Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation



Similar documents
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

CSMA/CA. Information Networks p. 1

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

EETS 8316 Wireless Networks Fall 2013

How To Make A Multi-User Communication Efficient

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Adaptive DCF of MAC for VoIP services using IEEE networks

MEDIUM ACCESS CONTROL PROTOCOLS FOR AD-HOC WIRELESS NETWORKS: A SURVEY

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

MAC Algorithms in Wireless Networks

Lecture 17: Wireless Networking"

How To Determine The Capacity Of An B Network

IEEE Ad Hoc Networks: Performance Measurements

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Mac Protocols for Wireless Sensor Networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Selfish MAC Layer Misbehavior in Wireless Networks

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

A Neighborhood Awareness Method for Handoff Assistance in Wireless Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

CS263: Wireless Communications and Sensor Networks

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Halmstad University Post-Print

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

Wireless LAN Services for Hot-Spot

... neither PCF nor CA used in practice

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

THE development of media access control (MAC) protocols

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

other. A B AP wired network

II. IEEE802.11e EDCA OVERVIEW

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

A TCP-like Adaptive Contention Window Scheme for WLAN

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Wiereless LAN

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Chapter 6: Medium Access Control Layer

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

ECE 333: Introduction to Communication Networks Fall 2002

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Throughput Modeling in IEEE WLAN-based Wireless Networks

Duty-Cycle MAC Protocols and Networking Overhaul

Lecture 7 Multiple Access Protocols and Wireless

Energy Optimal Routing Protocol for a Wireless Data Network

Enhancement of VoIP over IEEE WLANs by Adapting Transmitting Interval

Solving the Performance Anomaly Problem Through Packet Aggregation

10. Wireless Networks

SSPC and Data Transfer

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

ECE/CS 372 introduction to computer networks. Lecture 13

WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks

Performance Evaluation of Wired and Wireless Local Area Networks

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Performance Analysis of the IEEE Wireless LAN Standard 1

Multichannel MAC Protocols for Wireless Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Mobile Ad Hoc Networks

How To Analyze The Security On An Ipa Wireless Sensor Network

WIRELESS sensor networking is an emerging technology

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Seamless Congestion Control over Wired and Wireless IEEE Networks

3. TMT for IEEE g Networks

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

SJBIT, Bangalore, KARNATAKA

MDA: An Efficient Directional MAC scheme for Wireless Ad Hoc Networks 1

Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy

Estimation of Interference in Wi-Fi Networks

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

PERFORMANCE ANALYSIS OF THE IEEE BASED ECG MONITORING NETWORK

ECE 428 Computer Networks and Security

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

Handover Management based on the Number of Retries for VoIP on WLANs

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Central Manager: A Solution to Avoid Denial of Service Attacks for Wireless LANs

Can I add a VoIP call?

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Fast Retransmission Mechanism for VoIP in IEEE e wireless LANs

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Experimental Performance Analysis of MAC Multicast in b Networks for VoIP Traffic

Voice Service Support over Cognitive Radio Networks

Transcription:

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea {scs, youngko, jaikim}@ajou.ac.kr Abstract. In the area of wireless mobile communication, minimizing energy consumption as well as maximizing data throughput in medium access control (MAC) layer is a very important research issue. The Distributed Coordination Function (DCF) of IEEE 802.11 provides the power saving mechanism (PSM) that allows nodes to remain silent in doze mode for reducing energy consumption. However, IEEE 802.11 PSM is known to cause unnecessary energy consumption due to the problems of an overhearing, a back-off time delay and possible packet collisions. To overcome these problems, we present a new MAC protocol called for IEEE 802.11 WLANs. In our proposed scheme, the Beyond-ATIM window is divided into a number of time slots, and any node that participates in communication wakes up in its slot times only and other nodes can enter to doze mode during the slot times. can reduce unnecessary energy consumption and idle listening problem in the Beyond-ATIM window. 1 Introduction Recently, there have been lots of attentions on developing energy efficient MAC protocols in wireless networks. These protocols are similar in the sense that they try to turn off their radio transceivers for reducing energy consumption whenever they are not involved in communication. Such a state of turning off is known as sleep or doze state. Neither a transmission nor a reception is allowed when a node stays in this inactive state, resulting in little energy consumption. The IEEE 802.11 DCF (Distributed Coordination Function) standard [9], the dominating WLAN technology today, also incorporates such a power saving mechanism (PSM) that uses awake and doze states. In 802.11 PSM, time is divided into beacon intervals and each node tries to synchronize with its neighbors to ensure that all nodes wake up at the same time. Any node can announce its This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) program, and the Ubiquitous Computing and Network Project (part of the MIC 21st Century Frontier R&D Program). It was also partially supported by grant No. R01-2003-000-10794-0 from Basic Research Program of Korea Science & Engineering Foundation. X. Jia, J. Wu, and Y. He (Eds.): MSN 2005, LNCS 3794, pp. 498 507, 2005. c Springer-Verlag Berlin Heidelberg 2005

Enhanced Power Saving for IEEE 802.11 WLAN 499 pending data information during the period called the announcement traffic indication map (ATIM) window. During the period following ATIM window (we call this period as Beyond-ATIM window), nodes exchanging ATIM and ACK frames in the ATIM window period must remain in an awake state and perform data communication based on Carrier Sense Multiple Access with Coliision Avoidance (CSMA/CA) mechanism, whereas all other nodes go to doze state. We are now arguing that, Beyond-ATIM window in the current 802.11 standard causes energy consumption with the following reasons: Overhearing: A node may receive packets that are not destined for it. Unnecessarily receiving such packets will cause energy consumption. Back-off time: A node in CSMA/CA is required to sense the medium in randomly chosen back-off time duration before sending any packets. During this time, node remains in awake state. Packet collision: If two nodes transmit packets simultaneously, the packets are corrupted and the follow-on retransmission causes more energy consumption. With respect to these problems, we propose a new energy efficient MAC protocol named Slotted Power Saving Mechanism (i.e., ). divides the time of the Beyond-ATIM window period into equal slots of length L. When a node wants to send data packets, it first selects free slots which are not reserved by other nodes during the ATIM window, and then waits unless the slot time is not started in the Beyond-ATIM window. While waiting for its slot time, a node can enter to the doze mode for saving energy. Here, slots are allocated dynamically, and the allocated slot information will be piggybacked into legacy ATIM frame. 2 Related Works Fig. 1 shows the basic PSM in DCF mode. As mentioned earlier, time in DCF is divided into beacon intervals. All nodes try to synchronize with each other by sending beacon frames and wake up at the beginning of every beacon interval. A beacon interval consists of two parts: ATIM window and Beyond-ATIM window. Generally, one ATIM window size is long enough to allow the transmission and retransmission of several ATIM packets [1,5]. In Fig. 1, nodes A, B and C intend to send data packet to node B, A and B respectively. So, during ATIM window, sender nodes announce the traffic information by sending an ATIM packet based on CSMA/CA mechanism (In Fig. 1, CS means the carrier sensing after back-off time). A receiver node replies by sending an ATIM-ACK packet. A successful exchange of ATIM and ATIM-ACK packets between two nodes implies that both nodes continuously maintain awake mode for the data transmission after finishing ATIM window. However, other nodes (e.g., node D) are allowed to enter a doze mode until the next beacon interval. In the normal PSM in IEEE 802.11, ATIM window size as well as a beacon interval is fixed for synchronization between neighbor nodes. However, the fixed ATIM window critically

500 C. Suh, Y.-B. Ko, and J.-H. Kim Fig. 1. The operation of basic PSM in IEEE 802.11 DCF affects on throughput and energy consumption [1]. One of the previous research issues of the PSM IEEE 802.11 is to dynamically adjust the size of ATIM window. [2] proposes a mechanism to dynamically choose an ATIM window size for improving data throughput based on three indications. Generally, most of PSM schemes need the synchronization between neighbors, but it is difficult to achieve in a multi-hop, mobile ad hoc networking environment. However, [3] investigates three power management protocols based on IEEE 802.11 PSM scheme in unsynchronized multi-hop environments. [4] suggests three schemes for reducing the energy consumption in listening (1) by carrier sensing, (2) by dynamically re-size the ATIM window and (3) by scheduling wake-up times of sender and receiver based on past traffic patterns. [5] suggests scheme to enter sleep state early without being awake during the whole Beyond-ATIM window as well as to adjust the ATIM window size. [5] is able to reduce more energy consumption than normal PSM of IEEE 802.11 DCF, but it has some weakness that several nodes have to wait until other nodes finish data transmission despite of not participating in the communication and it has the hidden terminal problem in multi-hop environments. 3 Proposed Scheme 3.1 The Operation of In our proposed scheme, we extend the Beyond-ATIM window to be divided into fixed time slots such that nodes can effectively use them for conserving energy. As each node bearing traffic reserves the time slot during ATIM-window period, it can exactly know when it needs to wake up for data communication. One whose slot has not yet arrived remains in the sleep state conserving additional energy. The operation of the mode is explained in detail by the following steps: Atthestartingofanewbeaconinterval,anodehavingdatapacketstosend make a slot reservation. We perform this slot reservation as soon as back-off time is over and a node verifies that the wireless medium is free. After this,

Enhanced Power Saving for IEEE 802.11 WLAN 501 Fig. 2. The operation of node transmits the ATIM packet piggybacked with the proposed list of slots required for the data transmission during the Beyond-ATIM window. To avoid overlapping during slot reservation, all nodes maintain the slot table that is updated every time the ATIM or ATIM-ACK is received. Slot table provides the information to the node about whether the slot is free or not. Note that, sender selects the slot based on amount of data traffic and the available slot table information. Actual slot reservation is performed after sender transmits the ATIM packet with proposed slot list to the target node as mentioned in the previous step. Here, we explain two different methods for reserving slots: (1) senderinitiated and (2) receiver-initiated. In (1), the slots for future data transmission are reserved by the sender side, which are same slots in the proposed slot list. However, it is possible that the same slots are already occupied by another sender(s) in the receiver. In this case, the receiver replies with ATIM- RE packet with free slot list to the sender. After receiving ATIM-RE packet, sender tries to re-selects the slots from the receiver s free slots and immediately sends a new ATIM packet. In (2), slots are reserved at the receiver side. Sender transmits ATIM packet with free slot list (proposed slot list) to the receiver. The receiver then chooses the appropriate slot by considering its slot table and sender s free slot list. After this, it replies the ATIM-ACK with the selected slots back to sender. In this case, nodes around the sender may not receive the ATIM-ACK and may remain unaware of the used slots. Therefore, after receiving ATIM-ACK, senders need to send another packet for announcing the occupied slots. Since this can cause more overhead, we have used the first method for slot reservation in our implementation. After the ATIM window phase is over, each sender transmits data according to the reserved slots. Other nodes maintain doze state and only wake up at the beginning of their slots. With the starting of the new beacon interval, all slots are reset and each node tries to reserve new slots for further data transmission. Fig. 2 illustrates our scheme ((1) sender-initiated). Each node selects its slots for future data transmission based on its empty slot table. Slot 1 and 2 are reserved by node A for sending its data to node B. Slot 3, 4 and 5 are reserved by node B for its data transmission. So both nodes will have to maintain awake

502 C. Suh, Y.-B. Ko, and J.-H. Kim state from slot 1 to 5. After slot 5, node A enters to doze state but node B still maintain awake state to receive data from node C at slot 6, 7 and 8. Hence, we see that any node without a reserved slot or after completing its data communication may go into sleep state conserving energy. Moreover, the possibility of collision is reduced as the packets are sent only in the reserved slot. Reduction in collision leads to increase in data throughput. Therefore, using our scheme, we expect to not only save energy but also increase throughput. 3.2 Collision, Hidden Terminal Problem and Synchronization in In order to avoid a data packet collision by newly joined nodes, a sender in slotted-psm waits for the SIFS time interval before transmitting its data. Nevertheless, the data collision problem in the Beyond-ATIM window continuously remains due to long range of carrier sensing [10] or interference from other devices. If the nodes do not finish the communication in their reserved slot time, they uses remaining slot time (refer to Fig.2). The remaining slot time is some extra time in the Beyond-ATIM window after all reserved slots become over. Any data communication that occurs in this time is based on CSMA/CA mechanism. Additionally, our scheme also prohibits the hidden terminal problem during data communication in the Beyond-ATIM window phase. In IEEE 802.11 and other related protocols this problem is handled by RTS/CTS mechanism. In Slotted- PSM, since sender knows the reserved slot information of other senders through ATIM/ATIM-ACK packets and simultaneous data transmission never occurs, it avoids the hidden terminal problem without the overhead of RTS/CTS exchanging. Finally we have assumed that the synchronization is achieved through beacon packet or out-of-band solutions such as GPS [12]. All nodes wake up at the same time for exchanging the ATIM and ATIM-ACK packets. If out-of-band solution is used, synchronization is perfect and there will be no other overhead. However, by using beacon packet solution, a perfect synchronization is not guaranteed in multi-hop environments. To improve the performance, our scheme has to be combined with some synchronization mechanism. However, developing a scheme for synchronization is outside the scope of this paper. 3.3 Energy Saving Analysis Since the primary goal of our scheme is to reduce energy consumption as compared to the IEEE 802.11 PSM, we present the mathematical analysis on saving energy. We can express the total energy consumed by a node for a beacon interval T as equation (1). E node = E AT IM + E BeyondATIM (1) E AT IM and E BeyondATIM mean the energy consumption during the ATIM window and Beyond-ATIM window period. Equation (2) shows the energy consumption during the ATIM window in more detail. In this equation, E beacon is

Enhanced Power Saving for IEEE 802.11 WLAN 503 the energy consumed while transmitting or receiving beacon packet and E ctrlpkt is a combination of the transmitted and received power for exchanging ATIM and ATIM-ACK packets. During the remaining ATIM window (T AT IM -T beacon -T ctrlpkt ), a node stays in the idle mode and consumes P idle energy. In the ATIM window, the operations for both and basic PSM are the same, and its equation is expressed to E AT IM = E beacon + E ctrlpkt + P idle (T AT IM T beacon T ctrlpkt ) (2) Equation (3) is only valid for the nodes that do not perform data communication during the Beyond ATIM-window. Here, T Beyond is the time interval for the Beyond-ATIM window. sleep node EBeyond = P sleep T Beyond (3) In the Beyond-ATIM window, both schemes have different operations and accordingly different energy consumption. Basic PSM s energy consumption is given by (4). In this equation, P rx and P tx mean the energy for transmitting and receiving data packets. T rx data and T tx data are times required for receiving and transmitting. During the remaining Beyond-ATIM window (T Beyond -T rx data -T tx data ), a node stays in the idle mode and consumes P idle energy. E Basic Beyond = P rx T rx data + P tx T tx data + P idle (T Beyond T rx data T tx data ) (4) Equation (5) shows the energy consumption of in the Beyond- ATIM window. For simplifying analysis, we omit the benefit of our scheme such as eliminating RTS/CTS overhead and back-off time in T rx data and T tx data. The main difference between (4) and (5) is that s node stays in the idle mode during only T idle slot and then it can stay in sleep mode during the rest time except in T idle slot,t rx data and T tx data. E Slotted Beyond = P rx T rx data + P tx T tx data + P idle T idle slot + P sleep (T Beyond T rx data T tx data T idle slot ) (5) T idle slot means the remained times except to T rx data or T tx data in reserved slots, which is expressed in (6). In this equation, T one slot is the length of a slot. In Slotted-ATIM, communication nodes try to reserve the enough slots for transmitting data packets. Therefore, generally, transmission time may be not fixed with reserved slot times. In this case, T idle slot is generated. Trx data T idle slot =( T one slot T rx data ) T one slot Ttx data +( T one slot T tx data ) (6) T one slot The benefit in terms of energy obtained by using is the difference between (4) and (5). By ignoring the minute power of the sleep state

504 C. Suh, Y.-B. Ko, and J.-H. Kim because its energy consumption is much smaller than Tx state or Rx state, we can approximate the benefit of as (7): E node = E Basic node ESlotted node = E Basic Beyond ESlotted Beyond = P idle (T Beyond T rx data T tx data ) P idle T idle slot P sleep (T Beyond T rx data T tx data T idle slot ) P idle (T Beyond T rx data T tx data ) P idle T idle slot (7) If T one slot can divide T rx data and T tx data without remainder, T idle slot becomes zero in (6). In this case, the performance of is highest and equation (7) can be described to (8). Max( E node )=P idle (T Beyond T rx data T tx data ) (8) Eventually, the maximum energy benefit of comparing to basic PSM can be defined as P idle (T Beyond -T rx data -T tx data ). Hence, our scheme shows the significant energy conservation which is crucial for the wireless mobile devices that are operated using limited power sources. 4 Performance Evaluations 4.1 Simulation Environments In our simulation, we modified the CMU extended version of ns-2 [11]. We have assumed the maximum bit rate of 1Mbps, the transmission range for each node to be approximately 250m and packet size fixed at 512 bytes. For calculating energy consumption of two protocols, we use 1.65W, 1.4W and 0.045W as value of power consumed by the MAC layer while transmitting, receiving and in doze state [8]. We have set beacon interval to 100ms and ATIM window to 20ms as in [2, 4]. We fix the ATIM window size and have not considered adjusting the size of ATIM window scheme. Each simulation is performed for 50 seconds in a wireless LAN environment, in which all nodes are within each other s transmission range and every source node can reach its destination in a single hop. Analysis of the performance evaluation is for the two scenarios. In the first scenario, data traffic is changed from high traffic to low traffic in 16 nodes. In the second scenario, we focus on throughput of both protocols in the high data traffic given 30 nodes. Both scenarios are for the wireless LAN environment [2,4]. Half of the nodes are sources and rests are destinations. One of the important issues in our scheme is to decide the optimal size of a slot. If the size of a slot is larger than the period for DATA/ACK transmission, it causes unnecessary time after data transmission is finished within the reserved slot. Otherwise, if the size of a slot is small, many number of slots causes the problems such as complexity of slot scheduling and large size of ATIM packet. Fig. 3 shows the average energy consumption of with the increasing slot size in various message inter-arrival times. The message inter-arrival time affects amount of data traffic in the simulation. As shown in Fig. 3, a reasonable slot size for is 2.6ms. Therefore, the comparison of our scheme with is performed with slot size equal to 2.6ms.

Enhanced Power Saving for IEEE 802.11 WLAN 505 24 Average Energy Consumption (W) 23 22 21 20 Message Inter-arrival 0.1 Message Inter-arrival 0.3 Message Inter-arrival 0.5 Message Inter-arrival 0.8 19 18 0.5 1 1.5 2 2.6 4 5 8 10 Slot Size of (ms) Fig. 3. Average energy consumption according to the slot size 4.2 Simulation Results Fig. 4(a) shows the total energy consumption as the message inter-arrival period is increased. According to the graph, consumes less energy than other protocol as the network load is increased. The reason is that, does not spend the unnecessary energy consumption for data transmission, but the basic PSM consumes more energy due to overhearing, waiting for back-off time and packet collisions. Therefore, the energy saving performance of Slotted- PSM is better in situation where data packets are frequently transmitted. Fig. 4(b) shows the total number of packets (i.e. Beacon, ATIM, ATIM-ACK, RTS, CTS, DATA and ACK) which are generated during simulation time. In our scheme, when data packet is transmitted in reserved slots, RTS and CTS packets are not necessary (we mentioned this fact in the section 3). So RTS or CTS packet is not sent and counted in. Therefore, total number of packets of our proposed scheme is smaller than that of. Fig. 4(c) shows the total number of retransmission by packet collision and loss. Our scheme can reduce the data collision in Beyond-ATIM window because each node should try to transmit its data packet only in its reserved slot time. Therefore, total retransmissions in are counted smaller than. 800 8000 120 700 7000 100 600 6000 Total Energy Consumption (W) 500 400 300 200 Total number of packets 5000 4000 3000 2000 Total number of retransmission 80 60 40 100 1000 20 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 (a) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 (b) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 (c) Fig. 4. Comparison of to Basic with a variation of traffic loads :(a)total Energy Consumption, (b)total number of packets and (c)total number of retransmission

506 C. Suh, Y.-B. Ko, and J.-H. Kim 60 58 Aggregate Throughput (Kbytes/s) 56 54 52 50 48 46 44 42 40 0.1 0.11 0.12 0.13 0.14 0.15 Fig. 5. Aggregate throughput (Kbytes/s) in the high data traffics 75 24000 700 65 22000 600 Average Energy Consumption (W) 55 45 35 25 Total number of packets 20000 18000 16000 14000 12000 Total number of retransmission 500 400 300 200 15 10000 100 5 0.1 0.11 0.12 0.13 0.14 0.15 (a) 8000 0.1 0.11 0.12 0.13 0.14 0.15 (b) 0 0.1 0.11 0.12 0.13 0.14 0.15 (c) Fig. 6. Comparison of to Basic in the high data traffics :(a)total Energy Consumption, (b)total number of packets and (c)total number of retransmission Fig. 5 and 6 are the results of the second scenario in the high data traffic environments (30 nodes). In this scenario, we focus more on the analyzing the aggregate throughput of both protocols. As mentioned above, our scheme can reduce the RTS/CTS overhead and the data collision problem. These characteristics may lead to increase of data throughput. Fig. 5 shows the aggregate throughput (Kbytes/s) of both protocols, and the result shows that the aggregate throughput of is larger than. The throughput performance of is better in situation where data packets are frequently transmitted because high data traffic causes lots of RTS/CTS overhead and packet collision in. Other Fig. 6 shows the results of energy consumption, total number of packets and total number of retransmission in the high traffics environment. Through these figures, our proposed scheme can expect to not only save energy but also increase throughput more than. 5 Conclusions In this paper, we proposed the energy efficient slot based MAC protocol for IEEE 802.11 wireless LANs, named the (Slotted Power Saving Mechanism). To solve the problem of unnecessary energy consumption due to

Enhanced Power Saving for IEEE 802.11 WLAN 507 CSMA/CA scheme, divides Beyond-ATIM window into several slots, and allows the node which participates in communication wakes up only in its slot times. We believe that our scheme can effectively save the energy of communication as well as increase data throughput. We verified our scheme s effectiveness by performance evaluation, and made very positive results of saving 70% energy in our compared to the IEEE 802.11 PSM. References 1. H. Woesner, J.-P., Ebert, M. Schlager, and A. Wolisz, Power-Saving Mechanism in Emerging Standards for Wireless LANs: The MAC Level Perspective, in IEEE Personal Communications, June 1998. 2. E.-S. Jung and N. H. Vaidya, An Energy Efficient MAC Protocol for Wireless LANs, in IEEE INFOCOM 02, June 2002. 3. Y.-C. Tseng, C.-S. Hsu, and T.-Y. Hsieh, Power-Saving Protocols for IEEE 802.11- Based Multi-Hop Ad Hoc Networks, in IEEE INFOCOM 02, June 2002. 4. M. J. Miller and N. H. Vaidya, Improving Power Save Protocols Using Carrier Sensing and Dynamic Advertisement Window, Technical Report, University of Illinois at Urbana-Champaign, Dec. 2004. 5. S.-L. Wu and P.-C. Tseng, An Energy Efficient MAC Protocol for IEEE 802.11 WLANs, in IEEE CNSR 04, May 2004. 6. E.-S. Jung and N. H. Vaidya, A Power Control MAC Protocol for Ad Hoc Networks, in ACM MOBICOM 02, June 2002. 7. J-. So and N. H. Vaidya, Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver, in ACM MOBI- HOC 04, May 2004. 8. M. Stemm and R. H. Katz, Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices, in IEICE Transactions on Communications, special Issue on Mobile Computing, 1997. 9. IEEE Std 802.11-1999, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. LAN/MAN Standards Committee of the IEEE Computer Society, IEEE, November 1999. 10. J.-M. Choi, J-. So and Y.-B. Ko, Numerical Analysis of IEEE 802.11 Broadcast scheme in Multihop Wireless Ad Hoc Networks, in ICOIN 05, Feb. 2005. 11. The CMU Monarch Project, The CMU Monarch Project s Wireless and Mobility Extensions to NS. 12. I.A. Getting, The Global Positioning System, in IEEE Spectrum 30, Dec. 1993.