Spatially Limited Contention for Multi-Hop Wireless Networks

Size: px
Start display at page:

Download "Spatially Limited Contention for Multi-Hop Wireless Networks"

Transcription

1 Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments in the community mesh networks and wireless sensor networks research, the need for more efficient channel access techniques for multi-hop wireless networks has become eminent. In this work, we propose a novel hybrid channel access scheme that spatially limits the contention in the network such that 2-hop neighbors access the channel contention-free among each other whereas only the immediate neighbors may contend among each other. The contention among neighbors can be handled much more efficiently by a basic CSMA protocol as if operating in a single-hop network. We provide a general framework for the scheme and compare its performance to the conventional RTS/CTS-based collision avoidance scheme. By a case study using the IEEE 82. protocol as the underlying CSMA protocol, the proposed scheme pleads itself as a more efficient alternative to the RTS/CTS based collision avoidance scheme for large and dense multi-hop ad hoc networks with stationary nodes, such as wireless mesh and sensor networks. I. INTRODUCTION Medium Access Control (MAC) protocols determine how nodes in a wireless network access the shared wireless medium and they play a crucial role on the overall throughput and energy utilization in the network. MAC protocols can be broadly classified as contention-based and contention-free schemes. In general, contention-based MAC protocols have good throughput and delay performance under light load conditions, but their performance degrades as the load increases because of the increased collisions, retransmissions, and control message overhead. In contrast, contention-free MAC protocols perform better when the load is high since they can better utilize the channel with less control message overhead and collision-free media access. Their drawback is increased latency under light load conditions due to the reserved access policy. Limited contention MAC protocols aim at combining the advantages of both access mechanisms while eliminating their weaknesses []. A limited contention-protocol utilizes reservation-based channel access as in contention-free protocols, but the reservation is mostly not exclusive to a single node, allowing a controlled level of contention. In multi-hop wireless networks, a node contends with not only its immediate neighbors, but also its 2-hop neighbors due to the hidden terminal problem. Carrier Sense Multiple Access (CSMA) protocols, designed mainly for single-hop networks, are known to perform poorly in multi-hop wireless networks. Indeed, an analysis by Tobagi and Kleinrock [] shows that the performance of CSMA protocols degrades to that of the Aloha protocol in the existence of hidden terminals. Corresponding author fikret.sivrikaya@dai-labor.de The IEEE 82. MAC protocol and many of its variants use a collision avoidance technique, the Request-To- Send/Clear-To-Send (RTS/CTS) scheme, to overcome the hidden terminal problem and reduce the cost of collisions in CSMA. RTS/CTS is a 4-way handshake mechanism introducing extra overhead in resource-constrained wireless networks. The overhead of collision avoidance is particularly high when the data payloads are small as is typical for sensor network applications. The default packet size in TinyOS is only 29 bytes [8]. Moreover, it is shown in [2] that the collision avoidance scheme can accommodate much fewer competing nodes within a region in a network infested with hidden terminals than in a fully-connected network, which raises a scalability issue for dense networks spanning over a large area. In this paper we propose a new approach based on spatially limiting the contention in the network; the 2-hop neighbors access the channel contention-free among each other, and a node may contend with its immediate neighbors only. Hence the contention region of a node is effectively reduced from a circular area of radius 2r to an area of radius r, where r is the common transmission radius. This media access scheme, which we name Spatially-Limited-Contention (), provides an alternative to the RTS/CTS type of handshake mechanism for collision avoidance in large multi-hop networks with stationary nodes. By eliminating the hidden terminals, the contention among neighbors can be handled much more efficiently by a CSMA-based protocol as if operating in a single-hop network. A. Related Work There is considerable work on MAC protocols for wireless ad hoc and sensor networks. Most of the initial attempts are based on the CSMA technique or are variations of the IEEE 82. protocol, trying to improve their power-saving characteristic by occasionally turning off the radio transceivers of sensor nodes. S-MAC [] is the first among those, introducing the low-duty-cycle operation in sensor networks by letting nodes periodically sleep, i.e. turn off their radio. The T- MAC protocol [2] attempts to improve on S-MAC protocol s energy conservation by using variable duty-cycles as opposed to the fixed, pre-defined duty cycles in S-MAC. Polastre et al. proposed B-MAC in [3]. B-MAC is a light-weight protocol that provides an interface to the applications to implement their own MAC. By using a small amount of information from the applications, B-MAC minimizes idle listening to provide increased energy savings. B-MAC is shown to have

2 2 higher throughput and better energy efficiency than S-MAC and T-MAC, and is used as the default MAC for Mica2 motes [4]. All these protocols focus on the receiver to save energy by limiting the idle listening of the radio. On the transmitter side, having CSMA/CA as their underlying access technology, they still suffer from the mentioned inefficiencies of the RTS/CTS mechanism. Our work addresses the efficiency at the transmitter and can be thought of as a complementary tool to the mentioned work based on duty-cycling. Z-MAC [5] is a hybrid protocol combining TDMA and CSMA. The communication is slotted as in TDMA protocols and each node is assigned a time slot, however nodes may also transmit during other slots in Z-MAC with less priorities than the slot owners. Z-MAC is claimed to behave like CSMA under low contention and like TDMA under high contention. It utilizes the distributed slot assignment algorithm DRAND [6] to assign a slot to each node that is unique in its twoneighborhood, which may require arbitrarily large frame sizes at nodes depending on the network density. We show that a small constant frame size is sufficient to eliminate hidden terminals in the scheme, regardless of the network size and density. Since nodes are allowed to transmit in slots they don t own in Z-MAC, TDMA slot do not eliminate the hidden terminal problem. Instead, Z-MAC uses explicit contention notification (ECN) messages between two-hop neighbors to reduce the effect of hidden terminals when contention is high; hence it introduces an extra overhead as in the RTS/CTS method. B. Model and Assumptions We consider large multi-hop wireless networks of stationary nodes, where each node has the same transmission range r, determining the set of nodes it can communicate directly. Without loss of generality, we treat the transmission range as normalized to a unit, i.e. r =. Such a network is generally abstracted by a unit disk graph G = (V, E), where each vertex v V represents a node in the network, and each edge e E represents the existence of a direct wireless link between two nodes in the network. In general, a limited-contention MAC protocol divides the channel in some domain (such as time, frequency or code) and grants access to a subset of nodes in each portion of the channel (e.g. at a specific time or frequency). We use the time domain framework in most of this paper in order to present our results, but the ideas can be generalized to other domains without much effort. Where appropriate, we refer to the time slot/frequency/code assigned to a node in our scheme as the node s color, attributing to the graph theory analogy of the channel assignment problem, which we will later come back to. Within the time domain framework, we assume only a local synchronization among nodes in the network, which can be maintained using a lightweight synchronization protocol such as [4] or [5]. II. SPATIALLY LIMITED CONTENTION () SCHEME The scheme in its broadest sense defines a restricted class of MAC protocols that satisfy a simple criterion: Two nodes u and v are allowed to contend for the channel only if they are direct neighbors, or else if they have no common neighbor. A MAC protocol of which channel access schedule satisfies this criterion is said to implement or apply the scheme. In the graph theoretical framework, the channel allocation in an ad hoc network corresponds to solving a (maximal) independent set problem at every time step (e.g. time frame or time slot) on a graph that represents the given network. Then at each time step, nodes that are in the independent set are allowed to access/contend for the channel. We now provide a formal definition of the scheme within this graph theoretical framework. Definition 2. ( Media Access Scheme): Let G be the graph representing a given network topology and M a given MAC protocol. Further, let S t denote a subset of nodes in G that are granted permission by M to contend for the channel at time t. Then M is said to implement the scheme if and only if S t is an independent set in G 2 G for any time instant t. Note that any graph H = G 2 G has edges between every (and only) pair of vertices that are exactly two hops away in G. Hence an independent set in H is equivalent the scheme criterion described earlier. Any reservation-based access scheme employs either a static or a dynamic channel allocation technique. Dynamic channel allocation works online by gathering information from nodes in order to reserve the channel to active nodes only. This provides better utilization of the channel as it avoids the channel being wasted by nodes that have nothing to send. However, it also introduces a significant control overhead and consumes a portion of the channel. Static channel allocation works offline by making the reservation in advance of actual network operation. Thereafter, the need for control signalling is eliminated and the channel is used only for data communication, but the utilization may drop due to inactive nodes acquiring the channel. This effect may be severe in the case of pure contention-free channel access, but in limited-contention protocols since a single node does not acquire the channel exclusively the likelihood of the channel being wasted due to inactive nodes is much less. The static allocation has the additional benefit of less energy dissipation, which is crucial for small battery-powered devices as in wireless sensor networks. As a result, the static channel allocation stands as a favorable choice for limitedcontention channel access in resource-constrained ad hoc networks, provided that the nodes are stationary and some level of local synchronization is present in the network. Static channel allocation can be viewed as a dynamic allocation scheme which repeats a fixed set of allocation choices in a periodic fashion. In graph theoretical terms, it can be represented by a fixed set of independent sets, which in turn represents a vertex coloring scheme where each independent set corresponds to the vertices of a unique color. Therefore in the domain of static channel allocation, the scheme corresponds to a coloring of G 2 G for a given graph G representing an ad hoc network. We restrict our attention to the static allocation case in the rest of this paper.

3 3 In the media access scheme, the length of each slot may typically be larger than that of a contention-free protocol; allowing multiple packets to be transmitted successfully by multiple stations in a single slot. In each slot σ, the nodes assigned to σ contend for the channel by a regular CSMA protocol. At the end of the slot, all involved nodes pause their operation, storing the current values of their local CSMArelated information (such as CW min, CW max, NAV, backoff timers, if applicable), until the next occurrence (instance) of slot σ, in which they resume their operation from the stored state. In effect, if all instances of slot σ were to be adjoined, removing all other slots from the time line, there would be a set of independent groups of nodes executing a regular CSMA protocol in a single-hop network (i.e. no hidden terminals). Hence the whole network behaves as a set of independent channels, where each channel is operated with a CSMA protocol with no hidden terminals. We use the term slot allocation (or coloring) for the process of assigning a time slot (color) for each node in the network such that the criterion is satisfied. Fig. demonstrates an output of greedy coloring on a random unit disk graph with nodes, where 3 colors are used. In the media access scheme, nodes assigned to a specific color are activated for channel access in the corresponding slot. We observe that clusters of nodes naturally emerge as a result of the coloring. Each of these clusters can operate with CSMA as if there are no hidden terminals..8.6 A. Scalability of the Scheme As common in TDMA-based protocols, the number of available time slots, i.e. the number of colors used to color G 2 G, is called the frame size, which we denote by f. Hence time is divided into frames, each consisting of f recurring slots and each node is assigned a slot σ [, f] satisfying the scheme criterion, in which it contends for the channel. The chromatic number of the graph G 2 G is one of the key issues to be addressed in understanding the applicability and performance of the scheme, where G is a given network graph. For a static channel allocation protocol applying the scheme, the chromatic number of G 2 G corresponds to the minimum frame size that can be used for slot allocation. The frame size, in turn, is an important parameter of channel allocation protocols, directly affecting the delay and throughput performance. This issue is well addressed in the context of STDMA protocols. While it is known that finding the chromatic number is NP-hard even for the restricted class of unit disk graphs [7], the main objective of a distributed STDMA slot assignment algorithm is to minimize the frame size in order to reduce delay and increase throughput. In this section, we study the the minimum possible frame size for the scheme, i.e. the chromatic number of G 2 G, for any given network graph G. The main result will be that the chromatic number of a graph G 2 G is bounded above by a small constant when G is a unit disk graph. In doing so, we first introduce a new class of geometric graphs, Unit Ring Graphs, which will serve as the basis of our analysis. Definition 2.2 (Unit Ring Graphs): Consider an undirected geometric graph G, and let d(u, v) denote the Euclidean distance between vertices u and v in G. Then G is called a unit ring graph if, for every edge (u, v) G, we have < d(u, v) Fig.. Sample output of greedy coloring on a network of nodes, where the transmission radius is set to. for all nodes. The color bar at the bottom represents all colors used in the greedy coloring as slots in a time frame. In the next section, we investigate the characteristics of SLI- CON slot allocation. In particular, we show that a small and constant number of slots is sufficient for assigning slots to all nodes in an arbitrarily large or arbitrarily dense network. Greedy coloring refers to applying a greedy coloring algorithm on G 2 G for a given graph G. Fig. 2. Unit ring graphs; each node has a surrounding ring (annulus) of identical size and is connected to every other node within its ring. The edges of two nodes are shown only, for a clear demonstration. As the name implies, each node in G effectively has a surrounding ring (annulus) with inner radius of unit size and outer radius of 2 units, and is connected to every other node within its ring, as depicted in Fig. 2. We note the natural analogy of this definition to that of unit disk graphs. We will first try to assess the special structure and (bounds on) the chromatic number of unit ring graphs, and then show that this family of graphs are a super set of the graphs of the form G 2 G, when G is a unit disk graph. This allows us to utilize the results on unit ring graphs for the analysis of the scheme.

4 4 Lemma 2.: The clique number of any unit ring graph is at most 5. Proof: The proof is similar to Khuller et al. s proof for the maximum independent set size in the neighborhood of a vertex in unit disk graphs [3]. Since the distance between any two connected vertices in a unit ring graph is at most 2 units, all vertices in a clique must reside within a circle of unit radius, as shown in Fig. 3. u x v Fig. 5. Coloring a unit ring graph with 2 colors. Regardless of the size of the graph and the degrees of vertices, the entire graph can be tiled using the marked structure of 2 hexagons (colors). Fig. 3. The maximum clique size in a unit graph is at most 5. Suppose there is a clockwise ordering of vertices in this circle, and consider any two adjacent vertices, u and v, in this ordering. Label the center of the circle as x. We have xu and xv. Since u and v are connected in the unit ring graph, we have uv >. Then uv is the largest edge in ûxv and hence x > π/3. Therefore, the number of mutually connected vertices in the circle can be at most 5. Lemma 2.2: The chromatic number of any unit ring graph is at most 2. Proof: The proof is by construction. We present a coloring scheme that uses at most 2 colors on any given unit ring graph. We first place a hexagonal grid, i.e. a tessellation of regular hexagons, on top of the entire graph. Each side of the hexagons is of length /2, ensuring that all nodes within the same hexagonal area are at most a unit distance apart (see Fig. 4). Hence there is no edge among those nodes, allowing one to use a single color for all nodes within each hexagon. /2 /2 Fig. 4. The regular hexagons used to tessellate the entire graph for the proof of Lemma 2.2. The same color can be used for vertices within the two shaded hexagons. On the other hand, the hexagons that are far enough from each other can use the same color. This allows one to tile the entire graph using a structure of 2 colors as depicted in Fig. 5. Lemma 2.3: Given a unit disk graph G, let H = G 2 G. Then for any such H, there exists a unit ring graph G R such that H G R. Proof: Given G = (V, E), construct a geometric graph G R = (V, E R ), preserving the vertex locations in G. The edge set E R is then determined using unit rings for each vertex instead of the unit disks in G. Consider an edge (u, v) in H; we have (i) d(u, v) > and (ii) there exists a vertex w such that d(u, w) and d(w, v), where d(u, v) is the /2 Euclidean distance between vertices u and v. From (i) and (ii) we have that < d(u, v) 2, which implies (u, v) E R. Hence H G R. We now state the main result of this section, which follows from Lemma 2.2 and Lemma 2.3. Theorem 2.4: A constant frame size f, where f 2, is sufficient for assigning time slots to all nodes in a network using the scheme, regardless of the network size and density. Theorem 2.4 emphasizes the scalability of the scheme as it allows a constant frame size regardless of the network size and density. B. Performance Analysis In this section we use an OPNET Modeler [9] implementation of the media access scheme to study its performance in terms of throughput and media access delay. Note however that our aim is not to provide a comprehensive comparison of the scheme with the RTS/CTS-based collision avoidance scheme. Rather, we aim to obtain some insights by a case study that uses the IEEE 82. MAC protocol s basic access mode for the scheme and its RTS/CTS mode for the collision avoidance scheme. For the scheme, we use a constant frame size of 2 slots, following the coloring scheme given in the proof of Lemma 2.2. In obtaining the results here, Direct Sequence Spread Spectrum (DSSS) is used as the 82. physical layer, for which the slot size is 2 µs and the minimum and maximum contention window sizes are CW min = 32 and CW max = 24, respectively. We use Mbps as the data rate and the sizes of RTS, CTS, and ACK packets are the defaults defined in the standard [7]. As we use the same underlying CSMA protocol for both and collision avoidance schemes, the results trend are not much affected by the values of 82. parameters. Due to limited space, we present only a small representative set of results in this section. In order to simulate a multi-hop network with a desired density, we place N nodes in a circle of 5m, which is set as the transmission range for all nodes. Then we place 3N nodes within an annulus of inner radius 5m and outer radius 3m. Finally we place 5N nodes within an annulus of inner radius 3m and outer radius 45m. This is depicted in Figure

5 5 Data generation rate, g Node throughput, S (bits/sec) Mean packet interarrival time (sec) Fig. 6. The topology used to simulate a large multi-hop network, where the simulation results are collected for the center node. 6 for N = 2. We collect the statistics for the center node. The nodes further than the outermost circle have minimal effect on the performance of the node at the center; hence this topology enables us to simulate a node within a large multi-hop network. We repeat each simulation with 2 different random seeds, recording the statistics for the center node at each time. Fig. 7 demonstrates the throughput and delay comparison between the collision avoidance scheme and the scheme for a small packet size and a varying traffic load. Since the overhead of RTS/CTS becomes much more significant when the data size is small, one may wonder the (without RTS/CTS handshake) performance in case of small packet sizes; hence, we include it in the simulation results. In moderately high data loads, we observe that the scheme throughput is superior to both other schemes, while it performs comparable to the collision avoidance scheme in terms of media access delay. Higher delay for the scheme at lowest traffic levels is unavoidable due to the scheduled access scheme, but it should be noted that this drawback is significantly reduced in the scheme compared to traditional scheduled access schemes such as TDMA, where the frame size and hence delay is proportional to the 2-neighborhood size. Fig. 8 shows the amount of data and control traffic sent for each access scheme for the same simulation set. As expected, the overhead of control traffic is significant in the collision avoidance scheme, whereas frequent collisions and retransmissions in a dense network causes a high overhead of data traffic in the basic CSMA scheme. On the other hand, scheme achieves the lower bounds for data and control traffic of both access schemes, suggesting a much lower energy dissipation at the transmitter of a node. Fig. 9 presents the capacity, i.e. saturation throughput, for each access scheme using different packet sizes. As the packet size increases, the throughput initially increases for all access schemes, but large frame sizes in a dense network cause higher costs for collided packets and retransmissions. Since the RTS/CTS handshake of 82. does not provide perfect collision avoidance [2], its throughput degrades as the packet Media access delay, D (sec) Data generation rate, g Mean packet interarrival time (sec) Fig. 7. Throughput and media access delay for different access schemes versus traffic load, for a small data size of 4 bits. Fig. 8. Data traffic sent (bits/sec) x 4 3 Data generation rate, g x Mean packet interarrival time (sec) Data and control traffic overhead for each access scheme. size increases over a threshold. The scheme, on the other hand, eliminates the hidden terminals and reduces the number of contenders, thus significantly reduces collisions and retransmissions, thereby increasing the capacity of the network. Due to space considerations, we have presented limited results in this paper. For an analytical framework for performance comparisons and more results, please refer to [8]. III. COLOR ASSIGNMENT In this paper, we focus on the definition and generic analysis of the scheme. An implementation of the Control traffic sent (bits/sec)

6 6 Node throughput, S (bits/sec) Packet size, L (τ) data Packet size (bits) Fig. 9. Capacity analysis for different access schemes with different data packet sizes. scheme clearly requires an assignment of colors (slot/frequency/code) to all nodes in the network. We provided a coloring algorithm based on the geographical positions of nodes and based our analysis on this coloring scheme. We do not address the distributed coloring in detail in this paper, but we provide a brief discussion here on different approaches for various scenarios. For wireless mesh networks, the geographical slot assignment presented in Section II-A can be easily applied in practice; since these networks are not expected to be completely self configuring, a mesh router can be configured to use a specific color at the time of deployment based on its exact geographical location and a virtual hexagonal tessellation. In [6] the authors consider the greedy graph coloring problem in a distributed network, and they propose a new distributed algorithm, which is shown to color a graph in an expected time of O( log n log ) rounds, where is the maximum vertex degree in the graph. Propagating the coloring information to the 2-neighborhood rather than the neighbors of a node, this algorithm can be generalized for the coloring of G 2 G rather than G. We have applied the greedy coloring algorithm for coloring of random unit disk graphs and observed that the greedy coloring performs surprisingly well. In most cases, the number of colors used is very close to the constant bound obtained by hexagonal grid coloring; hence a distributed implementation of the greedy coloring algorithm seems suitable for color assignment. An output instance of the SLI- CON coloring on a network of nodes was demonstrated in Fig.. IV. SUMMARY AND CONCLUSION We have proposed a new hybrid channel access scheme for stationary multi-hop wireless networks, which uses the novel idea of contracting the contention area of a node and thus eliminating contention among hidden terminals. We have shown that a very small frame size is sufficient to assign each node a color (slot/frequency/code) such that no 2-hop neighbors in the network are assigned the same color. All nodes assigned to the same color contend for the channel using a basic CSMA protocol as if operating in a singlehop network (no hidden terminals). The reduced number of contending nodes and the elimination of hidden terminals yield superior overall CSMA performance, even though each node is allowed to contend for the channel only in a portion of the channel. The proposed scheme could be used as a standalone channel access scheme for multi-hop mesh networks or with duty-cycling based channel access schemes for wireless sensor networks for additional energy savings at the transmitter of a node. We have briefly discussed the distributed color assignment issue, but this deserves a separate study of its own. The implementation of a detailed MAC protocol along with a distributed color assignment is reserved as a future work. REFERENCES [] F. A. Tobagi and L. Kleinrock, Packet switching in radio channels: Part II the hidden terminal problem in carrier sense multiple-access modes and the busy-tone solution, IEEE Transactions on Communications, 23(2) pp , December 975. [2] Y. Wang and J. J. Garcia-Luna-Aceves, Modeling of collision avoidance protocols in single-channel multihop wireless networks, Wireless Networks, Volume, Issue 5, pp , September 24. [3] S. Banerjee and S. Khuller, A clustering scheme for hierarchical routing in wireless networks, Tech. Report CS-TR-43, University of Maryland, College Park, February 2. [4] J. V. Greunen and J. Rabaey, Lightweight time synchronization for sensor networks, Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA), San Diego, CA, September 23. [5] M. L. Sichitiu and C. Veerarittiphan, Simple, accurate time synchronization for wireless sensor networks, IEEE Wireless Communications and Networking Conference (WCNC), 23. [6] A. Kosowski and L. Kuszner, On greedy graph coloring in the distributed model, Proceedings of EuroPar6, LNCS 428 (26), [7] E. Arikan, Some complexity results about packet radio networks, IEEE Trans. Inform. Theory, IT-3 (984) 998. [8] TinyOS Source Code Repository, (26), [Online] Available at sourceforge.net/tinyos/tinyos-.x/ [9] OPNET Modeler, Network Design and Simulation Software, OPNET Technologies, Inc., [] L. Kleinrock and Y. Yemini, An optimal adaptive scheme for multiple access broadcast communication, International Conference on Communications, Vol. I, Toronto, Ontario, pp to 7.2.5, June 978. [] W. Ye, J. Heidemann, and D. Estrin, Medium access control with coordinated, adaptive sleeping for wireless sensor networks, IEEE/ACM Transactions on Networking, Vol. 2, No. 3, pp , June 24. [2] T. Van Dam and K. Langendoen, An adaptive energy-efficient MAC protocol for wireless sensor networks, The First ACM Conference on Embedded Networked Sensor Systems (SenSys 3), Los Angeles, CA, November 23. [3] J. Polastre, J. Hill, and D. Culler, Versatile low power media access for wireless sensor networks, SenSys 4, Baltimore, Maryland, November 35, 24. [4] MICA2: Wireless Measurement System, Crossbow Inc., pdf files/wireless pdf/ A MICA2.pdf [5] I. Rhee, A. Warrier, M. Aia, and J. Min, ZMAC: a hybrid MAC for Wireless Sensor Networks, SenSys 5, San Diego, California, November 24, 25. [6] I. Rhee, A. Warrier, J. Min, and L. Xu, DRAND: Distributed Randomized TDMA scheduling for wireless ad-hoc networks, Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 6, Florence, Italy, May 22-25, 26), ACM Press, New York, NY, 9-2. [7] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE standards 82., January 997. [8] F. Sivrikaya, Energy-Efficient Channel Access and Routing Protocols for Multi-Hop Wireless Networks, PhD Thesis, Rensselaer Polytechnic Insitute, December 27.

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Chapter 6: Medium Access Control Layer

Chapter 6: Medium Access Control Layer Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Chapter 5 A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Piyush Naik and Krishna M. Sivalingam Dept. of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250 piyush.naik@umbc.edu,krishna@umbc.edu

More information

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11. Kang Sun

Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11. Kang Sun Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11 by Kang Sun A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Duty-Cycle MAC Protocols and Networking Overhaul

Duty-Cycle MAC Protocols and Networking Overhaul RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle

More information

Protocol Design and Implementation for Wireless Sensor Networks

Protocol Design and Implementation for Wireless Sensor Networks Protocol Design and Implementation for Wireless Sensor Networks PIERGIUSEPPE DI MARCO Masters Degree Project Stockholm, Sweden April 2008 XR-EE-RT 2008:005 Abstract Designing efficient and reliable communication

More information

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Master s Thesis Title Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Supervisor Professor Masayuki Murata Author Chuluunsuren Damdinsuren February 14th, 2012 Department of Information

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

THE development of media access control (MAC) protocols

THE development of media access control (MAC) protocols 710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Versatile Low Power Media Access for Wireless Sensor Networks

Versatile Low Power Media Access for Wireless Sensor Networks Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Selfish MAC Layer Misbehavior in Wireless Networks

Selfish MAC Layer Misbehavior in Wireless Networks 1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International

More information

Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks

Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Fatma Othman, Nizar Bouabdallah and Raouf Boutaba z INRIA, Campus universitaire de Beaulieu ; 3504 Rennes Cedex, France ( z )School

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Short Preambles with time left to Data

Short Preambles with time left to Data In: Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), Athens, Greece, 3-7 September 2007 A WIRELESS SENSOR MAC PROTOCOL FOR BURSTY

More information

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,

More information

MAC Protocols for Wireless Sensor Networks: a Survey

MAC Protocols for Wireless Sensor Networks: a Survey 1 MAC Protocols for Wireless Sensor Networks: a Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz Abstract Wireless sensor networks are appealing to researchers due to their wide range of application

More information

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

More information

Versatile Low Power Media Access for Wireless Sensor Networks

Versatile Low Power Media Access for Wireless Sensor Networks Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs

More information

-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks

-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks -MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks Andre Barroso, Utz Roedig and Cormac Sreenan Mobile & Internet Systems Laboratory, University College Cork, Ireland Email: a.barroso

More information

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks

Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh

More information

Presentation and analysis of a new technology for low-power wireless sensor network

Presentation and analysis of a new technology for low-power wireless sensor network Presentation and analysis of a new technology for low-power wireless sensor network Sabri Khssibi*, Hanen Idoudi**, Adrien Van Den Bossche*, Thierry Val* and Leila Azzouz Saidane** *University of Toulouse,

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

A BANDWIDTH SHARING APPROACH TO IMPROVE LICENSED SPECTRUM UTILIZATION

A BANDWIDTH SHARING APPROACH TO IMPROVE LICENSED SPECTRUM UTILIZATION A BANDWIDTH SHARING APPROACH TO IMPROVE LICENSED SPECTRUM UTILIZATION P. Papadimitratos, S. Sankaranarayanan, and A. Mishra Electrical and Computer Engineering Virginia Tech {papadp, srivatsan, mishra}@vt.edu

More information

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,

More information

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Modeling and Simulation of Quality of Service in VoIP Wireless LAN Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

2.0 System Description

2.0 System Description 2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

WIRELESS sensor networking is an emerging technology

WIRELESS sensor networking is an emerging technology An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor

More information