding to moves of the stations 6 and 3 and use of intermediate stations like relay.
7 Mobility and QoS of and e Wireless LAN Standards 409 Commu Nication Table 3. Scenario for the first topology. Start of comm End of comm Trans proto Type of comm 5 to 2 4,12 13,12 TCP Direct 1 to 4 7,00 17,00 UDP Direct 6 to 0 10,02 14,12 TCP Use relay Sta 4 6 to 2 16,00 20,00 UDP Direct 4 to 5 18,00 24,00 UDP Direct 3 to 6 20,02 30,00 TCP Direct and At 24s, sta 1 relay and dropped packets by the AP7 and AP6, respectively. Commu Nication Table 4. Scenario for the second topology. Start of comm End of comm Trans Proto Type of comm 1 to 8 0,02s 4,12s TCP By useap6 4 to 11 5,15s 20,15s TCP By use AP7,and at12,45 by AP6 Roaming 5 to 12 14,1s 35,0s UDP By use AP7 3 to 9 21,0s 35,0s UDP By use AP7 And by AP6 Roaming (a) (b) Figure 15. Simulation results of the second topology (stations in roaming). (c) Figure 14. Simulation results of the first topology (stations in roaming). Figure 14 (c), which represents the cumulative sum of dropped packet, show a light increase, follow by a stronger one corresponding of an overload of station 4, which relay the packets of station 6 and transmit its proper packets. One stable period between 14, 12 and 24s, is follow at 24 th second by a great number of dropped packets, corresponding to a relay. Figure 15 (a) shows the cumulative sum of all sent and received packets by infrastructure network, which increase linearly and after stabilize. Figure 15 (b) indicates falls of throughput in two points, which correspond to instant of stations roaming. Thing confirmed by the Figure 15 (c). When Figures 15 (d), (e), (f), and (g) corresponding of cumulative sum of all sent, received (d) We notice that for the AP6, the number of packets sent and received is the same, because there are no dropped packet, that is not the case for AP7, witch have a great number of dropped packets. This is due to an overhead corresponding to changes in BSS. So we conclude that the roaming and the moves of stations are not done under good conditions, since there are a lot of packets dropped before the relay is done. We also notice, that the protocol TCP is not well adapted for wireless communications, because it takes more much time for establishing connexions, which is not the case for UDP protocol witch is more adapted. The simulations have been done with DCF protocol, because there is no difference between EDCA in terms of mobility. The maximum length of packets is taken 10, 000bytes, the average inter-arrival time is 0,05s and the average packet size is 512 bytes.
8 410 The International Arab Journal of Information Technology, Vol. 6, No. 4, October Conclusion The results of simulation show that the protocol DCF can only support best-effort services, not any QoS guarantees, all the STAs in one BSS compete for the resources and channel with the same priorities. There is no differentiation mechanism to guarantee bandwidth, packet delay and jitter for high priority STAs or multimedia flows. The EDCA protocol show to be the best choice for high priority traffic, but it starves the low priority traffic in case of high load, and leads to higher collision rates. Furthermore, when channel is 90% loaded, the throughput of audio and video start to decrease, which means that admission control for audio and video is required during very high load. The HCCA protocol has a drawback, that AP did not make a good estimate of weight of queues, so there is an unbalance enters the flows with high priorities. So the comparison between the two standards and e has demonstrated that for supporting QoS, e is more powerful than which are good for best effort services only. The second part of the simulation shows that the roaming and the moves of stations are not done under good conditions, since there are a lot of packets dropped before the relay is done. Protocol TCP is not well adapted for wireless communications, which is not the case for UDP protocol witch is more adapted.  IEEE WG, Draft Supplement to Standard for Telecommunications and Information Exchange between Systems Local and Metropolitan Area Network-Specific Requirements Part 11: Wireless LAN Medium Access Control and Physical Layer Specifications, Enhancements for QoS IEEE e/Draft 4.2,  Lindgren A., Almquist A., and Schelen O., Evaluation of Quality of Services Schemes for IEEE Wireless LANs, in Proceedings of the 26 th Annual IEEE Conference on local Computer Networks, USA, pp ,  Qiang N., Romdhani L., and Turletti T., A Survey of QoS Enhancements of IEEE Wireless LAN, Computer Journal of Wireless Communications and Mobile Computing, vol. 4, no. 5, pp , References  Aad I. and Castelluccia C., Differentiation Mechanisms for IEEE , in Proceedings of IEEE Infocom Anchorage Alaska, USA, pp ,  Anelli A. and Horlait C., Manuel NS Version 2: Principes de Conception et d Utilisation, Technical Report, Université Paris 6, UPMC- LIP6.  Benveniste M., Chesson G., Hoeben M., and Singla A., EDCF Proposed Draft Text IEEE e, Working Document /131r1,  Bonin M., Introduction à la Simulation d un Réseau à Travers NS,  Carta A., A Network Topology Presentation Tool, Project Report, Berkeley,  Hung P., NS2 Tutorial, PhD Thesis, University of Toronto,  IEEE WG, Standard Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan Area Network-Specific Requirements Part 11: Wireless LAN Medium Access Control and Physical Layer Specification, Reference number ISO/IEC :1999 (E) STD , 1999.
9 Mobility and QoS of and e Wireless LAN Standards 411 Fedoua Didi received her Master in Telecommunications from the University of Tlemcen, Algeria in Since 1991, she has been assistant professor in computer engineering. She has served on the scientific council and other committees of Computer Department of the University of Tlemcen. Her research interest now is mobile networks and services, QoS service provisioning, performance evaluation, modelling and security of large-scale distributed systems. Houda Labiod is an associate professor at Department INFRES in computer science and network at Telecom ParisTech previously named ENST in Paris, France since In 2005, she obtained her HDR Habilitation à diriger les recherches. Prior to this, she held a research position at Eurecom Institute, Sophia-Antipolis, France. She obtained her PhD thesis from the University of Versailles Saint-Quentin-en- Yvelines, France in Guy Pujolle received the PhD and Thèse d'etat degrees in computer science from the University of Paris IX and Paris XI on 1975 and 1978, respectively. He is currently a professor at the University of Paris VI and a member of the scientific advisory board of the france telecom group (FT, Orange, Wanadoo). Mohammed Feham received the PhD engineering degree in optical and microwave communications from the University of Limoges, France in 1987, and his PhD in science from the University of Tlemcen, Algeria in Since 1987, he has been assistant professor and professor of microwave and communication engineering.
10 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
11 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
12 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
13 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
14 416 The International Arab Journal of Information Technology, Vol. 6, No. 4, October 2009
15 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
17 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
18 The International Arab Journal of Information Technology, Vol. 6, No. 4, October
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (email@example.com) Chapter
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/ Jordi
IEEE 802.11e WLANs / WMM S.Rajesh (firstname.lastname@example.org) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
QOS PROTECTION FOR IEEE 802.11E IN WLAN WITH SHARED EDCA AND DCF ACCESS Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/
Video Transmission over Wireless LAN Hang Liu Hang.email@example.com Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
Announcements 18-759: Wireless Networks Lecture 9: 80.11 Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 016 http://www.cs.cmu.edu/~prs/wirelesss16/
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
A Survey of QoS Enhancements for IEEE 802.11 Wireless LAN Qiang Ni *, Lamia Romdhani, Thierry Turletti Planete Group, INRIA, 2004 route des Lucioles BP93, 06902 Sophia Antipolis, France Summary Quality
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
V OICE OVER WIRELESS LOCAL AREA N ETWORK IEEE 802.11E ENHANCEMENT FOR VOICE SERVICE PING WANG, HAI JIANG, AND WEIHUA ZHUANG, UNIVERSITY OF WATERLOO Wired network IP phone Gateway router Access point Motivated
-DAC: A Distributed Admission Control Scheme for IEEE 8.e WLANs Kiran Kumar Gavini, Varsha Apte and Sridhar Iyer Kanwal Rekhi School of Information Technology Indian Institute of Technology Bombay, Powai,
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
How To Configure the WLAN with QoS Introduction This How to Note explains how to configure Quality of Service (QoS) in a wireless Local Area Network to prioritize traffic under busy conditions. There is
Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University
A Software Architecture for Simulating IEEE 802.11e HCCA Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea Dipartimento di Ingegneria dell'informazione University of Pisa, Italy IPS-MoMe
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg firstname.lastname@example.org Avaya Labs Research Basking Ridge, NJ USA Martin Kappes email@example.com Avaya Labs Research
802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. firstname.lastname@example.org Technical Reviewer: GT Hill, CWNE #21 email@example.com Copyright 2009 CWNP, Inc.
Performance Comparison of Dual Queue and for VoIP over IEEE 8. WLAN Jeonggyun Yu and Sunghyun Choi Multimedia & Wireless Networking Laboratory (MWNL), School of Electrical Engineering, Seoul National University,
1 IEEE 802.11 (WLAN) Standards Osama Aboul-Magd Abstract This presentation provides an overview of the IEEE 802.11 Standards. Both MAC and PHY specifications are considered. 2 Outline Introduction IEEE
Link Layer Standards and Protocols Link Layer Standards IP Layer (Network Layer) LLC IEEE 802.2 MAC IEEE 802.X Physical Layer Medium Access Control Layer Services Concerned with the following Channel allocation
Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications
Performance evaluation of QoS in wireless networks using IEEE 802.11e Laio B. Vilas Boas, Pedro M. C. Massolino, Rafael T. Possignolo, Cintia B. Margi and Regina M. Silveira Abstract The increase demand
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.12, December 2009 89 Enhancing WLAN MAC Protocol performance using Differentiated VOIP and Data Services Strategy S.Vijay
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Voice Call Quality Using 802.11e On A Wireless Mesh Network by David Alexander van Geyn A thesis submitted to the School of Computing in conformity with the requirements for the degree of Master of Science
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Internet Access and QoS in Ad Hoc Networks Ali Hamidian Department of Communication Systems Faculty of Engineering ISSN 1101-3931 ISRN LUTEDX/TETS 1077 SE+118P c Ali Hamidian Printed in Sweden E-kop Lund
ISSN : 2229-4333(Print) ISSN : 976-8491(Online) Simulator to Analyze QoS for /a/g standards Rohit Sharma SUSCET, Tangori, Mohali, Punjab, India E-mail : firstname.lastname@example.org IJCST Vo l. 1, Is s u e 2, De
A Comparative Study of Video Transfer over Bluetooth and 802.11 Wireless MAC Aravind Iyer and U. B. Desai SPANN Laboratory Department of Electrical Engineering IIT Bombay, INDIA - 400076 Abstract In this
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: email@example.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: firstname.lastname@example.org Abstract In this paper, we study the
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 351-362 International Research Publications House http://www. irphouse.com /ijict.htm A Comparative
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity Gráinne Hanley, Seán Murphy and Liam Murphy Dept. of Computer Science, University College Dublin Belfield, Dublin 4, Ireland email@example.com,
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to
1 A Real-Time Multimedia Streaming Protocol for Wireless Networks Hans Scholten, Pierre Jansen, Ferdy Hanssen, Wietse Mank and Arjan Zwikker University of Twente, Department of Computer Science (EEMCS),
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and
WLAN QoS : 802.11e Merle Frédéric Summary Introduction What is QoS? Why do we need QoS in wireless LAN nowadays? 802.11e MAC Protocol Enhanced Distributed Channel Access (EDCA) Presentation How does it
(Cross-layer design and network planning for B3G systems) Aspects of Coexistence Between WiFi and HSDPA Orlando Cabral Valdemar Monteiro 2005, it - instituto de telecomunicações. Todos os direitos reservados.
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
1 Dynamic Traffic Prioritization in 802.11e Networks William Spearman, James Martin, James Westall Abstract The IEEE 802.11 family of standards defines a collection of widely used local wireless network
Voice over WLAN (VoWLAN) A wireless voice alternative? Trond Ulseth Paal Engelstad Abstract Voice over WLAN (VoWLAN) is a natural evolution of VoIP. It is also a potential supplement or a potential competitor
1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
ABSTRACT The draft IEEE 82. Wireless Local Area Network (WLAN) specification is approaching completion. In this article, the IEEE 82. protocol is explained, with particular emphasis on the medium access
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
Wireless-LAN & IEEE 802.11 standard Pietro Nicoletti Piero[at]studioreti.it WiFi-Engl - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties.
IEEE 802.11 André Stranne Lund University June 2003 IEEE 802 Background IEEE Computer Society Local Network Standards Committee Project 802 (IEEE sequence number for standards projects) First meeting 1980
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The