Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
|
|
|
- Morgan Ellis
- 10 years ago
- Views:
Transcription
1 The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when? (and where)? Avoid collisions ( Collision Detection) Scarce resources utilization Channel capacity and battery power performance and QoS System level and (or vs?) user level Frame organization, and intra-, inter-layer information management Cross layering principles for adaptive behavior? Risk for spaghetti design [Kumar2003] Collision of wireless signals Collision has destructive effect on the receiver...causes both channel and power waste Collision detection is t practical in wireless systems Collision avoidance/resolution + contention control on the sender Capture effect is possible Exploited to enhance channel reuse, if possible Collision domain: set of des sharing the same channel Space splitting, transitive relation [Kumar2003] V. Kawadia, P.R. Kumar, "A Cautionary Perspective on Cross Layer Design", Submitted for publication, 2003 ( 1 2 Wireless MAC protocols classification Evolutionary perspective of distributed MAC Distributed Contention based deterministic deterministic access ID mapping No Centralized Coordinator, static allocation of resources Multiple access protocols probabilistic Contention control Contention resolution random access No Centralized Coordinator, Dynamic allocation of resources Distributed dynamic Implicit Reservation Token based No Centralized Coordinator, Dynamic allocation of resources Hybrid Cluster-based definitions MAC? Contention free centralized static Reservation based Fixed TDMA, FDMA, CDMA Centralized Coordinator, Static allocation of resources Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way ( centralized coordinator) let s analyze the domain first Aloha [Abramson1970]: coordination Slotted Aloha CSMA [Kleinrock1975]: listen before to transmit Slotted CSMA CSMA/CD: listen before and while transmitting (unpractical in wireless scenarios) CSMA/CA + contention resolution (reactive resolution of collisions) CSMA/CA + contention control (preventive/reactive reduction of risk of collisions) [Abramson1970] N. Abramson, ``The ALOHA system - ather alternative for computer communications'', Proc. Fall Joint Comput. Conf. AFIPS, 1970 [Kleinrock1975] L. Kleinrock, F.A. Tobagi ``Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access modes and their throughput-delay characteristics'', IEEE Transactions on Communications, Vol Com-23, No. 12, pp ,
2 The ALOHA protocol The ALOHA protocol Packet ready? transmit An integral part of the ALOHA protocol is feedback from the receiver Feedback occurs after a packet is sent No coordination among sources STA i STA j early1 Frame size late2 ok2 ok1 wait for a round-trip delay packet transmission k s Collision domain early1 collision Frame1 late2 ok2 ok1 positive ack? compute random backoff integer k New1+ coll. Frame1+New2 coll. Frame vulnerability : twice the frame size 5 6 Slotted ALOHA Slotted ALOHA STA i Framesize Packet ready? transmit wait for a round-trip quantized in slots Wait for start of next slot delay packet transmission k s STA j Collision domain slot Propagation delay NEW collision positive ack? compute random backoff integer k Frame1+ collision Frame vulnerability : the frame size (slot + propagation) 7 8 2
3 CSMA Protocol CSMA Protocol STA i Frame size Packet ready Channel Busy? transmit wait for a round-trip delay packet transmission k s STA j Propagation delay late2 early2 Collision domain collision NEW late2 early2 Frame1 detected... late2 late2 positive ack? compute random backoff integer k Frame1+late2 vulnerability Frame1+early2 vulnerability Frame vulnerability : twice the propagation delay 9 10 Slotted CSMA Protocol Throughput comparison STA i Frame size 1 Analytical Results STA j Propagation delay Pure CSMA Slotted CSMA Collision domain collision NEW Frame1 detected... S (Throughput) Slotted Aloha 0.2 Pure Aloha Frame1+ vulnerability 0.1 Frame vulnerability : the propagation delay Offered Load: G
4 CSMA/CA: the IEEE Wireless LAN Evolutionary perspective of distributed MAC 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure ( division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control ( base station) contention based access ( QoS, minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee Distributed, contention-based wireless MAC Problem: the frame vulnerability (collision risk) Needs resolution in distributed way ( centralized coordinator) let s analyze the Space domain MACA [Karn1990]: /, carrier sense (MACA-BI, RIMA...) MACAW [Bharghavan et al.1994]: /, carrier sense and immediate (more reliable and efficient Link Layer Control) FAMA [Fullmer et al.1995]: /, carrier sense + other stuff Main solution: / mechanism Today under some criticisms [Karn1990] P. Karn, ""MACA - A new Channel Access Method for Packet Radio", proc. 9-th Computer Networking Conference, September 1990 Will be analyzed later... [Bharghavan et al. 1994] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, "MACAW: A Media Access Protocol for Wireless LAN's," proc. ACM SIGCOMM'94, pp , London, 1994 [Fullmer et al. 1995] C.L. Fullmer, J.J. Garcia-Luna-Aceves, "Floor Acquisition Multiple Access (FAMA) for Packet Radio Networks", Proc. ACM Sigcomm'95 Cambridge, MA, Hidden and Exposed terminals: / / drawbacks The space domain: Hidden and exposed terminals: space vulnerability / mechanism to contrast Hidden terminals Hidden terminals: B does t sense traffic, but the receiver C cant receive its packet due to a transmission from A to C (A hidden to B) to seize the channel, according to CSMA/CA, a station transmits a short (request to send) packet and waits for the (Clear to Send) response. A transmit to C and seizes the coverage area C respond with to A (B receive the and does t transmit even if it cant sense A s transmission) / is t a guaranteed solution and it is additional overhead Power asymmetry, detection and interference range >> transmission range A C B Collision on C D A to C A C B B to D Adopt / A C B Data Space
5 Ad hoc Multi-hop: /Space problems MACA: slotted /, CS A bi-directional chain of MAC frames TCP streams (Data + Ack) Self-contention (MAC layer problem) Inter-stream self-contention (Data vs. Ack TCP streams) Intra-stream self-contention (same TCP stream) How to obtain coordination? New proposed solutions Fast forward Quick exchange Flow numbering (pre-routing at the MAC layer???) Frame transmission by forward invitation MACA: eliminates the carrier sensing...because the contention is on the receiver! Introduces slotted / (30 bytes each) and slot equals the (and ) duration Allow exploitation of concurrent spatial transmission if the receiver is t exposed to two hidden transmitter terminals Variations: MACA-BI, RIMA (receiver initiated) Collision on B and C? A C B D C to A A C B B to D Adopt / Data Space MACAW: cs + slotted / + FAMA: cs + slotted / + MACAW: fairness of the backoff procedure MILD + Binary Exponential Backoff Cooperation-based backoff values (space-issues of contention) carrier sensing before both slotted / Introduces ( ) Efficient retransmission policy at Data Link layer Problem: both sender and receiver act as receiver during frame transmissions ( concurrent space exploitation of the channel) FAMA: re-introduces carrier sensing before both slotted / Introduces lower bound for size of / and -dominance Floor acquisition: principle for and space contention Collision on C D A to C A C B B to D Adopt / A C B Data Space Collision on C D A to C A C B B to D Adopt / A C B Data Space
6 Ad hoc Multi-hop: /Space problems Ad hoc Multi-hop: /Space problems Source to destination stream: TCP Fast Forward intra-stream Quick Exchange inter-stream Destination to Source stream: TCP Sender s Neighbors Sender Receiver Receiver s Neighbors TCP ew Contention TCP + + NAV () 1 NAV () + + NAV (1) NAV (1) ew Contention Modified NAV policy CSMA/CA: the IEEE Wireless LAN Difs Source Destination Others NAV () NAV () Difs Source Destination Others NAV () NAV () 1 Medium Access Control (MAC) protocol: 2 coordination functions co-exist in a superframe structure ( division) Distributed Coordination Function (DCF) Ad-Hoc networks (peer to peer) Distributed control ( base station) contention based access ( QoS, minimum delay) CSMA/CA access protocol with Binary Exponential Backoff Point Coordination Function (PCF) Centralized control (Base station) Polling based access (soft QoS, minimum delay) minimum bandwidth guarantee NAV () NAV () [ ] Defer Access Defer Access
7 IEEE MAC protocol architecture Point coordinated mode (PCF) contention free services Contention based services point coordinated mode is a contention free, optional service can co-exist with the DCF in a superframe structure. central coordinator, i.e. the access point manages stations belonging to its access list. guaranteed to access the channel in a contention-free environment. MAC sublayer Point Coordination Function (PCF) Distributed Coordination Function (DCF) Fundamental Access Method Physical Layer (PHY) DCF and PCF control: IFS Point Coordination Function (PCF) Each station performs a carrier sensing activity when accessing the channel priority is determined by Interframe spaces (IFS): Short IFS (SIFS) < Point IFS (PIFS) < Distributed IFS () after a SIFS only the polled station can transmit (or ack) after a PIFS only the Base Station can transmit (and PCF takes control) after a every station can transmit according to basic access CSMA/CA (DCF restarts) during the PCF the base station has priority in accessing the channel Base Station waits for a PIFS after a transmission and takes control (DCF stations must wait for >PIFS) base station polls stations that reserved the channel at the end of the PCF period the Base Station releases the channel and DCF restarts (after a ) SIFS PIFS Backoff period (contention) SIFS PIFS Backoff period (contention) Poll DCF Trans. 1 PCF ack Base station PCF (polling based) (scenario 2) takes control Poll trans. 1 ack Poll trans. 2 ack DCF stations wait for a... : restart DCF DCF Trans. 2 ack DCF Poll DCF Trans. 1 PCF ack Base station PCF (polling based) (scenario 2) takes control Poll trans. 1 ack Poll trans. 2 ack DCF stations wait for a... DCF Trans. 2 ack DCF DCF (scenario 1: PCF takes control) DCF (scenario 1: PCF takes control)
8 Distributed Coordination Function (DCF) CSMA/CA Access Mechanism Basic Access mode: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access scheme (listen before transmit) carrier sensing performed to detect ongoing transmissions Binary Exponential Backoff over slotted idle each station randomly selects the transmission slot in a variable sized Contention Window Collision Detection (CD) Medium Busy Packet Transmitted SIFS PIFS Backoff period (contention) Backoff period DCF Trans. 1 ack DCF Trans. 2 Ack DCF (scenario 1: PCF takes control) Packet Transmitted DCF SIFS Slot Back-off Window CSMA/CA is an efficient protocol for data traffic, like Ethernet Listen before transmit Always back-off before a transmission or retransmission Designed to provide fair access to the medium DCF Backoff procedure DCF basic access: overview Selection of a random Backoff CWi=contention window size at the i-th transmission attempt. CWi is doubled after each collision experienced (to reduce the contention) Backoff(i)=(Cwi*random())*Slot i CW i Reduction of the Backoff After an idle period from the last transmission, a station decrements its Backoff by a Slot_ for each slot where activity is sensed on the medium. Frozen As soon as the medium is determined to be busy, the backoff procedure is suspended. Transmission When the Backoff reaches zero, the station starts the transmission. Successful transmission Collision: CD Station A Station B Station C L B L C Source Destination L A COLLISION LENGTH SIFS {L A, L B, L C}= lengths of colliding packets IEEE does t implement collision detection collision length = maximum{l A, L B, L C}
9 Effect of high contention = many collisions Information kwn due to carrier sense...allow to determine the Slot Utilization index: Slot Utilization = Num Busy Slots / Initial Backoff Slot Utilization in [0..1] Adoption of Slot Utilization in Distributed contention control (DCC) Probabilistic Distributed Contention Control Probability of Transmission = P_T P_T = (1- S_U) Num_Att Extends MAC Stable (avoids collapse)
10 DCC => better performance ( overheads) DCC => better performance ( overheads) DCC distributed priority mechanism Num_Att*Prior_Lev P_T=(1-S_U) AOB = optimum performance No need to estimate number of stations
The MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks
International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
Random Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY Sunil Kumar 1, Vineet S. Raghavan 2 and Jing Deng 3 1 Electrical and Computer Engineering Department, Clarkson University, Potsdam,
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Philippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Controlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu [email protected] Communications Laboratory 09.03.2004 Content of Presentation
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Chapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11. Kang Sun
Performance Evaluation of a Binary Exponential Code Backoff Algorithm for IEEE 802.11 by Kang Sun A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
RTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
Medium Access Control (MAC) and Wireless LANs
Medium Access Control (MAC) and Wireless LANs Outline Wireless LAN Technology Medium Access Control for Wireless IEEE 802.11 Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
ECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC)
Vol.2, Issue.2, Mar-Apr 2012 pp-078-083 ISSN: 2249-6645 Efficient MAC Protocol for Heterogeneous Cellular Networks (HC-MAC) 1 Y V Adi Satyanarayana, 2 Dr. K Padma Raju 1 Y V Adi Satyanarayana, Assoc. Professor,
Can I add a VoIP call?
Can I add a VoIP call? Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Abstract In this paper, we study the
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Ethernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 [email protected] www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
Wireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute [email protected] ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 ([email protected]) Chapter
Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse
Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto Division of Computer Science The University of Texas at San Antonio San Antonio, TX 78249-0667
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
SSPC and Data Transfer
Ad Hoc Networks 7 (2009) 1136 1149 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc The slow start power controlled MAC protocol for mobile ad hoc
IEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Mobile Ad Hoc Networks
Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is
IEEE 802.11e WLANs / WMM. S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh ([email protected]) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
II. IEEE802.11e EDCA OVERVIEW
The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
How To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem
Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015 Contents I Before you start 3 II Exercises 3 1
Real-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Throughput Modeling in IEEE 802.11 WLAN-based Wireless Networks
Throughput Modeling in IEEE 82.11 WLAN-based Wireless Networks Kirill Ermolov Aalto University Espoo, Finland [email protected] Abstract Wireless Local Area Networks (WLANs) are nowadays the most
Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de
Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness
Yalda Hakki ([email protected]) Rosy Johal ([email protected]) Renuka Rani ([email protected]) www.sfu.ca/~rra7
ENSC 427: Communication Networks Spring 2010 Final Project Presentation Yalda Hakki ([email protected]) Rosy Johal ([email protected]) Renuka Rani ([email protected]) www.sfu.ca/~rra7 1 Introduction Overview and Motivation
A TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
Modeling and Simulation of Quality of Service in VoIP Wireless LAN
Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts
Multiple Access An Engineering Approach to Computer Networking What is it all about? ider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both
Virtual PCF: Improving VoIP over WLAN performance with legacy clients
Virtual PCF: Improving VoIP over WLAN performance with legacy clients by Usman Ismail A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 [email protected] Guevara Noubir College
IEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet
International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1
a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
802.11 Arbitration. White Paper. September 2009 Version 1.00. Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected]
802.11 Arbitration White Paper September 2009 Version 1.00 Author: Marcus Burton, CWNE #78 CWNP, Inc. [email protected] Technical Reviewer: GT Hill, CWNE #21 [email protected] Copyright 2009 CWNP, Inc.
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e
Enhanced TXOP scheme for efficiency improvement of WLAN IEEE 802.11e Jakub Majkowski, Ferran Casadevall Palacio Dept. of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC) C/ Jordi
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy
Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev, Jean-Marie Gorce To cite this version:
