Spatially Limited Contention for Multi-Hop Wireless Networks
|
|
- Matthew Franklin Mitchell
- 8 years ago
- Views:
Transcription
1 Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments in the community mesh networks and wireless sensor networks research, the need for more efficient channel access techniques for multi-hop wireless networks has become eminent. In this work, we propose a novel hybrid channel access scheme that spatially limits the contention in the network such that 2-hop neighbors access the channel contention-free among each other whereas only the immediate neighbors may contend among each other. The contention among neighbors can be handled much more efficiently by a basic CSMA protocol as if operating in a single-hop network. We provide a general framework for the scheme and compare its performance to the conventional RTS/CTS-based collision avoidance scheme. By a case study using the IEEE 82. protocol as the underlying CSMA protocol, the proposed scheme pleads itself as a more efficient alternative to the RTS/CTS based collision avoidance scheme for large and dense multi-hop ad hoc networks with stationary nodes, such as wireless mesh and sensor networks. I. INTRODUCTION Medium Access Control (MAC) protocols determine how nodes in a wireless network access the shared wireless medium and they play a crucial role on the overall throughput and energy utilization in the network. MAC protocols can be broadly classified as contention-based and contention-free schemes. In general, contention-based MAC protocols have good throughput and delay performance under light load conditions, but their performance degrades as the load increases because of the increased collisions, retransmissions, and control message overhead. In contrast, contention-free MAC protocols perform better when the load is high since they can better utilize the channel with less control message overhead and collision-free media access. Their drawback is increased latency under light load conditions due to the reserved access policy. Limited contention MAC protocols aim at combining the advantages of both access mechanisms while eliminating their weaknesses []. A limited contention-protocol utilizes reservation-based channel access as in contention-free protocols, but the reservation is mostly not exclusive to a single node, allowing a controlled level of contention. In multi-hop wireless networks, a node contends with not only its immediate neighbors, but also its 2-hop neighbors due to the hidden terminal problem. Carrier Sense Multiple Access (CSMA) protocols, designed mainly for single-hop networks, are known to perform poorly in multi-hop wireless networks. Indeed, an analysis by Tobagi and Kleinrock [] shows that the performance of CSMA protocols degrades to that of the Aloha protocol in the existence of hidden terminals. Corresponding author fikret.sivrikaya@dai-labor.de The IEEE 82. MAC protocol and many of its variants use a collision avoidance technique, the Request-To- Send/Clear-To-Send (RTS/CTS) scheme, to overcome the hidden terminal problem and reduce the cost of collisions in CSMA. RTS/CTS is a 4-way handshake mechanism introducing extra overhead in resource-constrained wireless networks. The overhead of collision avoidance is particularly high when the data payloads are small as is typical for sensor network applications. The default packet size in TinyOS is only 29 bytes [8]. Moreover, it is shown in [2] that the collision avoidance scheme can accommodate much fewer competing nodes within a region in a network infested with hidden terminals than in a fully-connected network, which raises a scalability issue for dense networks spanning over a large area. In this paper we propose a new approach based on spatially limiting the contention in the network; the 2-hop neighbors access the channel contention-free among each other, and a node may contend with its immediate neighbors only. Hence the contention region of a node is effectively reduced from a circular area of radius 2r to an area of radius r, where r is the common transmission radius. This media access scheme, which we name Spatially-Limited-Contention (), provides an alternative to the RTS/CTS type of handshake mechanism for collision avoidance in large multi-hop networks with stationary nodes. By eliminating the hidden terminals, the contention among neighbors can be handled much more efficiently by a CSMA-based protocol as if operating in a single-hop network. A. Related Work There is considerable work on MAC protocols for wireless ad hoc and sensor networks. Most of the initial attempts are based on the CSMA technique or are variations of the IEEE 82. protocol, trying to improve their power-saving characteristic by occasionally turning off the radio transceivers of sensor nodes. S-MAC [] is the first among those, introducing the low-duty-cycle operation in sensor networks by letting nodes periodically sleep, i.e. turn off their radio. The T- MAC protocol [2] attempts to improve on S-MAC protocol s energy conservation by using variable duty-cycles as opposed to the fixed, pre-defined duty cycles in S-MAC. Polastre et al. proposed B-MAC in [3]. B-MAC is a light-weight protocol that provides an interface to the applications to implement their own MAC. By using a small amount of information from the applications, B-MAC minimizes idle listening to provide increased energy savings. B-MAC is shown to have
2 2 higher throughput and better energy efficiency than S-MAC and T-MAC, and is used as the default MAC for Mica2 motes [4]. All these protocols focus on the receiver to save energy by limiting the idle listening of the radio. On the transmitter side, having CSMA/CA as their underlying access technology, they still suffer from the mentioned inefficiencies of the RTS/CTS mechanism. Our work addresses the efficiency at the transmitter and can be thought of as a complementary tool to the mentioned work based on duty-cycling. Z-MAC [5] is a hybrid protocol combining TDMA and CSMA. The communication is slotted as in TDMA protocols and each node is assigned a time slot, however nodes may also transmit during other slots in Z-MAC with less priorities than the slot owners. Z-MAC is claimed to behave like CSMA under low contention and like TDMA under high contention. It utilizes the distributed slot assignment algorithm DRAND [6] to assign a slot to each node that is unique in its twoneighborhood, which may require arbitrarily large frame sizes at nodes depending on the network density. We show that a small constant frame size is sufficient to eliminate hidden terminals in the scheme, regardless of the network size and density. Since nodes are allowed to transmit in slots they don t own in Z-MAC, TDMA slot do not eliminate the hidden terminal problem. Instead, Z-MAC uses explicit contention notification (ECN) messages between two-hop neighbors to reduce the effect of hidden terminals when contention is high; hence it introduces an extra overhead as in the RTS/CTS method. B. Model and Assumptions We consider large multi-hop wireless networks of stationary nodes, where each node has the same transmission range r, determining the set of nodes it can communicate directly. Without loss of generality, we treat the transmission range as normalized to a unit, i.e. r =. Such a network is generally abstracted by a unit disk graph G = (V, E), where each vertex v V represents a node in the network, and each edge e E represents the existence of a direct wireless link between two nodes in the network. In general, a limited-contention MAC protocol divides the channel in some domain (such as time, frequency or code) and grants access to a subset of nodes in each portion of the channel (e.g. at a specific time or frequency). We use the time domain framework in most of this paper in order to present our results, but the ideas can be generalized to other domains without much effort. Where appropriate, we refer to the time slot/frequency/code assigned to a node in our scheme as the node s color, attributing to the graph theory analogy of the channel assignment problem, which we will later come back to. Within the time domain framework, we assume only a local synchronization among nodes in the network, which can be maintained using a lightweight synchronization protocol such as [4] or [5]. II. SPATIALLY LIMITED CONTENTION () SCHEME The scheme in its broadest sense defines a restricted class of MAC protocols that satisfy a simple criterion: Two nodes u and v are allowed to contend for the channel only if they are direct neighbors, or else if they have no common neighbor. A MAC protocol of which channel access schedule satisfies this criterion is said to implement or apply the scheme. In the graph theoretical framework, the channel allocation in an ad hoc network corresponds to solving a (maximal) independent set problem at every time step (e.g. time frame or time slot) on a graph that represents the given network. Then at each time step, nodes that are in the independent set are allowed to access/contend for the channel. We now provide a formal definition of the scheme within this graph theoretical framework. Definition 2. ( Media Access Scheme): Let G be the graph representing a given network topology and M a given MAC protocol. Further, let S t denote a subset of nodes in G that are granted permission by M to contend for the channel at time t. Then M is said to implement the scheme if and only if S t is an independent set in G 2 G for any time instant t. Note that any graph H = G 2 G has edges between every (and only) pair of vertices that are exactly two hops away in G. Hence an independent set in H is equivalent the scheme criterion described earlier. Any reservation-based access scheme employs either a static or a dynamic channel allocation technique. Dynamic channel allocation works online by gathering information from nodes in order to reserve the channel to active nodes only. This provides better utilization of the channel as it avoids the channel being wasted by nodes that have nothing to send. However, it also introduces a significant control overhead and consumes a portion of the channel. Static channel allocation works offline by making the reservation in advance of actual network operation. Thereafter, the need for control signalling is eliminated and the channel is used only for data communication, but the utilization may drop due to inactive nodes acquiring the channel. This effect may be severe in the case of pure contention-free channel access, but in limited-contention protocols since a single node does not acquire the channel exclusively the likelihood of the channel being wasted due to inactive nodes is much less. The static allocation has the additional benefit of less energy dissipation, which is crucial for small battery-powered devices as in wireless sensor networks. As a result, the static channel allocation stands as a favorable choice for limitedcontention channel access in resource-constrained ad hoc networks, provided that the nodes are stationary and some level of local synchronization is present in the network. Static channel allocation can be viewed as a dynamic allocation scheme which repeats a fixed set of allocation choices in a periodic fashion. In graph theoretical terms, it can be represented by a fixed set of independent sets, which in turn represents a vertex coloring scheme where each independent set corresponds to the vertices of a unique color. Therefore in the domain of static channel allocation, the scheme corresponds to a coloring of G 2 G for a given graph G representing an ad hoc network. We restrict our attention to the static allocation case in the rest of this paper.
3 3 In the media access scheme, the length of each slot may typically be larger than that of a contention-free protocol; allowing multiple packets to be transmitted successfully by multiple stations in a single slot. In each slot σ, the nodes assigned to σ contend for the channel by a regular CSMA protocol. At the end of the slot, all involved nodes pause their operation, storing the current values of their local CSMArelated information (such as CW min, CW max, NAV, backoff timers, if applicable), until the next occurrence (instance) of slot σ, in which they resume their operation from the stored state. In effect, if all instances of slot σ were to be adjoined, removing all other slots from the time line, there would be a set of independent groups of nodes executing a regular CSMA protocol in a single-hop network (i.e. no hidden terminals). Hence the whole network behaves as a set of independent channels, where each channel is operated with a CSMA protocol with no hidden terminals. We use the term slot allocation (or coloring) for the process of assigning a time slot (color) for each node in the network such that the criterion is satisfied. Fig. demonstrates an output of greedy coloring on a random unit disk graph with nodes, where 3 colors are used. In the media access scheme, nodes assigned to a specific color are activated for channel access in the corresponding slot. We observe that clusters of nodes naturally emerge as a result of the coloring. Each of these clusters can operate with CSMA as if there are no hidden terminals..8.6 A. Scalability of the Scheme As common in TDMA-based protocols, the number of available time slots, i.e. the number of colors used to color G 2 G, is called the frame size, which we denote by f. Hence time is divided into frames, each consisting of f recurring slots and each node is assigned a slot σ [, f] satisfying the scheme criterion, in which it contends for the channel. The chromatic number of the graph G 2 G is one of the key issues to be addressed in understanding the applicability and performance of the scheme, where G is a given network graph. For a static channel allocation protocol applying the scheme, the chromatic number of G 2 G corresponds to the minimum frame size that can be used for slot allocation. The frame size, in turn, is an important parameter of channel allocation protocols, directly affecting the delay and throughput performance. This issue is well addressed in the context of STDMA protocols. While it is known that finding the chromatic number is NP-hard even for the restricted class of unit disk graphs [7], the main objective of a distributed STDMA slot assignment algorithm is to minimize the frame size in order to reduce delay and increase throughput. In this section, we study the the minimum possible frame size for the scheme, i.e. the chromatic number of G 2 G, for any given network graph G. The main result will be that the chromatic number of a graph G 2 G is bounded above by a small constant when G is a unit disk graph. In doing so, we first introduce a new class of geometric graphs, Unit Ring Graphs, which will serve as the basis of our analysis. Definition 2.2 (Unit Ring Graphs): Consider an undirected geometric graph G, and let d(u, v) denote the Euclidean distance between vertices u and v in G. Then G is called a unit ring graph if, for every edge (u, v) G, we have < d(u, v) Fig.. Sample output of greedy coloring on a network of nodes, where the transmission radius is set to. for all nodes. The color bar at the bottom represents all colors used in the greedy coloring as slots in a time frame. In the next section, we investigate the characteristics of SLI- CON slot allocation. In particular, we show that a small and constant number of slots is sufficient for assigning slots to all nodes in an arbitrarily large or arbitrarily dense network. Greedy coloring refers to applying a greedy coloring algorithm on G 2 G for a given graph G. Fig. 2. Unit ring graphs; each node has a surrounding ring (annulus) of identical size and is connected to every other node within its ring. The edges of two nodes are shown only, for a clear demonstration. As the name implies, each node in G effectively has a surrounding ring (annulus) with inner radius of unit size and outer radius of 2 units, and is connected to every other node within its ring, as depicted in Fig. 2. We note the natural analogy of this definition to that of unit disk graphs. We will first try to assess the special structure and (bounds on) the chromatic number of unit ring graphs, and then show that this family of graphs are a super set of the graphs of the form G 2 G, when G is a unit disk graph. This allows us to utilize the results on unit ring graphs for the analysis of the scheme.
4 4 Lemma 2.: The clique number of any unit ring graph is at most 5. Proof: The proof is similar to Khuller et al. s proof for the maximum independent set size in the neighborhood of a vertex in unit disk graphs [3]. Since the distance between any two connected vertices in a unit ring graph is at most 2 units, all vertices in a clique must reside within a circle of unit radius, as shown in Fig. 3. u x v Fig. 5. Coloring a unit ring graph with 2 colors. Regardless of the size of the graph and the degrees of vertices, the entire graph can be tiled using the marked structure of 2 hexagons (colors). Fig. 3. The maximum clique size in a unit graph is at most 5. Suppose there is a clockwise ordering of vertices in this circle, and consider any two adjacent vertices, u and v, in this ordering. Label the center of the circle as x. We have xu and xv. Since u and v are connected in the unit ring graph, we have uv >. Then uv is the largest edge in ûxv and hence x > π/3. Therefore, the number of mutually connected vertices in the circle can be at most 5. Lemma 2.2: The chromatic number of any unit ring graph is at most 2. Proof: The proof is by construction. We present a coloring scheme that uses at most 2 colors on any given unit ring graph. We first place a hexagonal grid, i.e. a tessellation of regular hexagons, on top of the entire graph. Each side of the hexagons is of length /2, ensuring that all nodes within the same hexagonal area are at most a unit distance apart (see Fig. 4). Hence there is no edge among those nodes, allowing one to use a single color for all nodes within each hexagon. /2 /2 Fig. 4. The regular hexagons used to tessellate the entire graph for the proof of Lemma 2.2. The same color can be used for vertices within the two shaded hexagons. On the other hand, the hexagons that are far enough from each other can use the same color. This allows one to tile the entire graph using a structure of 2 colors as depicted in Fig. 5. Lemma 2.3: Given a unit disk graph G, let H = G 2 G. Then for any such H, there exists a unit ring graph G R such that H G R. Proof: Given G = (V, E), construct a geometric graph G R = (V, E R ), preserving the vertex locations in G. The edge set E R is then determined using unit rings for each vertex instead of the unit disks in G. Consider an edge (u, v) in H; we have (i) d(u, v) > and (ii) there exists a vertex w such that d(u, w) and d(w, v), where d(u, v) is the /2 Euclidean distance between vertices u and v. From (i) and (ii) we have that < d(u, v) 2, which implies (u, v) E R. Hence H G R. We now state the main result of this section, which follows from Lemma 2.2 and Lemma 2.3. Theorem 2.4: A constant frame size f, where f 2, is sufficient for assigning time slots to all nodes in a network using the scheme, regardless of the network size and density. Theorem 2.4 emphasizes the scalability of the scheme as it allows a constant frame size regardless of the network size and density. B. Performance Analysis In this section we use an OPNET Modeler [9] implementation of the media access scheme to study its performance in terms of throughput and media access delay. Note however that our aim is not to provide a comprehensive comparison of the scheme with the RTS/CTS-based collision avoidance scheme. Rather, we aim to obtain some insights by a case study that uses the IEEE 82. MAC protocol s basic access mode for the scheme and its RTS/CTS mode for the collision avoidance scheme. For the scheme, we use a constant frame size of 2 slots, following the coloring scheme given in the proof of Lemma 2.2. In obtaining the results here, Direct Sequence Spread Spectrum (DSSS) is used as the 82. physical layer, for which the slot size is 2 µs and the minimum and maximum contention window sizes are CW min = 32 and CW max = 24, respectively. We use Mbps as the data rate and the sizes of RTS, CTS, and ACK packets are the defaults defined in the standard [7]. As we use the same underlying CSMA protocol for both and collision avoidance schemes, the results trend are not much affected by the values of 82. parameters. Due to limited space, we present only a small representative set of results in this section. In order to simulate a multi-hop network with a desired density, we place N nodes in a circle of 5m, which is set as the transmission range for all nodes. Then we place 3N nodes within an annulus of inner radius 5m and outer radius 3m. Finally we place 5N nodes within an annulus of inner radius 3m and outer radius 45m. This is depicted in Figure
5 5 Data generation rate, g Node throughput, S (bits/sec) Mean packet interarrival time (sec) Fig. 6. The topology used to simulate a large multi-hop network, where the simulation results are collected for the center node. 6 for N = 2. We collect the statistics for the center node. The nodes further than the outermost circle have minimal effect on the performance of the node at the center; hence this topology enables us to simulate a node within a large multi-hop network. We repeat each simulation with 2 different random seeds, recording the statistics for the center node at each time. Fig. 7 demonstrates the throughput and delay comparison between the collision avoidance scheme and the scheme for a small packet size and a varying traffic load. Since the overhead of RTS/CTS becomes much more significant when the data size is small, one may wonder the (without RTS/CTS handshake) performance in case of small packet sizes; hence, we include it in the simulation results. In moderately high data loads, we observe that the scheme throughput is superior to both other schemes, while it performs comparable to the collision avoidance scheme in terms of media access delay. Higher delay for the scheme at lowest traffic levels is unavoidable due to the scheduled access scheme, but it should be noted that this drawback is significantly reduced in the scheme compared to traditional scheduled access schemes such as TDMA, where the frame size and hence delay is proportional to the 2-neighborhood size. Fig. 8 shows the amount of data and control traffic sent for each access scheme for the same simulation set. As expected, the overhead of control traffic is significant in the collision avoidance scheme, whereas frequent collisions and retransmissions in a dense network causes a high overhead of data traffic in the basic CSMA scheme. On the other hand, scheme achieves the lower bounds for data and control traffic of both access schemes, suggesting a much lower energy dissipation at the transmitter of a node. Fig. 9 presents the capacity, i.e. saturation throughput, for each access scheme using different packet sizes. As the packet size increases, the throughput initially increases for all access schemes, but large frame sizes in a dense network cause higher costs for collided packets and retransmissions. Since the RTS/CTS handshake of 82. does not provide perfect collision avoidance [2], its throughput degrades as the packet Media access delay, D (sec) Data generation rate, g Mean packet interarrival time (sec) Fig. 7. Throughput and media access delay for different access schemes versus traffic load, for a small data size of 4 bits. Fig. 8. Data traffic sent (bits/sec) x 4 3 Data generation rate, g x Mean packet interarrival time (sec) Data and control traffic overhead for each access scheme. size increases over a threshold. The scheme, on the other hand, eliminates the hidden terminals and reduces the number of contenders, thus significantly reduces collisions and retransmissions, thereby increasing the capacity of the network. Due to space considerations, we have presented limited results in this paper. For an analytical framework for performance comparisons and more results, please refer to [8]. III. COLOR ASSIGNMENT In this paper, we focus on the definition and generic analysis of the scheme. An implementation of the Control traffic sent (bits/sec)
6 6 Node throughput, S (bits/sec) Packet size, L (τ) data Packet size (bits) Fig. 9. Capacity analysis for different access schemes with different data packet sizes. scheme clearly requires an assignment of colors (slot/frequency/code) to all nodes in the network. We provided a coloring algorithm based on the geographical positions of nodes and based our analysis on this coloring scheme. We do not address the distributed coloring in detail in this paper, but we provide a brief discussion here on different approaches for various scenarios. For wireless mesh networks, the geographical slot assignment presented in Section II-A can be easily applied in practice; since these networks are not expected to be completely self configuring, a mesh router can be configured to use a specific color at the time of deployment based on its exact geographical location and a virtual hexagonal tessellation. In [6] the authors consider the greedy graph coloring problem in a distributed network, and they propose a new distributed algorithm, which is shown to color a graph in an expected time of O( log n log ) rounds, where is the maximum vertex degree in the graph. Propagating the coloring information to the 2-neighborhood rather than the neighbors of a node, this algorithm can be generalized for the coloring of G 2 G rather than G. We have applied the greedy coloring algorithm for coloring of random unit disk graphs and observed that the greedy coloring performs surprisingly well. In most cases, the number of colors used is very close to the constant bound obtained by hexagonal grid coloring; hence a distributed implementation of the greedy coloring algorithm seems suitable for color assignment. An output instance of the SLI- CON coloring on a network of nodes was demonstrated in Fig.. IV. SUMMARY AND CONCLUSION We have proposed a new hybrid channel access scheme for stationary multi-hop wireless networks, which uses the novel idea of contracting the contention area of a node and thus eliminating contention among hidden terminals. We have shown that a very small frame size is sufficient to assign each node a color (slot/frequency/code) such that no 2-hop neighbors in the network are assigned the same color. All nodes assigned to the same color contend for the channel using a basic CSMA protocol as if operating in a singlehop network (no hidden terminals). The reduced number of contending nodes and the elimination of hidden terminals yield superior overall CSMA performance, even though each node is allowed to contend for the channel only in a portion of the channel. The proposed scheme could be used as a standalone channel access scheme for multi-hop mesh networks or with duty-cycling based channel access schemes for wireless sensor networks for additional energy savings at the transmitter of a node. We have briefly discussed the distributed color assignment issue, but this deserves a separate study of its own. The implementation of a detailed MAC protocol along with a distributed color assignment is reserved as a future work. REFERENCES [] F. A. Tobagi and L. Kleinrock, Packet switching in radio channels: Part II the hidden terminal problem in carrier sense multiple-access modes and the busy-tone solution, IEEE Transactions on Communications, 23(2) pp , December 975. [2] Y. Wang and J. J. Garcia-Luna-Aceves, Modeling of collision avoidance protocols in single-channel multihop wireless networks, Wireless Networks, Volume, Issue 5, pp , September 24. [3] S. Banerjee and S. Khuller, A clustering scheme for hierarchical routing in wireless networks, Tech. Report CS-TR-43, University of Maryland, College Park, February 2. [4] J. V. Greunen and J. Rabaey, Lightweight time synchronization for sensor networks, Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA), San Diego, CA, September 23. [5] M. L. Sichitiu and C. Veerarittiphan, Simple, accurate time synchronization for wireless sensor networks, IEEE Wireless Communications and Networking Conference (WCNC), 23. [6] A. Kosowski and L. Kuszner, On greedy graph coloring in the distributed model, Proceedings of EuroPar6, LNCS 428 (26), [7] E. Arikan, Some complexity results about packet radio networks, IEEE Trans. Inform. Theory, IT-3 (984) 998. [8] TinyOS Source Code Repository, (26), [Online] Available at sourceforge.net/tinyos/tinyos-.x/ [9] OPNET Modeler, Network Design and Simulation Software, OPNET Technologies, Inc., [] L. Kleinrock and Y. Yemini, An optimal adaptive scheme for multiple access broadcast communication, International Conference on Communications, Vol. I, Toronto, Ontario, pp to 7.2.5, June 978. [] W. Ye, J. Heidemann, and D. Estrin, Medium access control with coordinated, adaptive sleeping for wireless sensor networks, IEEE/ACM Transactions on Networking, Vol. 2, No. 3, pp , June 24. [2] T. Van Dam and K. Langendoen, An adaptive energy-efficient MAC protocol for wireless sensor networks, The First ACM Conference on Embedded Networked Sensor Systems (SenSys 3), Los Angeles, CA, November 23. [3] J. Polastre, J. Hill, and D. Culler, Versatile low power media access for wireless sensor networks, SenSys 4, Baltimore, Maryland, November 35, 24. [4] MICA2: Wireless Measurement System, Crossbow Inc., pdf files/wireless pdf/ A MICA2.pdf [5] I. Rhee, A. Warrier, M. Aia, and J. Min, ZMAC: a hybrid MAC for Wireless Sensor Networks, SenSys 5, San Diego, California, November 24, 25. [6] I. Rhee, A. Warrier, J. Min, and L. Xu, DRAND: Distributed Randomized TDMA scheduling for wireless ad-hoc networks, Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 6, Florence, Italy, May 22-25, 26), ACM Press, New York, NY, 9-2. [7] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE standards 82., January 997. [8] F. Sivrikaya, Energy-Efficient Channel Access and Routing Protocols for Multi-Hop Wireless Networks, PhD Thesis, Rensselaer Polytechnic Insitute, December 27.
Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationHalmstad University Post-Print
Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationFAMA/TDMA Hybrid MAC for Wireless Sensor Networks
FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk
More informationMac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents
More informationFibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationEnhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
More informationBodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks
BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationChapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationMAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationImplementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationA SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS
Chapter 5 A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS Piyush Naik and Krishna M. Sivalingam Dept. of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250 piyush.naik@umbc.edu,krishna@umbc.edu
More informationPerformance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11. Kang Sun
Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11 by Kang Sun A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationIEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.
More informationAn Analysis of the Optimum Node Density for Ad hoc Mobile Networks
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationDuty-Cycle MAC Protocols and Networking Overhaul
RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle
More informationProtocol Design and Implementation for Wireless Sensor Networks
Protocol Design and Implementation for Wireless Sensor Networks PIERGIUSEPPE DI MARCO Masters Degree Project Stockholm, Sweden April 2008 XR-EE-RT 2008:005 Abstract Designing efficient and reliable communication
More informationMaster s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System
Master s Thesis Title Load Balancing Techniques for Lifetime Prolonging in Smart Metering System Supervisor Professor Masayuki Murata Author Chuluunsuren Damdinsuren February 14th, 2012 Department of Information
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationPerformance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationDynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet
International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationSelfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
More informationLoad-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks
Load-Balanced Routing Scheme for Energy-Efcient Wireless Sensor Networks Fatma Othman, Nizar Bouabdallah and Raouf Boutaba z INRIA, Campus universitaire de Beaulieu ; 3504 Rennes Cedex, France ( z )School
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationShort Preambles with time left to Data
In: Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), Athens, Greece, 3-7 September 2007 A WIRELESS SENSOR MAC PROTOCOL FOR BURSTY
More informationMedium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1
1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,
More informationMAC Protocols for Wireless Sensor Networks: a Survey
1 MAC Protocols for Wireless Sensor Networks: a Survey Ilker Demirkol, Cem Ersoy, and Fatih Alagöz Abstract Wireless sensor networks are appealing to researchers due to their wide range of application
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks Joseph Polastre Computer Science Department University of California, Berkeley Berkeley, CA 9472 polastre@cs.berkeley.edu Jason Hill JLH Labs
More information-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks
-MAC: An Energy-Efficient Medium Access Control for Wireless Sensor Networks Andre Barroso, Utz Roedig and Cormac Sreenan Mobile & Internet Systems Laboratory, University College Cork, Ireland Email: a.barroso
More informationAnalysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
More informationPresentation and analysis of a new technology for low-power wireless sensor network
Presentation and analysis of a new technology for low-power wireless sensor network Sabri Khssibi*, Hanen Idoudi**, Adrien Van Den Bossche*, Thierry Val* and Leila Azzouz Saidane** *University of Toulouse,
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More information802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
More informationA New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks
Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationA Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks
A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationAn Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research
More informationIN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationA BANDWIDTH SHARING APPROACH TO IMPROVE LICENSED SPECTRUM UTILIZATION
A BANDWIDTH SHARING APPROACH TO IMPROVE LICENSED SPECTRUM UTILIZATION P. Papadimitratos, S. Sankaranarayanan, and A. Mishra Electrical and Computer Engineering Virginia Tech {papadp, srivatsan, mishra}@vt.edu
More informationPerformance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
More informationModeling and Simulation of Quality of Service in VoIP Wireless LAN
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More information2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationMobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de
Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness
More informationEthernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
More informationWIRELESS sensor networking is an emerging technology
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor
More information