How Conservative IEEE DCF is when using Directional Antenna?

Size: px
Start display at page:

Download "How Conservative IEEE DCF is when using Directional Antenna?"

Transcription

1 How Conservative IEEE DCF is when using Directional Antenna? Tamer Nadeem Siemens Corporate Research Princeton, NJ 854 Abstract Directional antennas have been introduced to improve the performance of based wireless networks. Station equipped with directional antennas can beamform data in a specific direction. However, IEEE is developed with omni-directional antennas in mind. Thus, deploying IEEE in a directional antenna environment leads stations to be conservative in blocking their own transmissions in favor of the ongoing transmissions. In this paper we study and analyze the limitation of IEEE networks with directional antennas. We show analytically that a station with directional antenna and using protocol is conservative in terms of assesses channel availability, with as much as 6% of unnecessary blocking assessments. Moreover, by altering the way the accessing its MAC data queue, we show that the unnecessary blocking assessments of a node could be increased up to 9%. Index Terms Wireless Networks, IEEE 82.11, Medium Access Control, Carrier Sense, Directional Antenna, Performance Analysis. I. INTRODUCTION Directional antennas have been introduced to improve the performance of wireless networks [3], [8], [13], [16], [2]. A station equipped with directional antennas can beamform data in a specific direction. The transmitter beamforms the data in the direction of the receiver with diminished interference in the remaining directions. Thus, the network capacity is increased as a consequence of spatial spectrum reuse. The IEEE [1], and carrier sensing protocols in general, was developed with omni-directional antennas in mind. It assumes that all the packets (RTS/CTS/DATA/ACK packets) are transmitted as omni-directional signals that are received by all nearby nodes. Deploying IEEE in a directional antenna environment does not exploit fully the directional antennas characteristics. The main reason is that stations are conservative in blocking their own transmissions in favor of the ongoing transmissions, although their transmissions will not result in interferences with other transmissions. Thus, many modifications (e.g., [3], [4], [6], [17]) were introduced to allow based protocols to exploit the intrinsic features of directional antennas to increase throughput. In this paper, we analyze the performance of IEEE DCF under the use of directional antennas. More specifically, we define two main blocking problems when using the directional antenna. Then we study analytically the limitation Nodes located between R and C Nodes located witihin R Source Destination DIFS Contention Window RTS SIFS CTS SIFS NAV (RTS) NAV (CTS) Data SIFS ACK Fig. 1. IEEE DCF mechanism where EIFS is the Extended Inter Frame-Space period for packets received incorrectly, R is the transmission range, and C is the carrier sense range and conservation of IEEE under these two problems. Later, we verify our analysis through simulation. A. IEEE DCF Mode II. BACKGROUNDS The protocol is developed for wireless networks using omni-directional antennas. The basic MAC method of IEEE 82.11, the DCF, is a Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism. ACK frames are used in the DCF for acknowledging the reception of unicast data frames. The CSMA scheme of the DCF works as follows: Before a station transmits, it must sense the wireless channel to determine if any other stations are transmitting. The channel is assessed as busy if there is detected carrier signal. If the channel is assessed as busy, the station needs to wait until the carrier becomes idle. Then, it waits more for a period known as the Distributed Inter-Frame Space (DIFS). After the DIFS period is passed, the station waits for a random back-off interval and then transmits if the medium is still free. An optional exchange of short Request-To-Send (RTS) and Clear-To-Send (CTS) control frames may precede the actual data frame transmission to reserve the channel. Any station, that overhears either the RTS or the CTS, blocks its own transmissions (if any) to yield to the communication between this sender and its receiver. Each station maintains a timer called the Network Allocation Vector (NAV) which tracks the remaining time of any ongoing data transmission. After a station receives a

2 RTS, CTS, DATA, or ACK frame not destined to itself, it sets its NAV according to the Duration field of the frame. Figure 1 illustrates how stations set their NAVs during a RTS-CTS-DATA-ACK handshake. Checking its NAV before a station attempting to transmit is also known as virtual carrier sensing. If the NAV is not zero, the station needs to block its own transmissions to yield to the ongoing data delivery even if there is no physical signal. In summary, a station blocks its own transmissions if either physical carrier sensing or virtual carrier sensing indicates busy channel. For the rest of the paper, we use carrier sensing to refer to both physical carrier sensing and virtual carrier sensing. B. Directional Antenna Model Directional antennas can transmit data in both omni and directional modes. In omni-directional transmission, the station can transmit with equal power to all directions. In directional transmission, the station directs its energy toward the required direction, called the main lobe, with side and back lobes with lower energy.we adopt the ideally-sectorized pattern [8], [12], that is, there are no side and back lobes. The two-dimensional shape of the adopted directional model is shown in Figure 2. We will discuss the effect of this simplification assumption later. The switched-beam [13] model for directional antenna is used in this paper. In such model, the space of each station is divided into multiple sectors each with predefined fixed beam. Depending on the signal strength and direction, the station chooses one of the possible predetermined beams to transmit or receive data. Figure 3 shows node v with 8 sectors. A station uses both omni and directional modes in receiving ongoing transmission. When the station is idle (not transmitting or receiving), it resides in the omni mode. Once it detects a signal from a certain direction, it starts receiving this signal in omni mode. While it is receiving this signal, it steers the antenna to the direction (or switches to one of the predefined beams) that maximizes the received power. If the node discovers that this transmission is not intended to itself 1, it switches back to omni mode. Otherwise, it switches back to omni mode after it completes the packet reception. Note that the NAV mentioned in the previous subsection is not applicable within such directional transmission of frames. Thus, DNAV, proposed in [3], [17], [18], is used with directional antenna. Unlike NAV, each DNAV is associated with a direction and a width, and multiple DNAVs can be set for a node. A node maintains a unique timer for each DNAV, and updates the direction, width and expiration time of each DNAV every time the physical layer gives newer information about the corresponding ongoing transmission. III. PROBLEM FORMULATION In this section, we define two blocking problems of the IEEE DCF when using directional antennas. 1 Several techniques has been proposed in sensor and ad hoc networks to allow a node to discover whether the ongoing transmission is destined to itself. Among those techniques the use of RTS/CTS, and augmenting PLCP header with additional parameters [1]. Fig. 2. B D E C A Opportunistic MAC example In the original protocol, a station blocks its transmission when it senses a busy carrier. But, if the direction of transmission does not interfere with the ongoing transmissions, this blocking is unnecessary. One way for a station to determine whether its transmission will interfere with these ongoing transmissions is by collecting the locations of transmitters and receivers. Several methods have been proposed in literature allowing a station to acquire its own location, such as using GPS [5], or using RF based localization method [2], [9]. Consider node A that is engaged in a beamforming transmission to the direction of node B as in Figure 2. If Node C wants to beamform data to node D, the running IEEE carrier sense mechanism at node C will block this transmission because of the ongoing transmission between A and B. However, since the ongoing transmission is not destined to C and since the C-D transmission direction would not interfere with A-B transmission as shown in the figure, node C should not block. We refer to this problem as Carrier Sense Blocking (CS Blocking ) problem. The second problem with IEEE DCF happens when the transmission direction of the topmost data item in the node s queue is blocked (due to some ongoing transmission), the station blocks its transmission until that direction becomes free. However, there could exists a subsequent data item in the station s queue in which its transmission s direction does not interfere with any of the ongoing transmissions. Therefore, the station can transmit this data immediately instead of the topmost data. Consider Figure 2 where station A is engaged in a transmission by beamforming data to station B. Assume the top two data items at station C s should be beamformed to stations E and D respectively. Since, C-E transmission is blocked because of the ongoing A-B transmission, IEEE running on station C blocks and wait until C- E direction become free again. However, since the C- D transmission direction would not interfere with A-B transmission, node C should not block, and transmit the seconds data item in its queue to D instead. We refer to this problem as Head-of-Line Blocking (HOL Blocking ) problem. In this paper, we study the CS Blocking and HOL Blocking problems by calculating analytically the potential gain of transmission in the presence of signals in the neighborhood for CS Blocking problem, and presence of blocked direction of the topmost element in the queue for HOL Blocking problem. For both, we verify this potential gain with simulation.

3 IV. RELATED WORKS Previous works address the capacity of wireless networks using directional antennas such as [15], [2]. In [15], authors calculated upper bounds for the capacity gains of using directional antennas. The calculations of the interference based capacity bounds are given for a generic antenna model as well as a real-world antenna model. On the other hands, authors in [2] focused on discovering the lower bounds in capacity improvement that directional antennas can provide. Different RTS/CTS handshake mechanisms with their corresponding analysis for directional antenna are addressed in several works [6], [8], [11], [16] [19] to allow simultaneous transmissions that are disallowed when using only omnidirectional antennas. The effect of using different combination of omni/directional transmissions for one or both of RTS/CTS frames on network performance where studied in term of network throughput [6], [8], [13], [14], [17] [19] or power consumption [11], [16]. All the above mechanisms follow the CSMA mechanism in forcing a node sensing a busy carrier to postpone its transmission although it may not affect the ongoing transmission. DBTMA/DA [7] addressed this problem by avoiding the carrier sense mechanism through splitting a single channel into two sub-channels and used directional busy-tones to accomplish the virtual sensing instead of the physical carrier sense. Using directional transmitting busy tones, it shares the similar feature of the directional RTS frame schemes in that it reserves the network capacity in a finer grain and thus relieves the exposed terminal problem. In the meantime, by using directional receiving busy tones, it realizes a similar functionality of blocking the corresponding antenna element in the direction from which omni-directional CTS frame is received. However, this mechanism require the use of two separate sub-channels which does not follow the standards. Although literature mentioned the inefficiency in IEEE protocol, we are the first, to the best of our knowledge, to analyze the Carrier Sense and Head-of-Line blocking problems in the context of IEEE network using directional antennas. V. ANALYSIS OF BLOCKING PROBABILITIES WITH OPPORTUNISTIC MAC In this section, we (1) study the CS Blocking problem by deriving the probability that a station has an opportunity to transmit directionally despite the presence of transmissions in its vicinity, and (2) study the HOL Blocking problem by deriving the probability that a station has an opportunity to transmit directionally given that the destined sector of the packet at the top of the MAC queue is blocked. Next, we validate the analytical results by simulation and show the potential improvements of opportunistic schemes. In our analysis, we assume two sets of stations: one for transmitters, and another for receivers. Each connection consists of a pair of stations, a transmitter and a receiver. We assume that transmitter, and consequently receivers, are #4 #5 #3 #2 w 2 #6 s 2 v Fig. 3. Blocking analysis where R is the transmission range and C is the carrier sense range uniformly distributed over an area with a density of δ. Each station has a transmission range, R, within which frames sent by the station can be received and decoded, and a carrier sense range C along the directional transmission, which is the range within which transmissions of the station can be detected (channel busy). All stations have the same traffic model, and all data packets are of the same length. Each packet requires transmission time τ, and is randomly destined to a 1-hop neighbor. As mentioned earlier, the space of each transmitter, and consequently receiver, is divided into n sectors (Figure 3 shows a node with 8 sectors). Each transmitter has several ongoing connections in which the corresponding receivers are assumed to be distributed uniformly over m sectors of the n possible sectors, where m n. Each transmitter generates data packets with a rate of 1 T, where T > τ. All transmitters use the same transmission power. r 2 R r 1 #7 w 1 A. Analysis of Carrier Sense Blocking Probability Sometimes, a station unnecessary blocks its transmission, because its carrier sense indicates a busy channel. We say unnecessary because, despite sensing a busy carrier, a station can still transmit without interfering with any of the ongoing transmissions. Consider a scenario (see Figure 3), where station v establishes a connection with station w 2 in sector #4. The standard forces station v to block its transmission once it senses (either physically or virtually) the ongoing transmission between station s 1 and station r 1, or between station s 2 and station r 2. However the directional transmission from station v to station w 2 would not affect any of those ongoing directional transmission, and thus station v should not block its transmission to w 2. In order for station v to avoid interfering with any of the ongoing transmissions of DATA and ACK packets, station v should block its transmission in a specific sector i only if (1) C #1 #8 s 1

4 a sender station s in sector i is transmitting, and station v is in the transmission cone of s (to avoid interfering with ACK reception at s), or 2) a station r in sector i is receiving, and station v is in the reception cone of r (to avoid interfering with DATA reception at r). In case of omni-reception, the condition for v being in the transmission or reception cone is not needed. Assuming that a node v wants to transmit directionally to a sector i with an angular sector η = 2π n, we define the following: P (CS T r ) is the probability that, for all the connections that have their transmitters inside sector i and their corresponding receivers outside sector i, every single transmitter is either not transmitting (1 τ T ), or transmitting and v is outside its transmission cone ( τ 2π η T 2π ). The number of these connections is equal to η 2 C2. The negative term is equal to number of δ η 2 C2 δ n connections that have both their transmitters and receivers in the sector i. P (CS Rcv ) is the probability that, for all the connections that have their transmitters outside sector i and their corresponding receivers inside sector i, every single receiver is either not receiving, or receiving and v is outside its reception cone. The number of these η 2 C2. connections is equal to δ η 2 C2 δ n P (CS T rrcv ) is the probability that, for all the connections that have their transmitters and receivers inside sector i, every single transmitter is either (1) not transmitting (and, thus, the receiver is not receiving), or (2) transmitting and v is outside both the transmission and reception cones of the transmitter and the receiver respectively. The number of these connections is equal to δ n η 2 C2. P (CS Idle ) is the probability that sector i is not blocked and, thus, station v is able to carry out a directional transmission through sector i. P (CS Idle ) equals the multiplication of P (CS T r ), P (CS Rcv ) and P (CS T rrcv ). P (CS Idle ) = P (CS T r ) P (CS Rcv ) P (CS T rrcv ) = [(1 τ T ) + τ 2π η T 2π ](δ δ n ) η 2 C2 [(1 τ T ) + τ 2π η T 2π ](δ δ n ) η 2 C2 2π η 2π η 2π 2π ] δ η n 2 C2 [(1 τ T ) + τ T = [(1 τ 1 T n ) δ(n 1) π n n C2 ] 2 [(1 τ T ) + τ T (n 1 n )2 ] δ π n n C2 (1) In standards, a station v blocks its transmission to sector i if v is in transmission cone of a transmitter in any sector, or v is in the reception cone of a receiver in sector i. Similarly to the above analysis, which has removed due to space limitation, we define P (Std Idle ) to be the probability that sector i is not blocked as follows: P (Std Idle ) = [(1 τ 1 T n ) δ(n 1) n πc 2 ] [(1 τ T ) + τ T (n 1 n )2 ] δ π n C 2 Therefore, P (CS Blocking ), which is the probability that node v blocks unnecessarily, is: (2) P (CS Blocking ) = P (CS Idle ) P (Std Idle ) (3) We verify this analytical model by generating random network topologies and traffic patterns, and studying the blocking probabilities in each case. For constructing each random network, we place the station v at the center of an area of 1m 1m, and distribute transmitter stations uniformly in this area. Each transmitter is paired with a corresponding receiver, which is randomly located within a circular area of radius R that is centered at the transmitter. All packets require transmission time τ, and are generated randomly at a constant rate: one packet every time interval T, where T > τ. The transmission beam width is set at 2π/n where n is number of the neighbor sectors of a node. When station v has a frame to send, it selects randomly a sector to transmit to, and checks whether it can transmit its frame. For the original mechanism, the number of runs in which node v was able to transmit its frame is divided over the total number of transmission attempts to derive P (Std Idle ). Similarly, we can determine P (CS Idle ). We compare P (CS Idle ) and P (Std Idle ), in addition to P (CS Blocking ), to those calculated from the analytical result. Figure 4 plots both the analytical and the simulated curves of P (CS Idle ), P (Std Idle ) and P (CS Blocking ) versus for C = 55m, n = 8, τ/t =.1 and different numbers of stations (thus varying the station density δ). Figure 4 shows that the simulation results closely match the analytical results which validates our analysis. Note that the calculated P (CS Blocking ) is still conservative because we assume, for simplicity, that all stations in the vicinity of v have the freedom of transmission. We do not take into account that some of these stations have to block because of other ongoing transmissions in their vicinities. Accounting for these blocked stations would increase P (CS Blocking ). To analyze how our simplified assumption affects our probability calculations, we relaxed this assumption in the simulation runs as shown in Figure 5. The figure, also, plots P (CS Blocking ) with different packet load values and different sector numbers to show how different parameters affect the P (CS Blocking ). The P (CS Blocking ) plot with conservative assumption, copied from Figure 4, is also included for easy comparison. B. Analysis of Head-of-Line Blocking Probability Following the CS Blocking problem, it happens that the corresponding sector of the packet at top of MAC queue of a station v is blocked, while other sectors corresponding to other packets in the queue are not blocked. To improve network performance, a station should transmit one of the packets corresponding to a non-blocked sector instead of obeying

5 1.8 Analytical P_S Analytical P_O Analytical P_G Simulation P_S Simulation P_O Simulation P_G 1.8 Analytical P_S Analytical P_O Analytical P_G Simulation P_S Simulation P_O Simulation P_G Probability.6.4 Probability Fig. 4. The analytical and simulation values of the probabilities P S=P (Std Idle ), P O=P (CS Idle ), and P G=P (CS Blocking ) Fig. 6. The analytical and simulation values of the probabilities P S=P (Std Idle ), P O=P (HOL Idle ), and P G=P (HOL Blocking ) Probability t =.1, n=8 (from above figure) t =.5, n=8 t =.1, n=8 t =.5, n=8 t =.1, n=4 t =.1, n= Fig. 5. The probability P (CS Blocking ) with different load values t where t = τ/t and different number of sectors n the standard by postponing transmissions until the transmission of packet at the queue s top. Consider the example in Figure 3. Station v has two packets to transmit: the top packet of its queue is to be transmitted to station w 1 in sector #1, and the next is to be transmitted to w 2 in sector #4. Station v is blocked from transmitting to sector #1, because of the transmission from station s 1 to station r 1. In standard 82.11, station v has to postpone all its transmission until sector #1 becomes free. However, since sector #4 is free while sector #1 is blocked, station v should go ahead with its transmission to station w 2 first in order to increase the spatial reuse of the medium. Assuming each transmitter has several connections and the corresponding receivers are distributed uniformly over m sectors of the n possible sectors, we define P (HOL Idle ) to be the probability that at least one sector of the m neighbor sectors is idle (not blocked). Calculating P (HOL Idle ) is tricky, because the blocking probabilities of sectors are not independent, since a transmission may block either one or two sectors. For example, sectors #2 and #6 in Figure 3 are blocked because of the transmission between stations s 2 and r 2. On the other hand, the transmission between stations s 1 and r 1 blocks only sector #1. To simplify the calculation of P (HOL Idle ), we assume the blocking probabilities of sectors are independent. In fact, this simplification will result in calculating the upper bound of P (HOL Idle ) instead. Later, we will show the effect of this simplification and the difference betwen the upper bound and the actual values using simulation. Given this simplification, the upper bound probability of P (HOL Idle ) is calculated as: P (HOL Idle ) = 1 (1 P (CS Idle )) m (4) where m is the number of neighbor sectors and 1 P (CS Idle ) is the probability that a sector is blocked. P (CS Idle ) is calculated in Equation 1. Consequently, the upper bound of P (HOL Blocking ), which is the probability of having at least one of the m neighbor sectors of node v idle, given that the sector corresponding to the topmost packet of the queue is blocked, is: P (HOL Blocking ) = P (HOL Idle ) P (Std Idle ) (5) where P (Std Idle ) is given in Equation 2. Similar to the previous subsection, we verified our analytical results by simulations. In the simulations, whenever v has a frame to send, we select ordered list of m sectors randomly from the n neighbor sectors assuming node v has queue of frames ready to be sent to their destinations in the corresponding m sectors. We study if node v can send any frame from its queue without affecting the ongoing transmissions. The number of runs in which node v is able to transmit is divided over the total number of transmission attempts to derive the probability of P (HOL Idle ). P (Std Idle ), P (HOL Idle ) and P (HOL Blocking ) are compared to the analytical result. Figure 6 plots both the analytical and the simulated values of P (Std Idle ), P (HOL Idle ) and P (HOL Blocking ) for R = 25m, C = 55m, n = 8, m = 4, τ/t =.1, and different numbers of stations (thus varying the station density δ). Although the analytical P (HOL Idle ) and P (HOL Blocking ) are upper bounds, the simulations results closely match those values specially at the peak values, which is our main interest.

6 Probability t =.5, n=8, m=4 t =.1, n=8, m=4 t =.5, n=8, m=4 t =.1, n=4, m=4 t =.1, n=12, m=4 Fig. 7. The probability P (HOL Blocking ) with different load values t where t = τ/t and different number of sectors n while m is fixed to 4 Therefore, the simulation validates our analysis and our simplifications are reasonable. Similar to the analysis of P (CS Blocking ) in the previous section, Figure 7 plots the simulation of P (HOL Blocking ) after relaxing the conservative assumption in calculating P (HOL Blocking ) shown in Figure 6. The figure plots P (HOL Blocking ) with different packet load values and different number of sectors. All previous figures show that the unnecessary blocking probability of a node using standard DCF is large enough in case of using directional antenna (as high as 9% in case of HOL Blocking ). We derived the gain probabilities using the switched-beam antenna model rather than the steerablebeam model for sake of simplicity. The potential gain using switched-beam model is less than that of using steerable-beam model due to the increased flexibility of the latter. Hence, the actual gains are expected to be higher than the one presented here. On the other hand, we assumed in our calculations idealized directional sectors (no side and back lobes) rather than the model adopted in Section II. With idealized sector, interference is ignored and hence the calculated gains are higher than the case with more realistic antenna model. However, since the gain probabilities are significantly high as shown above, this simplification is enough to motivate us to consider modifying the to match and exploit the characteristics of the directional antennas. VI. CONCLUSION AND FUTURE WORKS In this paper, we have defined two major blocking problems of the IEEE DCF when using directional antennas: Carrier Sense Blocking (CS Blocking ), and Headof-Line Blocking (HOL Blocking ) problems. We have shown analytically and by simulation that a station with directional antenna and using protocol is conservative with as much as 6% in case of the CS Blocking problem, and up to 9% for HOL Blocking problem. The study motivates us to design enhancements to the IEEE networks in case of using directional antennas. These enhancements should be able to assist stations to better assess the channel conditions more accurately and allow more concurrent transmissions to take place in presence of detecting busy carrier. REFERENCES [1] IEEE 82.11, Part II: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. [2] P. Bahl and V. Padmanabhan. RADAR: An In-Building RF-based User Location and Tracking System. In Proceedings of IEEE Infocom 2, Tel-Aviv, Israel, 2. [3] R. Choudhury, X. Yang, R. Ramanathan, and N. Vaidya. Using Directional Antennas for Medium Access Control in Ad Hoc Networks. In Proceedings of the ACM MOBICOM 2, Atlanta, Georgia, USA, September 22. [4] T. ElBatt, T. Anderson, and B. Ryu. Performance Evaluation of Multiple Access Protocols for Ad hoc Networks Using Directional Antennas. In IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, Louisiana, USA, March 23. [5] P. Enge and P. Misra. Special issue on GPS: The Global Positioning System. Proceedings of The IEEE, 87(1), [6] N. Fahmy, T. Todd, and V. Kezys. Ad Hoc Networks with Smart Antennas Using IEEE Based Protocols. In Proceedings of IEEE International Conference on Communications (ICC 22), New York, NY, USA, April 22. [7] Z Huang, C-C. Shen, C. Srisathapornphat, and C. Jaikaeo. A Busy- Tone Based Directional MAC Protocol for Ad Hoc Networks. In IEEE MILCOM, Anaheim, CA, USA, October 22. [8] Y-B. Ko, V. Shankarkumar, and N. Vaidya. Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks. In Proceedings of IEEE INFOCOM, Tel-Aviv, Israel, March 2. [9] P. Krishnan, A.S. Krishnakumar, W.-H. Ju, C. Mallows, and S. Ganu. A System for LEASE: Location Estimation Assisted by Stationary Emitters for Indoor RF Wireless Networks. In Proceedings of IEEE Infocom 24, Hong Kong, 24. [1] T. Nadeem and L. Ji. Location Aware IEEE for Spatial Reuse Enhancement. IEEE Transactions on Mobile Computing, 6:1171. [11] A. Nasipuri, K. Li, and U. Sappidi. Power Consumption and Throughput in Mobile Ad Hoc Networks using Directional Antennas. In IEEE International Conference on Computer Communication and Networks (ICCCN), Miami, Florida, October 22. [12] A. Nasipuri, S. Ye, J. You, and R. Hiromoto. A MAC Protocol for Mobile Ad Hoc Networks using Directional Antennas. In Proceedings of the IEEE WCNC, Chicago, IL, USA, September 2. [13] R. Ramanathan. On the Performance of Ad Hoc Networks with Beamforming Antennas. In Proceedings of the MobiHOC 1, Long Beach, CA, USA, October 21. [14] M. Sanchez, T. Giles, and J. Zander. Beam Forming Antennas in Multihop Packet Radio. In Proceedings of the Swedish Workshop on Wireless Ad Hoc Networks, March 21. [15] A. Spyropoulo and C. Raghavendra. Capacity Bounds For Ad- Hoc Networks Using Directional Antennas. In Proceedings of IEEE International Conference on Communications (ICC 3), Anchorage, Alaska, USA, May 23. [16] C. Srisathapornphat and C-C. Shen. Energy Consumption Behavior and Performance of Directional Virtual Carrier Sensing Schemes. In Proceedings of the IEEE WCNC, New Orleans, Louisiana, USA, March 23. [17] M. Takai, J. Martin, A. Ren, and R. Bagrodia. Directional Virtual Carrier Sensing for Directional Antennas in Mobile Ad Hoc Networks. In Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne, Switzerland, June 22. [18] M. Takai, J. Martin, A. Ren, and R. Bagrodia. A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks. In Proceedings of The Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Maryland, USA, June 23. [19] K. Xu, M. Gerla, and S. Bae. Effectiveness of RTS/CTS handshake in IEEE based adhoc networks. Ad Hoc Network Journal, Elsevier Science, 1(1), 23. [2] S. Yi, Y. Pei, and S. Kalyanaraman. On the Capacity Improvement of Ad Hoc Wireless Networks Using Directional Antennas. In Proceedings of MobiHhoc 3, Annapolis, Maryland, USA, June 23.

MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1

MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1 MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks Motorola Inc. Mesh Research and Development Group Maitland, FL 375 Hrishikesh.Gossain@motorola.com Hrishikesh Gossain, Carlos Cordeiro

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

OVER the past ten years, the high flexibility and the. Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas

OVER the past ten years, the high flexibility and the. Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Adaptive MAC Protocol for UAV Communication Networks Using Directional Antennas Abdel Ilah Alshbatat and Liang Dong, Senior Member, IEEE Abstract Unmanned aerial vehicle (UAV) has been used recently a

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS

POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS POWER CONTROL AND PERFORMANCE IMPROVEMENT OF INFRASTRUCTURELESS NETWORKS USING DIRECTIONAL ANTENNAS Nalin Gahlaut 1, Jaya sharma 2, Sandip Vijay 3, S.C. Gupta 4 1 Doctoral Candidate, Uttarakhand Technical

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas

An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas Gentian Jakllari, Wenjie Luo and Srikanth V. Krishnamurthy Department of Computer Science and Engineering,

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

SSPC and Data Transfer

SSPC and Data Transfer Ad Hoc Networks 7 (2009) 1136 1149 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc The slow start power controlled MAC protocol for mobile ad hoc

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke

More information

IN multihop wireless networks (MWNs), a device transmits

IN multihop wireless networks (MWNs), a device transmits 1240 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 9, SEPTEMBER 2010 Resource Scheduling in Wireless Networks Using Directional Antennas Imad Jawhar, Member, IEEE, JieWu,Fellow, IEEE,

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

3. TMT for IEEE 802.11g Networks

3. TMT for IEEE 802.11g Networks 136 IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.4, April 2011 The Theoretical Maximum Throughput Calculation for the IEEE802.11g Standard Alex V. Barbosa, Marcos F.

More information

A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas

A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto Division of Computer Science The University of Texas at San Antonio San Antonio, TX 78249-0667

More information

A Directional Antenna Medium Access Control Protocol for Wireless Ad Hoc Networks

A Directional Antenna Medium Access Control Protocol for Wireless Ad Hoc Networks A Directional Antenna Medium Access Control Protocol for Wireless Ad Hoc Networks Carlos de M. Cordeiro, Hrishikesh Gossain, and Dharma P. Agrawal Abstract In this paper we propose a Directional Antenna

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is

More information

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture

IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

Medium Access Control Mechanisms in Mobile Ad Hoc Networks

Medium Access Control Mechanisms in Mobile Ad Hoc Networks Medium Access Control Mechanisms in Mobile Ad Hoc Networks Chansu Yu Ben Lee Sridhar Kalubandi Myungchul Kim Dept. of Electrical and Computer Engineering Cleveland State Univ. Stilwell Hall 340 Cleveland,

More information

Can I add a VoIP call?

Can I add a VoIP call? Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com Abstract In this paper, we study the

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Selfish MAC Layer Misbehavior in Wireless Networks

Selfish MAC Layer Misbehavior in Wireless Networks 1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Resource Allocation in Wireless Networks Using Directional Antennas

Resource Allocation in Wireless Networks Using Directional Antennas 1 Resource Allocation in Wireless Networks Using Directional Antennas Imad Jawhar College of Information Technology United Arab Emirates University Al Ain, UAE Jie Wu Department of Computer Science and

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

More information

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY Sunil Kumar 1, Vineet S. Raghavan 2 and Jing Deng 3 1 Electrical and Computer Engineering Department, Clarkson University, Potsdam,

More information

Estimation of Interference in Wi-Fi Networks

Estimation of Interference in Wi-Fi Networks Estimation of Interference in Wi-Fi Networks Prajakta D. Patil 1, M. M. Wankhade 2 Student, E & TC, Sinhgad College of Engineering, Pune, India 1 Professor, E & TC, Sinhgad College of Engineering, Pune,

More information

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e

An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved

802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved 802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

On Setting TCP s Congestion Window Limit in Mobile Ad Hoc Networks

On Setting TCP s Congestion Window Limit in Mobile Ad Hoc Networks On Setting TCP s Congestion Window Limit in Mobile Ad Hoc Networks Kai Chen, Yuan Xue, Klara Nahrstedt Computer Science Department University of Illinois at Urbana-Champaign Urbana, IL 181, U.S.A. Email:

More information

A Technical Tutorial on the IEEE 802.11 Protocol

A Technical Tutorial on the IEEE 802.11 Protocol A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)

Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev, Jean-Marie Gorce To cite this version:

More information

A Non-beaconing ZigBee Network Implementation and Performance Study

A Non-beaconing ZigBee Network Implementation and Performance Study A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract

More information

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany kappes@docomolab-euro.com Keywords: IEEE

More information

Estimation of Link Interference in Static Multi-hop Wireless Networks

Estimation of Link Interference in Static Multi-hop Wireless Networks Estimation of Link Interference in Static Multi-hop Wireless Networks Jitendra Padhye, Sharad Agarwal, Venkata N. Padmanabhan, Lili Qiu, Ananth Rao, Brian Zill Microsoft Research University of Texas, Austin

More information

USE OF SMART ANTENNAS IN AD HOC NETWORKS

USE OF SMART ANTENNAS IN AD HOC NETWORKS USE OF SMART ANTENNAS IN AD HOC NETWORKS Mohammed Ali Hussain 1, P.Suresh Varma 2, K. Satya Rajesh 3, Hussain Basha Pathan 4, Leela Madhav Sarraju 5 1 Assoc. Professor & Head, Dept.of Computer Science

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

Ad-Hoc Networking: A Unified Evaluation Framework

Ad-Hoc Networking: A Unified Evaluation Framework Ad-Hoc Networking: A Unified Evaluation Framework Konstantinos Oikonomou, Nikos B. Pronios INTRACOM S.A., Development Programmes Department, 19.5 Km Markopoulou Avenue, 190 02 Paiania, Athens, Greece.

More information

Solving the Performance Anomaly Problem Through Packet Aggregation

Solving the Performance Anomaly Problem Through Packet Aggregation Dynamic Packet Aggregation to Solve Performance Anomaly in Wireless Networks ABSTRACT Tahiry Razafindralambo - Isabelle Guérin Lassous CITI lab.- Project INRIA ARES Bt L. De Vinci - 21 av. Jean Capelle

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1

WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1 WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless

More information

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods

Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College

More information

A Network-Aware MAC and Routing Protocol for Effective Load Balancing in Ad Hoc Wireless Networks with Directional Antenna

A Network-Aware MAC and Routing Protocol for Effective Load Balancing in Ad Hoc Wireless Networks with Directional Antenna A Network-Aware MAC and Routing Protocol for Effective Load Balancing in Ad Hoc Wireless Networks with Directional Antenna Siuli Roy, Dola Saha, S. Bandyopadhyay Indian Institute of Management Calcutta

More information

Admission Control for VoIP Traffic in IEEE 802.11 Networks

Admission Control for VoIP Traffic in IEEE 802.11 Networks Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS

FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS 1 Ramya S, Research scholar, M.Tech CNE (PT), NIE, Mysore 2 Dr. Phaneendra H D, Professor, Dept. of ISE, NIE, Mysore ABSTRACT-

More information

Throughput Modeling in IEEE 802.11 WLAN-based Wireless Networks

Throughput Modeling in IEEE 802.11 WLAN-based Wireless Networks Throughput Modeling in IEEE 82.11 WLAN-based Wireless Networks Kirill Ermolov Aalto University Espoo, Finland kirill.ermolov@aalto.fi Abstract Wireless Local Area Networks (WLANs) are nowadays the most

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Towards a New Approach in Available Bandwidth Measures on Mobile Ad Hoc Networks

Towards a New Approach in Available Bandwidth Measures on Mobile Ad Hoc Networks Acta Polytechnica Hungarica Vol. 8, No. 4, 2011 Towards a New Approach in Available Bandwidth Measures on Mobile Ad Hoc Networks Redouane Belbachir, Zoulikha M. Mekkakia, Ali Kies Department of Data Processing,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information