Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability

Size: px
Start display at page:

Download "Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability"

Transcription

1 Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute Abstract In a slow fading environment, the carrier sense range is not constant, so there is not a constant set of hidden terminals for a mobile station. The probability of capture with a set of interferers is not a fixed value either, and it fundamentally affects the loss rate and throughput of the whole network. We estimate the expectation of the capture probability in a single hop ad hoc network and incorporate it with our previously proposed model for 802. DCF that considers the time-varying nature of carrier sensing. The system throughput is then derived from an individual station s point of view. The model is verified against simulations, and extensive numerical experiments are performed to demonstrate its application. I. INTRODUCTION The wireless channel is complicated in nature. Any movement of wireless stations or slight changes in the environment could cause the signal strength to vary around a local mean that is determined by path loss and shadowing. As a result, the reliability to detect the carrier between senders varies over time even if a network s topology remains constant. We studied this issue in a symmetric single hop ad hoc network [] assuming the basic access mechanism of 802. DCF and a block-fading Rayleigh channel. The result is interesting yet not entirely convincing without considering the physical capture effect. We demonstrate the complications induced by a timevarying channel from a sender-receiver (S-R) pair s view as in Fig., in which A, A and A are stations competing with S. We draw two disks (not necessarily the same size) around S and R, and we denote PS A as the power received by S from A. The distance between A and S is inversely proportional to PS A, while the distance between A and R is inversely proportional to PR S/P R A, i.e. the signal-to-interference ratio. A competing station is within the disk centered at S if PS A > C, the carrier sense threshold, and it is within the disk centered at R if PR S/P R A > T, the physical capture threshold. Thus if the channel is constant, a competing station stays in one of the regions around an S-R pair, i.e. the hidden, exposed, deferred and don t-care regions. A station in the hidden region can not be detected by S and it would destroy the transmission between the S-R pair should it collide with S. An exposed station unnecessarily inhibits S from transmitting as it cannot prevent the signal of S from capturing R. A station in the deferred region is effectively controlled by the 802. DCF so as to have the minimal chance to collide with S. A station cannot neither be detected nor interfere with the S-R pair Exposed t Exposed S S t A Deferred A A A Deferred R Hidden Hidden A A R Fig.. S-R Centric View of Competing Stations. In a constant channel, all stations remain in a region. In a time-varying channel, a station can be in a region at time t while jumping to another region at time. Observed over a large time window, the position of a competing station follows a probability distribution (not necessarily a bell-shaped one). resides in the don t-care region, i.e. outside of both disks. In a time-varying channel, as all stations are separated by many times the wavelength, the variations of the channel gains between A, S and R are independent, so that a station jumps across the boundaries all the time. Thus as perceived by the S-R pair, the positions of the competing senders are random variables, which, to the best of our knowledge, has not been described mathematically with the physical carrier sense and backoff mechanism of 802. DCF in an ad hoc network. The concept of time-varying carrier sense and capture is briefly mentioned in [2], but the discussion is confined in a wireless LAN, assuming that all interfering frames have a fixed and identical mean power at the receiver, which is not suitable t

2 for ad hoc networks. In other discussions about capture effect in Rayleigh fading channels of IEEE 802. [3] [4] and ALOHA [5] protocols, perfect carrier sense is always assumed, hence the analysis is valid only within a limited area. Previous research on IEEE 802.-based ad hoc networks beyond a carrier sense range is conducted assuming the constant carrier sense capability. A numerical model of network performance in non-fading channel has been thoroughly developed in [6]. In this paper, we provide the first attempt to model the performance of an ad hoc network running on IEEE 802. DCF basic access scheme with considerations of both time-varying carrier sense and capture induced by a block-fading Rayleigh channel. We assume a saturated MAC queue in order to make use of the previous model [], and confine our analysis within a fixed homogenous topology where all senders have the same probability to transmit and the frame error is the same for each S-R pair, so as to avoid further complications in solving nonlinear equations. An iteration algorithm was developed in [7] to find the solutions for heterogenous topologies, but it cannot be readily extended beyond a carrier sense range to accommodate our system equations. Our paper is organized as follows. We present the modifications of system equations from our previous model in Section II and derive system throughput in Section III. In Section IV, we estimate the overall capture probability under a slow Rayleigh fading channel in a symmetrical network. Our model is verified against the simulation results, and we present the related content in Section V along with its application and limitation. Concluding remarks and a brief introduction to our on-going work are summarized in Section VI. II. SYSTEM EQUATIONS We have extended Bianchi s two-dimensional Markov chain [8] to study the probabilistic Carrier Sensing Outage (CSO) [] without capture. We were interested in the combined saturated frame error rate and throughput that can be achieved in a homogeneous single hop network consisting of n slowly moving contending stations with a quasi-stationary topology, given imperfect carrier sensing due to slow Rayleigh fading. For a tagged station, we have the knowledge of carrier sensing outage probabilities α = [α, α 2,..., α n ] between this station and its n contenders. The individual outage probability is calculated as the probability that the sum of the received mean power X i from station i (independent of the path loss and shadowing models) and the power of white noise N is less than the carrier sense threshold C []: α i = P[X i < C N] = e C N X i. Our analysis can be found in []. Here we focus on the results. For a network consisting of n pairs of sender and receiver running 802. DCF with the maximum retry limit m and minimum backoff window W min, given the conditional collision probability p and correct backoff probability q, the channel access probability τ is given by: τ = ( q) 2 /[( q) 2 + ( q) A B W min ], () where A = [ p + (p/2) m+ ]/( p/2), m B = ( p) ( p 2 )i q 2i W min + ( p 2 )m q 2m W min. i=0 If the physical layer capture is not considered, p and q can be determined by τ and the mean carrier sensing outage probability ᾱ respectively: n p = p coll = ( τ) (n ) ( α i ), (2) q = ᾱ[ ( τ) (n ) ]. (3) Equations (), (2) and (3) form a nonlinear system that can be numerically solved to determine the frame loss probability and system throughput given the knowledge of carrier sensing outage probability between the tagged station and all the neighbors α. The physical layer capture effect invalidates Equation (2). We redefine p as the conditional frame error rate and assume that the physical layer capture probability p cap is known. Equation (2) of the nonlinear system shall be replaced by: p = ( p cap ) p coll. (4) Now we have constructed a new nonlinear system to depict the behavior of the basic access mechanism of 802. DCF by Equations (), (4) and (3) with consideration of capture effect and carrier sensing outage. In Section IV, we will estimate the values of p cap, which is dependent on τ. III. SYSTEM THROUGHPUT When the capture effect is considered within one single CS range [7], i.e. every transmission can be detected by all other stations, the whole network is perfectly synchronized and the throughput of the entire network can be calculated once τ and p are determined by the nonlinear system. When hidden terminals are present, an alternative method was proposed to study the throughput of a single station [6] [9]. Our assumptions, however, invalidate both assumptions on time slot synchronization and constant set of hidden terminals. Inspired by the concept of average transmission time [6], we study the throughput from a station s point of view. As we assume a homogenous topology and a fixed frame length, all stations achieve the same numbers of successful and failed transmissions in the long run. Here we define average transmission time E[D] as the average duration between the end of two consecutive transmissions of a station, i.e. the expected time it takes to transmit one frame, no matter if it fails or not. This definition leads to a simple form of the normalized system throughput of a network with n stations whose payload in each frame takes the amount of time T L to transmit: S = n ( p) T L, (5) E[D] where the only unknown is E[D] which can be further decomposed into transmission, backoff and busy-waiting stages. Let

3 us omit the difference between the duration of a successful transmission T s and a failure, because it is not significant unless the data rate is high. Then the duration of transmission stage is always equal to T s. The average slot time spent in backoff is directly related to the frame loss rate p, by which we calculate the probability that the backoff counter is zero τ as follows [8]: τ = 2( 2p) ( 2p)(W + ) + pw( (2p) m ), (6) and the expected number of backoff slots is τ. The complications lie in the duration of the busy-waiting stage, in which the received signal strength is above the CS threshold so that the station refrains from transmitting. Undetected transmissions do not take a part here. The expected number of transmissions that can be sensed is given by i ( α i). The probability that a transmission collides with at least one other transmission with the knowledge of p and p cap can be easily deduced from Equation (4) as p coll = p/( p cap ). We omit collisions that involve more than two stations, so that the number of sensed busy slots are estimated as i ( α i)( p coll 2 ). At last, as we observed that when the carrier sensing is working perfectly, all collisions are perfectly aligned and the alignment is gradually violated as the CSO grows, we multiply + ᾱ to the number of sensed busy slots to accommodate this issue. Thus the average transmission time is calculated as follows: E[D] = ( τ )σ+t s [+( p coll 2 )(+ᾱ) i α i ], (7) where T s = PHY hdr + MAC hdr + T L + SIFS + ACK + DIFS, in which σ is the slot time of 802., PHY hdr and MAC hdr are the length of headers of physical and MAC layers respectively, ACK is the time spent on an ACK frame, SIFS and DIFS are the inter-frame spacings. IV. CAPTURE PROBABILITY ESTIMATION Since it was experimentally justified that several available 802. cards can capture stronger frames even if they are detected later than weaker frames [0], the capture conditions for our analysis and Qualnet implementation are: ) A frame that is weaker than the sensitivity threshold T cap, equal to the carrier sensing threshold as implemented in Qualnet, is not considered as signal. Instead, its power is combined with other types of noise and interference; 2) The strongest frame, whose power is above the sensitivity threshold, involved in a collision is treated as signal. The sum of the power of other frames, no matter how strong it might be, is treated as interference; The power of interference from the interferer i has a local mean X i and it is exponentially distributed due to Rayleigh fading. The combined power of the interference and the constant thermal noise N has a shifted version of exponential distribution: fi+n i (x) = X i e x N X i. (8) The received signal power follows an exponential distribution f S (y) whose mean is Y and the PDF of SINR is calculated as follows: f i Z(z) = 0 xf i I+N(x)f S (xz)dx = [ γ i γ + Y(γ i+z) γi (γ i+z) ]e z γ y, 2 (9) in which γ i = Y X i and γ Y = Y N. Since a frame must be stronger than the carrier sensing threshold to be detected, the effective SINR threshold to capture is T = max(t cap, C/N), and the capture probability is given by: T p i cap = fz i (z)dz = e γ Y + T. (0) γ i T For a strong wireless link, the capture probability can be γ further approximated as i γ. i+t Given a set of K interferers colliding with a tagged station, the PDF of the power of interference has a closed form if all the local mean powers at the intended receiver are distinct []. Even if there are multiple interferers with the same power, we can introduce some minor corrections and apply the following formula: f K I+N(x) = K j=,j i X K 2 i (X i X j) e x N X i. () The distribution of SINR with K interferers is: K fz K (z) = fi+n K (x)dx = X K i fz i (z). (2) X i X j N j=,j i The combined capture probability can be proved to follow a product form [2]: p K cap = K j=,j i T e γ Y X i X j X K i + T γ i = e T γy γ i γ i+t. (3) It is computationally expensive to quantify the probability that each combination of potential interferers collide with the tagged station, so as to calculate the corresponding capture probability of each case. This also requires us to consider the CSO involving multiple stations. Thus we resort to a first-order approximation to cope with the challenge. Let us look at the probability that a specific competing station i is involved in a collision with the tagged station. Note that we do not exclude the cases in which other stations are also involved in that collision. Based on the assumptions about the independence of transmission and CSO, given the channel access probability τ, the probability that the competing station i collides with the tagged station is estimated as: w i = ( τ i )( α i ) = τ i ( α i ) + α i, (4) which is chosen as the weight factor to calculate the overall capture probability. Several important properties are preserved

4 TABLE I PARAMETERS IN QUALNET SIMULATIONS 802. PHY 802.b Data Rate Mbps TX Power 5dBm CS Threshold -89 to -95dBm Retry Limit m 6 W min 32 RTS/CTS Disabled Slot Time σ 20µs SIFS 0µs DIFS 50µs PHY hdr 92µs MAC hdr 224µs ACK 304µs Payload 024bytes Network Radius +d Receiver -d Network Radius P cap m Sim +50m Model m Sim +00m Model m Sim 50m Model 0. 00m Sim 00m Model (a) Capture Probability Sender Fig. 2. Sample Homogeneous Topologies for n = 9 with two transmission directions. in it. First of all, the station that transmits faster has more influence on the capture probability when carrier sensing works. On the other hand, the station that senses the carrier with lower reliability has more chance to collide. With such an approximation, the overall unconditional capture probability in a network with n competing stations is given below and used in our numerical experiments: p cap = e T n γ Y γ w i i γ. (5) i+t Although this estimation does not consider multiple concurrent interferers explicitly, it does produce accurate computational results against simulations. In Section V, we validate our model based on the estimation, before discussing our observations and its application. V. VALIDATION AND APPLICATION A. Topologies and Settings Two sample topologies consisting of 9 contending stations are shown in Fig. 2. All wireless stations are placed on two concentric circles, in which all competing senders occupy one and receivers have the other. The radius of the circle that hosts senders is referred to as the radius of the network. A saturated CBR flow is set up between each S-R pair, which is collinear with the center of the circles. The distance between each S-R pair d is thus the difference of the concentric circle s radii. When the direction of transmission is towards to the center, then d < 0 and vice versa. With the same network radius, the CSO experienced by senders are similar, while the capture capability of the receivers vary with both d and the transmission direction. The topology is designed to enforce the same amount of competition on all the senders and same interference on all the receivers in the long run. We use P loss m Sim m Model m Sim 50m Model m Sim +00m Model m Sim +50m Model Normalized Throughput m Sim +50m Model +00m Sim +00m Model 50m Sim 50m Model 00m Sim 00m Model (b) Frame Loss Rate Fig. 3. (c) Normalized Throughput Model vs. Simulation n = 5, C = static routes to prevent routing oscillation and short routing packets. All nodes move at m/s towards the same direction and maintain the relative distances. We then vary the radius of the network while maintaining a constant d. Five rounds of simulations are conducted for each set of parameters and each round runs over 00 seconds. All shared parameters on IEEE 802. MAC are presented in Table I. B. Numerical vs. Simulation Results The effectiveness of the previous model without capture has been shown in []. This extended version relies on the estimation of the overall capture probability discussed in Section IV. In Qualnet, we tagged each frame with a boolean variable that is set to true only if the overall interference

5 power is greater than the thermal noise power. It allows us to record how many frames are received or lost with and without interference from other stations, so that we can calculate p cap for each round of simulation. It is straightforward to obtain the loss rate of DATA frames, as we observed that the loss rate of ACK frames is less than 2% even in the worst case. The normalized throughput within a specified duration is the ratio between the amount of delivered payload and the raw bit rate of the wireless channel. If there is no capture effect, the normalized throughput is strictly less than. But it can certainly exceed as we enable the capture effect to allow a portion of frames to survive collisions and gradually enlarge the network radius. Its value can be used as a factor of spatial reuse. Here we present the comparison of the overall capture rate, frame loss probability and normalized throughput for 5 competing stations obtained from simulations and our numerical model in Fig. 3a, 3b and 3c respectively. Both transmission directions are included and the distance between a S-R pair is 50 or 00 meters. The results of our model are closely matched with the simulation data, except the 00m case which is still acceptable. Varying the CS threshold from 89dBm to does not alter the statement, which are not shown due to the limited space. C. Observations As the network radius increases, the throughput experiences a three-phase change. In the first phase, all stations can hear each other perfectly and the channel access probability is well controlled to stay low. The boundary of this phase is related to the CS threshold. The higher the threshold, the earlier the network loses synchronization. The performance is dominated by capture effect in this phase, which falls into the same region as the work of Chang et al. [7] except the computation of capture probability. If the capture probability increases significant during the stage, the throughput of the network would obviously benefits. The next stage starts as the stations are losing perfect awareness of the whole network, and the collision probability rises rapidly as the effect of CSO cannot be ignored. If the capture effect has not grown strong enough to compensate the rocketing collision rates, the network is going to suffer significant frame losses. This phenomenon is clearly shown as the network radius ranges from 00 to 50 meters for the 00m cases in Fig. 3c. A high CS threshold leads to fast increasing collision rate that is hard to be kept up with, thus we can expect high loss rate and low throughput. This stage is a missing link out of previous related works and to the best of our knowledge, this paper is the first work that is able to describe it mathematically. Finally, the capture effect goes so strong that most frames survive collisions and the throughput is limited by sensed transmissions. In this stage, the throughput grows linearly and the rate of growth is almost solely determined by the CS threshold. But this time a high threshold leads to more throughput, because senders spend less time to withhold transmissions that should get through even with the interference. A fixed CS threshold is two-bladed. We have to trade the worst case throughput in a dense topology with the spatial reuse factor in a sparse one. This fact holds even if the Rayleigh fading is not considered. One may adjust the transmit power of each station and/or their CS thresholds to balance the two effects. Assuming a static wireless channel, an generic analytical model on the optimal ratio between transmit power and CS threshold was proposed in [3], which was further supplemented by [4], [5] and [6] that considered MAC overhead and multiple data rates. However, the effectiveness of these models and associated algorithms have not been verified in fading channels. We are looking forward to applying our model to the related topics. D. Application A fixed carrier sense threshold might not achieve the best performance at different network radii. However, our model enables us to quickly calculate the normalized throughput of a network with different size and MAC parameters. For instance, we set n = 5, and for each value of C between 89dBm and, we compute the normalized throughput as the network radius increases from 20 to 300 meters. Then at each step of the network radius, the throughput achieved at a different carrier sense threshold is again normalized to the maximum value. Finally, we can look for a threshold that remains competitive throughout the whole range. The results for transmission directions at [ 50, 75, 00] meters are shown in Fig. 4a, 4b and 4c respectively. Simply by inspection, we can identify the carrier sense threshold with the most stable performance for every case. For d = 50m, C = 90dBm or 9dBm guarantees that the throughput never drops under 90% of the best case. For d = 75m, a threshold between 9 and 92dBm can do that. We can t make the same statement for d = 00m, but C = 92dBm guarantees 85% of the maximum throughput. On the other hand, for d = +50, +75, +00m, C = 90dBm is the obvious choice as the throughput remains above 95% of the maximum. Due to the limited space, we only show the graph for d = +00m in Fig. 4d. E. Computational Expense and Limitations The numerical calculation routings are implemented using Matlab and we run both the numerical experiments and Qualnet simulations on a laptop with a Intel Core 2 Duo T5500 (.67GHz) processor. It takes over 7,000 seconds to produce the simulation results in a line in Fig. 4 but less than seconds to compute the capture probability, loss rate and throughput at the same points using our model and have them plotted. That is 0 4 times of speedup. The accuracy of our model is limited by the estimation of capture probability which is not easy when the network begins to lose synchronization due to CSO. The first-order approximation that we used in this paper exhibits good performance unless the wireless link is weak and the interference is strong.

6 A computationally efficient technique has to be developed to generate precise results for wireless links under any conditions. VI. CONCLUSION We considered both slow Rayleigh channel induced issues, i.e. time-varying carrier sensing outage and physical layer capture, in a numerical model of system throughput for a static homogenous wireless network consisting of multiple saturated single hop flows. We gave first order estimations of physical capture probability with multiple Rayleigh interferers. The model is extremely computational efficient and accurate against simulation results, so that we can compute the performance with various settings and find the optimal value of MAC parameters. We are currently working on further enhancement of our estimation of physical capture probability and extending our results to an arbitrary topology. REFERENCES [] J. Sheng and K. S. Vastola, Physical Carrier Sensing Outage in Single Hop IEEE 802. Ad Hoc Networks with Slowly Moving Stations, in Proc. IEEE WCNC 08, [2] Z. Hadzi-Velkov and B. Spasenovski, The influence of flat rayleigh fading channel with hidden terminals and capture over the ieee 802. wlans, in IEEE VTC 0, 200, pp vol.2. [3] J. H. Kim and J. K. Lee, Capture effects of wireless csma/ca protocols in rayleigh and shadow fading channels, IEEE Transactions on Vehicular Technology, vol. 48, no. 4, pp , 999. [4] X. Li and Q.-A. Zeng, Capture effect in the ieee 802. wlans with rayleigh fading, shadowing, and path loss, in IEEE WiMob 06, June 9-2, 2006, pp [5] J. Arnbak and W. van Blitterswijk, Capacity of slotted aloha in rayleighfading channels, IEEE Journal on Selected Areas in Communications, vol. 5, no. 2, pp , Feb 987. [6] K. Medepalli and F. A. Tobagi, Towards performance modeling of ieee 802. based wireless networks: A unified framework and its applications, in Proc. IEEE INFOCOM 06, [7] H. Chang, V. Misra, and D. Rubenstein, A general model and analysis of physical layer capture in 802. networks, in Proc. IEEE INFOCOM 06, [8] G. Bianchi, Performance analysis of the IEEE 802. distributed coordination function, IEEE Journal on Selected Areas in Communications, vol. 8, no. 3, pp , [9] T.-C. Hou, L.-F. Tsao, and H.-C. Liu, Analyzing the throughput of IEEE 802. DCF scheme with hidden nodes, in Proc. IEEE VTC 03, vol. 5, 2003, pp [0] A. Kochut, A. Vasan, A. U. Shankar, and A. Agrawala, Sniffing out the correct physical layer capture model in 802.b, in Proc. IEEE ICNP 04, 2004, pp [] Y. D. Yao and A. U. H. Sheikh, Outage probability analysis for microcell mobile radio systems with cochannel interferers in rician/rayleigh fading environment, Electronics Letters, vol. 26, no. 3, pp , 990. [2] M. Zorzi and S. Pupolin, Optimum transmission ranges in multihop packet radio networks in the presence of fading, IEEE Transactions on Communications, vol. 43, no. 7, pp , Jul 995. [3] J. Zhu, X. Guo, L. L. Yang, W. S. Conner, S. Roy, and M. M. Hazra, Adapting physical carrier sensing to maximize spatial reuse in 802. mesh networks: Research articles, Wirel. Commun. Mob. Comput., vol. 4, no. 8, pp , [4] X. Yang and N. Vaidya, On physical carrier sensing in wireless ad hoc networks, in Proc. IEEE INFOCOM 05, vol. 4, 2005, pp [5] T.-S. Kim, J. C. Hou, and H. Lim, Improving spatial reuse through tuning transmit power, carrier sense threshold, and data rate in multihop wireless networks, in Proc. ACM MobiCom 06, 2006, pp [6] T. Y. Lin and J. C. Hou, Interplay of spatial reuse and SINR-determined data rates in CSMA/CA-based, multi-hop, multi-rate wireless networks, in Proc. IEEE INFOCOM 07, 2007, pp dBm dBm 9dBm dBm 5 94dBm (a) d = 50m 89dBm dBm 9dBm dBm 5 94dBm (b) d = 75m 89dBm dBm 9dBm dBm 5 94dBm (c) d = 00m 89dBm 90dBm 9dBm 5 92dBm 94dBm (d) d = 00m Fig. 4. n = 5

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

On Spatial Reuse and Capture in Ad Hoc Networks

On Spatial Reuse and Capture in Ad Hoc Networks On patial Reuse and Capture in Ad Hoc Networks Naveen anthapuri University of outh Carolina Email: santhapu@cse.sc.edu rihari Nelakuditi University of outh Carolina Email: srihari@cse.sc.edu Romit Roy

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can

More information

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance 1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University

More information

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Effective Carrier Sensing in CSMA Networks under Cumulative Interference Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Soung Chang Liew, Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong Shatin, New

More information

Performance of b/g in the Interference Limited Regime

Performance of b/g in the Interference Limited Regime Performance of 82.11b/g in the Interference Limited Regime Vinay Sridhara Hweechul Shin Stephan Bohacek vsridhar@udel.edu shin@eecis.udel.edu bohacek@udel.edu University of Delaware Department of Electrical

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and

More information

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks 1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac

More information

Capacity and Interference modeling of CSMA/CA networks using SSI point processes

Capacity and Interference modeling of CSMA/CA networks using SSI point processes Capacity and Interference modeling of CSMA/CA networks using SSI point processes Anthony Busson and Guillaume Chelius University Paris-Sud 11 Centre Scientifique d Orsay 9145 Orsay Cedex, France anthony.busson@u-psud.fr

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

Saturation Throughput Analysis for a Wireless Network with Multiple Channels

Saturation Throughput Analysis for a Wireless Network with Multiple Channels Saturation Throughput Analysis for a Wireless Network with Multiple Channels Wiktor Pronobis T-Labs Berlin TU-Berlin A thesis submitted for the degree of Bachelor of Science (B.Sc.) 05.03.2011 ii Contents

More information

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling

More information

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization 1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Wireless Networks Do Not Disturb My Circles

Wireless Networks Do Not Disturb My Circles Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

On Improving Voice Capacity in Infrastructure Networks

On Improving Voice Capacity in Infrastructure Networks On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Fairness Analysis of Physical Layer Capture Effects in IEEE Networks

Fairness Analysis of Physical Layer Capture Effects in IEEE Networks Fairness Analysis of Physical Layer Capture Effects in IEEE 802.11 Networks Yigal Bejerano Bell Labs, Alcatel-Lucent Murray Hill, NJ, USA bej@research.bell-labs.com Hyoung-Gyu Choi Department of Computer

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks

Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks A. Singh, P. Ramanathan and B. Van Veen Department of Electrical and Computer Engineering University of Wisconsin-Madison

More information

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Effective Carrier Sensing in CSMA Networks under Cumulative Interference Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Member, IEEE, Soung Chang Liew, Fellow, IEEE, and Jianwei Huang, Senior Member, IEEE Abstract This paper proposes the

More information

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation 2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation

More information

Limitations, performance and instrumentation of closed-loop feedback based distributed adaptive transmit beamforming in WSNs

Limitations, performance and instrumentation of closed-loop feedback based distributed adaptive transmit beamforming in WSNs Limitations, performance and instrumentation of closed-loop feedback based distributed adaptive transmit beamforming in WSNs Stephan Sigg, Rayan Merched El Masri, Julian Ristau and Michael Beigl Institute

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

A Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks

A Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks A Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks Anna Maria Vegni 1, Gabriele Tamea 2,Tiziano Inzerilli 2 and Roberto Cusani 2 Abstract Vertical handover (VHO)

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Mobile Communications: Technology and QoS

Mobile Communications: Technology and QoS Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH

More information

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex

More information

WIRELESS communications have shifted from bit rates

WIRELESS communications have shifted from bit rates IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas

More information

MIMAC: A Rate Adaptive MAC Protocol for MIMO-based Wireless Networks

MIMAC: A Rate Adaptive MAC Protocol for MIMO-based Wireless Networks MIMAC: A Rate Adaptive MAC Protocol for MIMO-based Wireless Networks UCLA Computer Science Department Technical Report # 040035 December 20, 2004 Gautam Kulkarni Alok Nandan Mario Gerla Mani Srivastava

More information

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract

More information

Combination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control

Combination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control Combination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Virtual MISO Triggers in Wi-Fi-like Networks

Virtual MISO Triggers in Wi-Fi-like Networks Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April, Signal Outage in Fading Channels Thursday, April, Signal Outage in Fading Channels x Power Zero Throughput

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,

More information

CRMA: Collision-Resistant Multiple Access

CRMA: Collision-Resistant Multiple Access CRMA: Collision-Resistant Multiple Access Tianji Li 1,2 Mi Kyung Han 1 Apurv Bhartia 1 Lili Qiu 1 Eric Rozner 1 Yin Zhang 1 Brad Zarikoff 2 The University of Texas at Austin 1, National University of Ireland

More information

Improved Directional Perturbation Algorithm for Collaborative Beamforming

Improved Directional Perturbation Algorithm for Collaborative Beamforming American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved

More information

Generating Function Analysis of Wireless Networks and ARQ Systems

Generating Function Analysis of Wireless Networks and ARQ Systems Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical

More information

THE rapidly growing demand of wireless network services

THE rapidly growing demand of wireless network services 1 Wi-Fi Coexistence with Duty Cycled LTE-U Yimin Pang, Alireza Babaei, Jennifer Andreoli-Fang and Belal Hamzeh arxiv:166.7972v3 [cs.it] 2 Dec 216 Abstract Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U)

More information

Random access on graphs: Capture-or tree evaluation

Random access on graphs: Capture-or tree evaluation Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual

More information

THE wireless local area network (WLAN) has been an

THE wireless local area network (WLAN) has been an IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., OCTOBER 06 2705 Joint Access Point Placement and Channel Assignment for 802. Wireless LANs Xiang Ling and Kwan Lawrence Yeung, Senior Member,

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Dynamic Frequency Hopping in Cellular Fixed Relay Networks

Dynamic Frequency Hopping in Cellular Fixed Relay Networks Dynamic Frequency Hopping in Cellular Fixed Relay Networks Omer Mubarek, Halim Yanikomeroglu Broadband Communications & Wireless Systems Centre Carleton University, Ottawa, Canada {mubarek, halim}@sce.carleton.ca

More information

Effective Carrier Sensing in CSMA Networks under Cumulative Interference

Effective Carrier Sensing in CSMA Networks under Cumulative Interference Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Member, IEEE, Soung Chang Liew, Fellow, IEEE, and Jianwei Huang, Senior Member, IEEE Abstract This paper proposes the

More information

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson

More information

Mesh Networks with Two-Radio Access Points

Mesh Networks with Two-Radio Access Points 802.11 Mesh Networks with Two-Radio Access Points Jing Zhu Sumit Roy jing.z.zhu@intel.com roy@ee.washington.edu Communications Technology Lab Dept. of Electrical Engineering Intel Corporation, 2111 NE

More information

Dynamic Resource Allocation for Multi Source-Destination Relay Networks

Dynamic Resource Allocation for Multi Source-Destination Relay Networks Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Power Controlled Random Access

Power Controlled Random Access 1 Power Controlled Random Access Aditya Dua Department of Electrical Engineering Stanford University Stanford, CA 94305 dua@stanford.edu Abstract The lack of an established infrastructure, and the vagaries

More information

Mobility and Fading: Two Sides of the Same Coin

Mobility and Fading: Two Sides of the Same Coin 1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet

More information

Link Activation with Parallel Interference Cancellation in Multi-hop VANET

Link Activation with Parallel Interference Cancellation in Multi-hop VANET Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de

More information

An Efficient Multi-Slot Transmission Scheme for Bluetooth Systems

An Efficient Multi-Slot Transmission Scheme for Bluetooth Systems An Efficient Multi-Slot Transmission Scheme for Bluetooth Systems Chae Young Lee and Ki Won Sung Dept. of Industrial Engineering, KAIST, 7- Kusung Dong, Yusung Gu, Taejon, Korea {cylee, bestre}@mail.kaist.ac.kr

More information

Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks

Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks Eren Gürses Centre for Quantifiable QoS in Communication Systems Norwegian University of Science and Technology,

More information

Mobile Radio Propagation: Small-Scale Fading and Multi-path

Mobile Radio Propagation: Small-Scale Fading and Multi-path Mobile Radio Propagation: Small-Scale Fading and Multi-path 1 EE/TE 4365, UT Dallas 2 Small-scale Fading Small-scale fading, or simply fading describes the rapid fluctuation of the amplitude of a radio

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information