USE OF SMART ANTENNAS IN AD HOC NETWORKS
|
|
|
- Tyler Hart
- 10 years ago
- Views:
Transcription
1 USE OF SMART ANTENNAS IN AD HOC NETWORKS Mohammed Ali Hussain 1, P.Suresh Varma 2, K. Satya Rajesh 3, Hussain Basha Pathan 4, Leela Madhav Sarraju 5 1 Assoc. Professor & Head, Dept.of Computer Science & Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry, A.P., India. [email protected] 2 Professor, Dept. of Computer Science & Engineering, Adikavi Nannaya University, Rajahmundry, A.P., India. [email protected] 3 Research Scholar, Dept.of Computer Science, Rayalaseema University, Kurnool, A.P., India. [email protected] 4 Research Scholar, Dept.of Computer Science, Rayalaseema University, Kurnool, A.P., India. [email protected] 5 Research Scholar, Dept.of Computer Science, Dravidian University, Kuppam, A.P., India. [email protected] ABSTRACT The capacity of ad hoc networks can be severely limited due to interference constraints. One way of using improving the overall capacity of ad hoc networks is by the use of smart antennas. Smart antennas allow the energy to be transmitted or received in a particular direction as opposed to disseminating energy in all directions. This helps in achieving significant spatial re-use and thereby increasing the capacity of the network. However, the use of smart antennas presents significant challenges at the higher layers of the protocol stack. In particular, the medium access control and the routing layers will have to be modified and made aware of the presence of such antennas in order to exploit their use. In this paper we examine the various challenges that arise when deploying such antennas in ad hoc networks and the solutions proposed thus far in order to overcome them. The current state of the art seems to suggest that the deployment of such antennas can have a tremendous impact in terms of increasing the capacity of ad hoc networks. KEYWORDS Directional Antennas, Medium Access Control, Routing. 1. INTRODUCTION The use of smart antennas in cellular networks has increased capacity by reducing interference and enabling spatial reuse of spectrum. Typically these antennas are deployed at base-stations in these networks to sectorize cells and focus transmissions in certain directions [1] [2]. A smart antenna usually consists of an array of antenna elements that work together in order to either focus the transmitted energy in a particular desired direction or to provide uncorrelated receptions of signals that can then be combined by complex signal processing techniques to improve the received signal quality or both. The spacing between the antenna elements is on the order of the wavelength of the carrier used for communications. Consequently, as DOI : /ijcsit
2 technology makes the use of higher frequencies feasible, the spacing between the antenna elements can be much smaller. As an example, if the elements of the antenna array were to be arranged in a cylindrical layout, the radius of the cylindrical array would be just 3.3 centimeters if the ISM 5.8 GHz band were used [3]. Similarly, if we were to use the 24 GHz band, the radius of such a cylindrical array needs to be just around 0.8 centimeters. This in turn allows the use of small antenna elements that can be housed on mobile terminals. One could now potentially use these antennas in ad hoc networks that simply consist of mobile devices without a fixed supporting infrastructure. The use of these antennas in mobile ad hoc networks however raises a new set of challenges. Traditional protocols (medium access control, routing and transport in particular) do not take advantage of the existence of the underlying antennas, Furthermore, in order to use the antennas effectively, support from the higher layer protocols is necessary. There has been a lot of recent interest in the design of new protocols to facilitate the use of smart antennas in ad hoc networks. In this paper, we review the current state of the art protocols at the medium access control and discuss why they are appropriate for use with smart antennas in ad hoc networks. We elaborate on the problems that they are capable of solving, discuss their limitations, and identify problems that are yet to be completely solved. We begin with a brief discussion of smart antennas and models that are typically used in studies thus far. We then discuss solutions at the medium access control layer that have been proposed for use with such antennas. 2. SMART ANTENNA BASICS AND MODELS In this section, we describe the different kinds of antenna systems and discuss their characteristics in brief. It is not our intent here to describe the signal processing techniques required for tuning antenna patterns or the associated subject matter in electromagnetic and the interested reader is referred to [4] and [5]. As mentioned earlier, our goal in this paper is to primarily look at the networking challenges that arise due to the deployment of such antennas in ad hoc networks. 2.1 ANTENNAS IN BRIEF Omni-directional antennas are those antennas that radiate or receive energy equally well in all directions. Traditionally these antennas have been considered (or implicitly assumed) for studies related to ad hoc networking. Since these antennas dissipate energy in all directions, they impose limitations on the extent to which the wireless spectrum may be re-used in the network. In [6], it was shown that the capacity of an ad hoc network that uses omni-directional antennas is limited. Smart antennas, naively speaking, have the ability to receive/transmit energy in a particular direction as compared to other directions. The energy dissipated in the directions other than the desired direction can be quelled when transmitting and filtered out while receiving. Smart antennas also null out the interference caused by other transmissions. The antenna is complemented by an adaptive array processor that decides on the amount of power to be used on each antenna element so that the signals combine together to form a specific antenna pattern. The lack of such signal processing techniques causes energy to be dissipated in directions other than the desired one. An antenna that simply beam forms the energy in a particular direction is often referred to as a directional antenna. Most of the work to date has looked primarily at the use of directional antennas in ad hoc networks. Figure 1.1 depicts the antenna patterns of (a) an omni-directional antenna and (b) a directional antenna. The antenna footprint of a directional antenna contains a main lobe and side labes as shown in the figure. The Yagi antenna [7] is a well known 48
3 directional antenna often used in cellular networks. It has been shown that the capacity of ad hoc networks can be increased significantly by using directional antennas [8]. We further classify directional antennas systems into switched beam (or sectrorized) antenna systems and steer able beam systems. In switched beam systems only multiple fixed beams are possible. As an example, space might be divided into four sectors of 45 o each. A directional transmission would then cover one of these four fixed sectors. A given node in the network cannot focus its antenna beam on a particular neighborhood node so as to maximize the signal strength at that node. Clearly, for a switched beam antenna with K beams, the width of each beam is 2π/K radians. In contrast, in a steered beam systems, the main lobe of the antenna can be focused in practically any desired direction. Thus, if a given node is communicating with its neighbor, it can adaptively steer its beam so as to point the main lobe towards that neighbor in a mobile scenario as well. Figure 1.1. Footprint of (a) An Omni-directional Antenna and (b) A Directional Antenna The nomenclature smart antennas typically refer to more sophisticated antenna arrays. There are dynamic phased arrays that maximize the gain towards a target in the presence of multi-path effects and there are adaptive arrays that can produce nulls so as to eliminate the effects of simultaneously ongoing interfering transmissions. We point out that the antennas that we consider for deployment in ad hoc networks are electronically steerable antennas. High-gain aperture and horn antennas that are commonly used in satellite or microwave based terrestrial wireless networks are inappropriate for use in mobile terminals. These antennas will have to be mechanically steered and could be extremely expensive in terms of the energy consumed; this in turn could significantly increase the energy usage in the mobile terminal and could quickly cause its battery to die. 3. IMPORTANT ANTENNA PARAMETERS The gain of a directional antenna is typically higher than that of an omni-directional antenna. Correspondingly directional antennas can have higher reach ability or in other words, a larger directional range as compared to an omni-directional antenna. The gain of a directional antenna is defined as [3]: nu(d) G d = U ave 49
4 Where, n is defined to be the efficiency of the antenna and accounts for the hardware related losses, U(d) is the energy in the direction d and U a ve is the average power density. The gain is measured in dbi, where i is used to indicate that this is the gain in decibels over an ideal isotropic antenna. The main lobe of the antenna represents the direction of peak gain during a transmission or a reception. The antenna beam width typically corresponds to the angle subtended by the two directions on either side of the peak gain that are 3 db lower in gain as compared to the peak gain. Note that this is a reduction by half in terms of the signal power as compared to the power in the direction of peak gain (not in decibels). This angle is also sometimes referred to as the 3 db beam width. 4. DIRECTIONAL ANTENNA MODELS The presence of side-lobes causes interference to other simultaneous transmissions in spite of using a directional antenna. Sophisticated antenna arrays can steer these side lobes so as to create nulls towards other simultaneous users of the channel. However, simpler (and hence cheaper) antennas suffer from the presence of these side lobes. In ad hoc network literature, most of the work thus far adopts one of two models for characterizing the radiation pattern of a directional antenna: (a) The Flat Topped Radiation Pattern and (b) The Cone sphere Radiation Pattern. With the flat topped radiation pattern model, it is assumed that the gain of the antenna is a constant within a defined beam width of a radiation. It is also assumed that the side lobes are absent. If the beam width is θ, the gain is computed to be G= 2π/θ. With the cone and sphere radiation pattern, the side lobes are accounted for by a spherical footprint that is attached to the apex of a cone. The axis of this cone passes through the direction of peak gain of the antenna. If the gain in the direction of the main lobe and the beam width of the main lobe are known, it is a simple exercise to compute the gain of the spherical side-lobe in the cone and sphere radiation pattern [3]. We depict the cone and sphere radiation pattern in Figure MEDIUM ACCESS CONTROL WITH DIRECTIONAL ANTENNAS In this section, we describe the current state of the art literature on medium access control with directional antennas. Medium access control refers to the arbitration of the channel bandwidth among a plurality of multiple-access users. We can classify medium access protocols into two types (a) on-demand or unscheduled access and (b) scheduled access. On-demand or unscheduled access mechanisms are based on contention access. Nodes in the ad hoc network contend for the channel. Carrier sensing (both virtual and physical) are used to reduce the extent of packet losses due to collisions. Traditionally, the MAC protocol defined in the IEEE standard has been popularly adopted as the Contention based MAC protocol in ad hoc network research. Scheduled access, on the other hand, attempts to schedule transmissions in advance to 50
5 Figure 1.2. The Cone and Sphere Radiation Pattern reduce the possibility of collisions. Protocols that use scheduled access might proactively allocate bandwidth based on a number of criteria that may include the topology, the generated traffic and priority of various nodes. We begin with a very brief discussion of the Directional Medium Access Control and the various approaches that have been proposed. Finally, we discuss the few approaches that have been proposed for scheduled access. 6. DIRECTIONAL MEDIUM ACCESS CONTROL WITH OMNI- DIRECTIONAL RECEPTIONS There are two approaches to deal with this problem. The first approach which is called the conservative approach precludes a node from performing transmissions upon the receipt of any control message. The second approach which they call the aggressive approach, allows a node to initiate new transmissions in spite of hearing control messages sent by other nodes. RTS and CTS messages are assumed to be transmitted and received omni-directionally. The RTS and CTS messages are assumed to contain location information of both the sender and receiver; this in turn helps transmit (or receive) the DATA and ACK messages directionally. Neither of the two schemes overcome the problems discussed above. The performance evaluation of the two schemes in [3] shows that both schemes outperform the IEEE MAC with omnidirectional communications. The aggressive scheme was found to be better since the conservative scheme suffered from extremely high latencies due to the nodes deferring their communications over extended periods even when the channel was free in reality. 6.1 SCHEDULED MEDIUM ACCESS CONTROL The MAC protocol described thus far are based on collision avoidance. These protocols suffer from high collision rates when the load is high. An alternative approach is to have scheduled access wherein nodes exchange control messages that allow them to know of each other s traffic patterns and thereby somehow schedule collision-free (to the extent feasible) transmissions. In this paper, a new protocol called the Receiver Oriented Multiple Access (ROMA) has been proposed for scheduled access with directional antennas. One other difference in this work as compared with other efforts is that the authors assume the presence of multi-beam antenna arrays (MBAA). The advancement of digital signal processing 51
6 technologies facilitates the use of such arrays. With an MBAA a node can generate multiple beams that allow the node to communicate with more than one of its neighbors. It is assumed that the MBAA can generate upto K transmit antenna beams. The radiation pattern of an MBAA may be depicted as shown in Figure 1.3. The MBAA also has the ability to anull radiations in unwanted directions. Figure 1.3. The Multi-Beam Antenna Array We assume that the MBAA system is capable of transmitting to multiple neighbors but is capable of making just a single reception at any given time. Furthermore, they assume the system is capable of performing omni-directional transmissions and receptions. They consider a time-slotted system i.e., time is divided into contiguous frames. The nodes are assumed to have a synchronized view of time by using either the global positioning system (GPS) or the network time protocol (NTP). Each node is assumed to know the precise location of its onehop neighbors. Each node then propagates its one hop neighbor information to all of its one hop neighbors. Thus, this propagation gives each node knowledge of its two-hop neighborhood. In order to propagate this information, the authors assume that the nodes use omni-directional random access transmissions. Receptions are omni-directional as well. In order to accommodate this, the authors split time into segments. In the scheduled access segment the time is further divided into slots and access in these slots is in accordance to a schedule to be described later. In the random access segment, nodes exchange the control information. In [7] the authors do a simple analysis to compute the fraction of time needed for the random access and show that this is fairly small. The scheduled access takes the following scenarios into account: (a) avoidance of hidden terminal problems wherein a recipient node ends up receiving transmissions from two simultaneous senders that are hidden from each other (b) ensures that the schedule respects the half-duplex nature of the communications (c) two transmitters are not trying to reach the same receiver at the identifier computes a priority for itself. This priority is based on the use of a simple hash function. Similarly it computes priorities for each of its neighbors. Depending on the traffic generated and its relative priority, a node will make a decision on whether or not to transmit in a particular scheduled slot. Note that the aforementioned scenarios are to be taken into account while this decision is being made. A similar computation is made on the links on which a node would transmit. As a simple example, if a node is of lower priority, it might be unable to transmit on a subset L of its K possible links since there are higher priority nodes using those links. 52
7 In addition to this priority assignment, a node will also have to either take the role of a transmitter or a receiver during each slot. If the calculated priority is even, then the node decides to be a receiver and if it is odd, it chooses to transmit. There could be pathological cases wherein a node and all of its neighbors are all either transmitters or receivers. In such a case, the node from the group that has the highest priority will switch its configuration; in other words, if there is a particular group created such that a node and all of its neighbors are receivers, the node with the highest priority in that group will switch to being a receiver. ROMA offers collision free access and has been shown to perform well. However, mobile scenarios are not considered. Furthermore, the priorities based on which the schedules are formed are based on identifiers and not based on the traffic generated. 7. CONCLUSION In the paper we examine the various challenges that arise when deploying smart antennas in ad hoc networks. Most of the protocols designed thus far assume that the antennas are simple directional antennas. The work on medium access control involves using the antennas intelligently for collision avoidance and spatial re-use purposes. Most of the protocols are based on directional virtual carrier sensing wherein overhearing nodes simply preclude transmissions in the direction of an ongoing communication as opposed to not transmitting in any direction as would be the case if a omni-directional antenna were to be used. Although there has been some work on protocols that exploit the use of directional antennas in ad hoc networks, the protocols cannot completely overcome some of the problems that arise due to the use of such antennas and are not yet designed to aptly cope with mobility. Challenges remain and the area remains an exciting and open for future research. REFERENCES [1] A.Acampora and S.V.Krishnamurthy. A new adaptive mac layer protocol for broadband packet Wireless networks in harsh fading and interference environments. IEEE/ACM Transactions on Networking, [2] S.V.Krishnamurthy, A.Acampora, and M.Zorzi. Polling based media access protocols for use with smart adaptive array antennas. IEEE/ACM Transactions on Networking, [3] R.Ramanathan. On the performance of ad hoc networks with beam forming antennas. Proceedings of ACM MOBIHOC, [4] J.C.Liberti and T.S.Rappaport. Prentice Hall, [5] J.Kraus and R.J.Marhelka. McGraw Hill, [6] P.Gupta and P.R.Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, [7] L.Bao and J.J.Garcia-Luna-Aceves. Transmission scheduling in ad hoc networks with directional antennas. ACM MOBICOM, [8] S.Yi, Y.Pei, and S.Kalyanaraman. on the capacity improvement of ad hoc wireless networks using directional antennas. ACM MOBIHOC,
8 Authors Mohammed Ali Hussain received the Master s degree M.Sc Computer Science from Alagappa University in He received Master s degree M.Tech in Information Technology from Allahabad Deemed University in He received Ph.D. degree in Computer Science from Magadh University, Bihar, India in He is doing Post Doctoral degree in Computer Science & Engineering from Acharya Nagarjuna University, A.P., India. He is currently an Assoc. Professor & Head in the Department of Computer Science & Engineering in Sri Sai Madhavi Institute of Science & Technology, Rajahmundry, Andhra Pradesh, India. He had published several papers in National and International Conferences & International Journals. His research interests are Wireless Networks with specialization in Quality of Service (QoS) in IEEE Wireless LANs. & Ad-Hoc Networks. He is a member of IACSIT and ISTE. P.Suresh Varma received the Master s degree M.Tech in Computer Science & Technology from Andhra University in He received Ph.D. degree in Computer Science & Engineering from Acharya Nagarjuna University in He is currently an Professor in Department of Computer Science & Engineering in Adikavi Nannaya University, Rajahmundry, A.P., India. He had published several papers in National and International Journals. He is active member of various professional bodies. K. Satya Rajesh received the Master s degree M.C.A from Manonmaniam Sundarnar University in He received Master s degree M.Tech in Computer Science & Engineering from Acharya Nagarjuna University in He is doing Ph.D. in Computer Science from Rayalaseema University, Kurnool, A.P., India. He is currently an Asst.Professor in Department of Computer Science & Engineering in Vikas College of Engineering & Technology, Vijayawada, A.P., India. His research interests are Computer Networks & Sensor Networks. Hussain Basha Pathan received the Master s degree M.C.A from Acharya Nagarjuna University in He received Master s degree M.Tech in Computer Science & Engineering from Acharya Nagarjuna University in He is doing Ph.D. in Computer Science from Rayalaseema University, Kurnool, A.P., India. He is currently an Asst.Professor in Department of M.C.A in S.N.B.T.M (PG) College, Repalle, Guntur Dist., A.P., India. His research interests are Wireless and Ad-hoc Networks. Leela Madhav Sarraju received the Master s degree M.C.A from Acharya Nagarjuna University in He received Master of Philosophy (M.Phil) in Computer Science from Periyar University in He is doing Ph.D. in Computer Science from Dravidian University, Kuppam, A.P., India. His research interests are Wireless and Ad-hoc Networks. He is a member of CSI & IEEE. 54
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Defining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
Antenna Diversity in Wireless Local Area Network Devices
Antenna Diversity in Wireless Local Area Network Devices Frank M. Caimi, Ph.D. Kerry L. Greer Jason M. Hendler January 2002 Introduction Antenna diversity has been used in wireless communication systems
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Multiple Access Techniques
Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks Vikram Gupta +, Srikanth Krishnamurthy, and Michalis Faloutsos Abstract Department of Computer Science and Engineering, UC Riverside,
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
Antenna Deployment Technical Brief
ProCurve Networking Antenna Deployment Technical Brief Introduction... 2 Antenna types... 2 Omni directional antennas... 2 Directional antennas... 2 Diversity antennas... 3 High gain directional antennas...
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
5. ANTENNA TYPES. Figure 5. The vertical dipole and its electromagnetic equivalent, the vertical monopole
Antennas can be classified in several ways. One way is the frequency band of operation. Others include physical structure and electrical/electromagnetic design. The antennas commonly used for LMR both
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas Gentian Jakllari, Wenjie Luo and Srikanth V. Krishnamurthy Department of Computer Science and Engineering,
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig, www.ibr.cs.tu-bs.de
Mobile Communications Exercise: Satellite Systems and Wireless LANs N 1 Please define the terms inclination and elevation using the following two figures. How do these parameters influence the usefulness
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto Division of Computer Science The University of Texas at San Antonio San Antonio, TX 78249-0667
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Multiplexing on Wireline Telephone Systems
Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
System Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Communication Satellite Systems Trends and Network Aspects
Communication Satellite Systems Trends and Network Aspects Paul Anderson Communication Architectures Department The Aerospace Corporation [email protected] http://www.aero.org/ Lee Center, Caltech
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
High-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman
Antennas & Propagation CS 6710 Spring 2010 Rajmohan Rajaraman Introduction An antenna is an electrical conductor or system of conductors o Transmission - radiates electromagnetic energy into space o Reception
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
Antenna Properties and their impact on Wireless System Performance. Dr. Steven R. Best. Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013
Antenna Properties and their impact on Wireless System Performance Dr. Steven R. Best Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013 Phone (603) 627-7877 FAX: (603) 627-1764 Email: [email protected]
NEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
The Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008
For Metro and Rural Wi-Fi Executive summary The current generation of conventional Wi-Fi metro access points use commoditized chipsets originally designed specifically for indoor environments. When brought
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
IEEE 802.11n Enterprise Class Wireless LAN?
Introduction Over the last decade Wi-Fi has advanced from a technology offering a maximum 2Mbps over-theair data rate, to 11Mbps and now to 54Mbps. The technology has been improved to include additions
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
Frequency Assignment in Mobile Phone Systems
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment
Intelligent Channel Bonding in 802.11n WLANs
Intelligent Channel Bonding in 82.n WLANs Lara Deek, Eduard Garcia-Villegas, Elizabeth Belding, Sung-Ju Lee, Kevin Almeroth UC Santa Barbara, UPC-BarcelonaTECH, Narus Inc. [email protected], [email protected],
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY
MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY Sunil Kumar 1, Vineet S. Raghavan 2 and Jing Deng 3 1 Electrical and Computer Engineering Department, Clarkson University, Potsdam,
CHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point
Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point Overview To optimize the overall performance of a WLAN in an outdoor deployment it is important to understand how to maximize coverage
Selfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Data Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Mobile Ad Hoc Networks
Mobile Ad Hoc Networks 1 Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network is
