Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability
|
|
- Bridget Norton
- 5 years ago
- Views:
Transcription
1 Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute Abstract In a slow fading environment, the carrier sense range is not constant, so there is not a constant set of hidden terminals for a mobile station. The probability of capture with a set of interferers is not a fixed value either, and it fundamentally affects the loss rate and throughput of the whole network. We estimate the expectation of the capture probability in a single hop ad hoc network and incorporate it with our previously proposed model for 802. DCF that considers the time-varying nature of carrier sensing. The system throughput is then derived from an individual station s point of view. The model is verified against simulations, and extensive numerical experiments are performed to demonstrate its application. I. INTRODUCTION The wireless channel is complicated in nature. Any movement of wireless stations or slight changes in the environment could cause the signal strength to vary around a local mean that is determined by path loss and shadowing. As a result, the reliability to detect the carrier between senders varies over time even if a network s topology remains constant. We studied this issue in a symmetric single hop ad hoc network [] assuming the basic access mechanism of 802. DCF and a block-fading Rayleigh channel. The result is interesting yet not entirely convincing without considering the physical capture effect. We demonstrate the complications induced by a timevarying channel from a sender-receiver (S-R) pair s view as in Fig., in which A, A and A are stations competing with S. We draw two disks (not necessarily the same size) around S and R, and we denote PS A as the power received by S from A. The distance between A and S is inversely proportional to PS A, while the distance between A and R is inversely proportional to PR S/P R A, i.e. the signal-to-interference ratio. A competing station is within the disk centered at S if PS A > C, the carrier sense threshold, and it is within the disk centered at R if PR S/P R A > T, the physical capture threshold. Thus if the channel is constant, a competing station stays in one of the regions around an S-R pair, i.e. the hidden, exposed, deferred and don t-care regions. A station in the hidden region can not be detected by S and it would destroy the transmission between the S-R pair should it collide with S. An exposed station unnecessarily inhibits S from transmitting as it cannot prevent the signal of S from capturing R. A station in the deferred region is effectively controlled by the 802. DCF so as to have the minimal chance to collide with S. A station cannot neither be detected nor interfere with the S-R pair Exposed t Exposed S S t A Deferred A A A Deferred R Hidden Hidden A A R Fig.. S-R Centric View of Competing Stations. In a constant channel, all stations remain in a region. In a time-varying channel, a station can be in a region at time t while jumping to another region at time. Observed over a large time window, the position of a competing station follows a probability distribution (not necessarily a bell-shaped one). resides in the don t-care region, i.e. outside of both disks. In a time-varying channel, as all stations are separated by many times the wavelength, the variations of the channel gains between A, S and R are independent, so that a station jumps across the boundaries all the time. Thus as perceived by the S-R pair, the positions of the competing senders are random variables, which, to the best of our knowledge, has not been described mathematically with the physical carrier sense and backoff mechanism of 802. DCF in an ad hoc network. The concept of time-varying carrier sense and capture is briefly mentioned in [2], but the discussion is confined in a wireless LAN, assuming that all interfering frames have a fixed and identical mean power at the receiver, which is not suitable t
2 for ad hoc networks. In other discussions about capture effect in Rayleigh fading channels of IEEE 802. [3] [4] and ALOHA [5] protocols, perfect carrier sense is always assumed, hence the analysis is valid only within a limited area. Previous research on IEEE 802.-based ad hoc networks beyond a carrier sense range is conducted assuming the constant carrier sense capability. A numerical model of network performance in non-fading channel has been thoroughly developed in [6]. In this paper, we provide the first attempt to model the performance of an ad hoc network running on IEEE 802. DCF basic access scheme with considerations of both time-varying carrier sense and capture induced by a block-fading Rayleigh channel. We assume a saturated MAC queue in order to make use of the previous model [], and confine our analysis within a fixed homogenous topology where all senders have the same probability to transmit and the frame error is the same for each S-R pair, so as to avoid further complications in solving nonlinear equations. An iteration algorithm was developed in [7] to find the solutions for heterogenous topologies, but it cannot be readily extended beyond a carrier sense range to accommodate our system equations. Our paper is organized as follows. We present the modifications of system equations from our previous model in Section II and derive system throughput in Section III. In Section IV, we estimate the overall capture probability under a slow Rayleigh fading channel in a symmetrical network. Our model is verified against the simulation results, and we present the related content in Section V along with its application and limitation. Concluding remarks and a brief introduction to our on-going work are summarized in Section VI. II. SYSTEM EQUATIONS We have extended Bianchi s two-dimensional Markov chain [8] to study the probabilistic Carrier Sensing Outage (CSO) [] without capture. We were interested in the combined saturated frame error rate and throughput that can be achieved in a homogeneous single hop network consisting of n slowly moving contending stations with a quasi-stationary topology, given imperfect carrier sensing due to slow Rayleigh fading. For a tagged station, we have the knowledge of carrier sensing outage probabilities α = [α, α 2,..., α n ] between this station and its n contenders. The individual outage probability is calculated as the probability that the sum of the received mean power X i from station i (independent of the path loss and shadowing models) and the power of white noise N is less than the carrier sense threshold C []: α i = P[X i < C N] = e C N X i. Our analysis can be found in []. Here we focus on the results. For a network consisting of n pairs of sender and receiver running 802. DCF with the maximum retry limit m and minimum backoff window W min, given the conditional collision probability p and correct backoff probability q, the channel access probability τ is given by: τ = ( q) 2 /[( q) 2 + ( q) A B W min ], () where A = [ p + (p/2) m+ ]/( p/2), m B = ( p) ( p 2 )i q 2i W min + ( p 2 )m q 2m W min. i=0 If the physical layer capture is not considered, p and q can be determined by τ and the mean carrier sensing outage probability ᾱ respectively: n p = p coll = ( τ) (n ) ( α i ), (2) q = ᾱ[ ( τ) (n ) ]. (3) Equations (), (2) and (3) form a nonlinear system that can be numerically solved to determine the frame loss probability and system throughput given the knowledge of carrier sensing outage probability between the tagged station and all the neighbors α. The physical layer capture effect invalidates Equation (2). We redefine p as the conditional frame error rate and assume that the physical layer capture probability p cap is known. Equation (2) of the nonlinear system shall be replaced by: p = ( p cap ) p coll. (4) Now we have constructed a new nonlinear system to depict the behavior of the basic access mechanism of 802. DCF by Equations (), (4) and (3) with consideration of capture effect and carrier sensing outage. In Section IV, we will estimate the values of p cap, which is dependent on τ. III. SYSTEM THROUGHPUT When the capture effect is considered within one single CS range [7], i.e. every transmission can be detected by all other stations, the whole network is perfectly synchronized and the throughput of the entire network can be calculated once τ and p are determined by the nonlinear system. When hidden terminals are present, an alternative method was proposed to study the throughput of a single station [6] [9]. Our assumptions, however, invalidate both assumptions on time slot synchronization and constant set of hidden terminals. Inspired by the concept of average transmission time [6], we study the throughput from a station s point of view. As we assume a homogenous topology and a fixed frame length, all stations achieve the same numbers of successful and failed transmissions in the long run. Here we define average transmission time E[D] as the average duration between the end of two consecutive transmissions of a station, i.e. the expected time it takes to transmit one frame, no matter if it fails or not. This definition leads to a simple form of the normalized system throughput of a network with n stations whose payload in each frame takes the amount of time T L to transmit: S = n ( p) T L, (5) E[D] where the only unknown is E[D] which can be further decomposed into transmission, backoff and busy-waiting stages. Let
3 us omit the difference between the duration of a successful transmission T s and a failure, because it is not significant unless the data rate is high. Then the duration of transmission stage is always equal to T s. The average slot time spent in backoff is directly related to the frame loss rate p, by which we calculate the probability that the backoff counter is zero τ as follows [8]: τ = 2( 2p) ( 2p)(W + ) + pw( (2p) m ), (6) and the expected number of backoff slots is τ. The complications lie in the duration of the busy-waiting stage, in which the received signal strength is above the CS threshold so that the station refrains from transmitting. Undetected transmissions do not take a part here. The expected number of transmissions that can be sensed is given by i ( α i). The probability that a transmission collides with at least one other transmission with the knowledge of p and p cap can be easily deduced from Equation (4) as p coll = p/( p cap ). We omit collisions that involve more than two stations, so that the number of sensed busy slots are estimated as i ( α i)( p coll 2 ). At last, as we observed that when the carrier sensing is working perfectly, all collisions are perfectly aligned and the alignment is gradually violated as the CSO grows, we multiply + ᾱ to the number of sensed busy slots to accommodate this issue. Thus the average transmission time is calculated as follows: E[D] = ( τ )σ+t s [+( p coll 2 )(+ᾱ) i α i ], (7) where T s = PHY hdr + MAC hdr + T L + SIFS + ACK + DIFS, in which σ is the slot time of 802., PHY hdr and MAC hdr are the length of headers of physical and MAC layers respectively, ACK is the time spent on an ACK frame, SIFS and DIFS are the inter-frame spacings. IV. CAPTURE PROBABILITY ESTIMATION Since it was experimentally justified that several available 802. cards can capture stronger frames even if they are detected later than weaker frames [0], the capture conditions for our analysis and Qualnet implementation are: ) A frame that is weaker than the sensitivity threshold T cap, equal to the carrier sensing threshold as implemented in Qualnet, is not considered as signal. Instead, its power is combined with other types of noise and interference; 2) The strongest frame, whose power is above the sensitivity threshold, involved in a collision is treated as signal. The sum of the power of other frames, no matter how strong it might be, is treated as interference; The power of interference from the interferer i has a local mean X i and it is exponentially distributed due to Rayleigh fading. The combined power of the interference and the constant thermal noise N has a shifted version of exponential distribution: fi+n i (x) = X i e x N X i. (8) The received signal power follows an exponential distribution f S (y) whose mean is Y and the PDF of SINR is calculated as follows: f i Z(z) = 0 xf i I+N(x)f S (xz)dx = [ γ i γ + Y(γ i+z) γi (γ i+z) ]e z γ y, 2 (9) in which γ i = Y X i and γ Y = Y N. Since a frame must be stronger than the carrier sensing threshold to be detected, the effective SINR threshold to capture is T = max(t cap, C/N), and the capture probability is given by: T p i cap = fz i (z)dz = e γ Y + T. (0) γ i T For a strong wireless link, the capture probability can be γ further approximated as i γ. i+t Given a set of K interferers colliding with a tagged station, the PDF of the power of interference has a closed form if all the local mean powers at the intended receiver are distinct []. Even if there are multiple interferers with the same power, we can introduce some minor corrections and apply the following formula: f K I+N(x) = K j=,j i X K 2 i (X i X j) e x N X i. () The distribution of SINR with K interferers is: K fz K (z) = fi+n K (x)dx = X K i fz i (z). (2) X i X j N j=,j i The combined capture probability can be proved to follow a product form [2]: p K cap = K j=,j i T e γ Y X i X j X K i + T γ i = e T γy γ i γ i+t. (3) It is computationally expensive to quantify the probability that each combination of potential interferers collide with the tagged station, so as to calculate the corresponding capture probability of each case. This also requires us to consider the CSO involving multiple stations. Thus we resort to a first-order approximation to cope with the challenge. Let us look at the probability that a specific competing station i is involved in a collision with the tagged station. Note that we do not exclude the cases in which other stations are also involved in that collision. Based on the assumptions about the independence of transmission and CSO, given the channel access probability τ, the probability that the competing station i collides with the tagged station is estimated as: w i = ( τ i )( α i ) = τ i ( α i ) + α i, (4) which is chosen as the weight factor to calculate the overall capture probability. Several important properties are preserved
4 TABLE I PARAMETERS IN QUALNET SIMULATIONS 802. PHY 802.b Data Rate Mbps TX Power 5dBm CS Threshold -89 to -95dBm Retry Limit m 6 W min 32 RTS/CTS Disabled Slot Time σ 20µs SIFS 0µs DIFS 50µs PHY hdr 92µs MAC hdr 224µs ACK 304µs Payload 024bytes Network Radius +d Receiver -d Network Radius P cap m Sim +50m Model m Sim +00m Model m Sim 50m Model 0. 00m Sim 00m Model (a) Capture Probability Sender Fig. 2. Sample Homogeneous Topologies for n = 9 with two transmission directions. in it. First of all, the station that transmits faster has more influence on the capture probability when carrier sensing works. On the other hand, the station that senses the carrier with lower reliability has more chance to collide. With such an approximation, the overall unconditional capture probability in a network with n competing stations is given below and used in our numerical experiments: p cap = e T n γ Y γ w i i γ. (5) i+t Although this estimation does not consider multiple concurrent interferers explicitly, it does produce accurate computational results against simulations. In Section V, we validate our model based on the estimation, before discussing our observations and its application. V. VALIDATION AND APPLICATION A. Topologies and Settings Two sample topologies consisting of 9 contending stations are shown in Fig. 2. All wireless stations are placed on two concentric circles, in which all competing senders occupy one and receivers have the other. The radius of the circle that hosts senders is referred to as the radius of the network. A saturated CBR flow is set up between each S-R pair, which is collinear with the center of the circles. The distance between each S-R pair d is thus the difference of the concentric circle s radii. When the direction of transmission is towards to the center, then d < 0 and vice versa. With the same network radius, the CSO experienced by senders are similar, while the capture capability of the receivers vary with both d and the transmission direction. The topology is designed to enforce the same amount of competition on all the senders and same interference on all the receivers in the long run. We use P loss m Sim m Model m Sim 50m Model m Sim +00m Model m Sim +50m Model Normalized Throughput m Sim +50m Model +00m Sim +00m Model 50m Sim 50m Model 00m Sim 00m Model (b) Frame Loss Rate Fig. 3. (c) Normalized Throughput Model vs. Simulation n = 5, C = static routes to prevent routing oscillation and short routing packets. All nodes move at m/s towards the same direction and maintain the relative distances. We then vary the radius of the network while maintaining a constant d. Five rounds of simulations are conducted for each set of parameters and each round runs over 00 seconds. All shared parameters on IEEE 802. MAC are presented in Table I. B. Numerical vs. Simulation Results The effectiveness of the previous model without capture has been shown in []. This extended version relies on the estimation of the overall capture probability discussed in Section IV. In Qualnet, we tagged each frame with a boolean variable that is set to true only if the overall interference
5 power is greater than the thermal noise power. It allows us to record how many frames are received or lost with and without interference from other stations, so that we can calculate p cap for each round of simulation. It is straightforward to obtain the loss rate of DATA frames, as we observed that the loss rate of ACK frames is less than 2% even in the worst case. The normalized throughput within a specified duration is the ratio between the amount of delivered payload and the raw bit rate of the wireless channel. If there is no capture effect, the normalized throughput is strictly less than. But it can certainly exceed as we enable the capture effect to allow a portion of frames to survive collisions and gradually enlarge the network radius. Its value can be used as a factor of spatial reuse. Here we present the comparison of the overall capture rate, frame loss probability and normalized throughput for 5 competing stations obtained from simulations and our numerical model in Fig. 3a, 3b and 3c respectively. Both transmission directions are included and the distance between a S-R pair is 50 or 00 meters. The results of our model are closely matched with the simulation data, except the 00m case which is still acceptable. Varying the CS threshold from 89dBm to does not alter the statement, which are not shown due to the limited space. C. Observations As the network radius increases, the throughput experiences a three-phase change. In the first phase, all stations can hear each other perfectly and the channel access probability is well controlled to stay low. The boundary of this phase is related to the CS threshold. The higher the threshold, the earlier the network loses synchronization. The performance is dominated by capture effect in this phase, which falls into the same region as the work of Chang et al. [7] except the computation of capture probability. If the capture probability increases significant during the stage, the throughput of the network would obviously benefits. The next stage starts as the stations are losing perfect awareness of the whole network, and the collision probability rises rapidly as the effect of CSO cannot be ignored. If the capture effect has not grown strong enough to compensate the rocketing collision rates, the network is going to suffer significant frame losses. This phenomenon is clearly shown as the network radius ranges from 00 to 50 meters for the 00m cases in Fig. 3c. A high CS threshold leads to fast increasing collision rate that is hard to be kept up with, thus we can expect high loss rate and low throughput. This stage is a missing link out of previous related works and to the best of our knowledge, this paper is the first work that is able to describe it mathematically. Finally, the capture effect goes so strong that most frames survive collisions and the throughput is limited by sensed transmissions. In this stage, the throughput grows linearly and the rate of growth is almost solely determined by the CS threshold. But this time a high threshold leads to more throughput, because senders spend less time to withhold transmissions that should get through even with the interference. A fixed CS threshold is two-bladed. We have to trade the worst case throughput in a dense topology with the spatial reuse factor in a sparse one. This fact holds even if the Rayleigh fading is not considered. One may adjust the transmit power of each station and/or their CS thresholds to balance the two effects. Assuming a static wireless channel, an generic analytical model on the optimal ratio between transmit power and CS threshold was proposed in [3], which was further supplemented by [4], [5] and [6] that considered MAC overhead and multiple data rates. However, the effectiveness of these models and associated algorithms have not been verified in fading channels. We are looking forward to applying our model to the related topics. D. Application A fixed carrier sense threshold might not achieve the best performance at different network radii. However, our model enables us to quickly calculate the normalized throughput of a network with different size and MAC parameters. For instance, we set n = 5, and for each value of C between 89dBm and, we compute the normalized throughput as the network radius increases from 20 to 300 meters. Then at each step of the network radius, the throughput achieved at a different carrier sense threshold is again normalized to the maximum value. Finally, we can look for a threshold that remains competitive throughout the whole range. The results for transmission directions at [ 50, 75, 00] meters are shown in Fig. 4a, 4b and 4c respectively. Simply by inspection, we can identify the carrier sense threshold with the most stable performance for every case. For d = 50m, C = 90dBm or 9dBm guarantees that the throughput never drops under 90% of the best case. For d = 75m, a threshold between 9 and 92dBm can do that. We can t make the same statement for d = 00m, but C = 92dBm guarantees 85% of the maximum throughput. On the other hand, for d = +50, +75, +00m, C = 90dBm is the obvious choice as the throughput remains above 95% of the maximum. Due to the limited space, we only show the graph for d = +00m in Fig. 4d. E. Computational Expense and Limitations The numerical calculation routings are implemented using Matlab and we run both the numerical experiments and Qualnet simulations on a laptop with a Intel Core 2 Duo T5500 (.67GHz) processor. It takes over 7,000 seconds to produce the simulation results in a line in Fig. 4 but less than seconds to compute the capture probability, loss rate and throughput at the same points using our model and have them plotted. That is 0 4 times of speedup. The accuracy of our model is limited by the estimation of capture probability which is not easy when the network begins to lose synchronization due to CSO. The first-order approximation that we used in this paper exhibits good performance unless the wireless link is weak and the interference is strong.
6 A computationally efficient technique has to be developed to generate precise results for wireless links under any conditions. VI. CONCLUSION We considered both slow Rayleigh channel induced issues, i.e. time-varying carrier sensing outage and physical layer capture, in a numerical model of system throughput for a static homogenous wireless network consisting of multiple saturated single hop flows. We gave first order estimations of physical capture probability with multiple Rayleigh interferers. The model is extremely computational efficient and accurate against simulation results, so that we can compute the performance with various settings and find the optimal value of MAC parameters. We are currently working on further enhancement of our estimation of physical capture probability and extending our results to an arbitrary topology. REFERENCES [] J. Sheng and K. S. Vastola, Physical Carrier Sensing Outage in Single Hop IEEE 802. Ad Hoc Networks with Slowly Moving Stations, in Proc. IEEE WCNC 08, [2] Z. Hadzi-Velkov and B. Spasenovski, The influence of flat rayleigh fading channel with hidden terminals and capture over the ieee 802. wlans, in IEEE VTC 0, 200, pp vol.2. [3] J. H. Kim and J. K. Lee, Capture effects of wireless csma/ca protocols in rayleigh and shadow fading channels, IEEE Transactions on Vehicular Technology, vol. 48, no. 4, pp , 999. [4] X. Li and Q.-A. Zeng, Capture effect in the ieee 802. wlans with rayleigh fading, shadowing, and path loss, in IEEE WiMob 06, June 9-2, 2006, pp [5] J. Arnbak and W. van Blitterswijk, Capacity of slotted aloha in rayleighfading channels, IEEE Journal on Selected Areas in Communications, vol. 5, no. 2, pp , Feb 987. [6] K. Medepalli and F. A. Tobagi, Towards performance modeling of ieee 802. based wireless networks: A unified framework and its applications, in Proc. IEEE INFOCOM 06, [7] H. Chang, V. Misra, and D. Rubenstein, A general model and analysis of physical layer capture in 802. networks, in Proc. IEEE INFOCOM 06, [8] G. Bianchi, Performance analysis of the IEEE 802. distributed coordination function, IEEE Journal on Selected Areas in Communications, vol. 8, no. 3, pp , [9] T.-C. Hou, L.-F. Tsao, and H.-C. Liu, Analyzing the throughput of IEEE 802. DCF scheme with hidden nodes, in Proc. IEEE VTC 03, vol. 5, 2003, pp [0] A. Kochut, A. Vasan, A. U. Shankar, and A. Agrawala, Sniffing out the correct physical layer capture model in 802.b, in Proc. IEEE ICNP 04, 2004, pp [] Y. D. Yao and A. U. H. Sheikh, Outage probability analysis for microcell mobile radio systems with cochannel interferers in rician/rayleigh fading environment, Electronics Letters, vol. 26, no. 3, pp , 990. [2] M. Zorzi and S. Pupolin, Optimum transmission ranges in multihop packet radio networks in the presence of fading, IEEE Transactions on Communications, vol. 43, no. 7, pp , Jul 995. [3] J. Zhu, X. Guo, L. L. Yang, W. S. Conner, S. Roy, and M. M. Hazra, Adapting physical carrier sensing to maximize spatial reuse in 802. mesh networks: Research articles, Wirel. Commun. Mob. Comput., vol. 4, no. 8, pp , [4] X. Yang and N. Vaidya, On physical carrier sensing in wireless ad hoc networks, in Proc. IEEE INFOCOM 05, vol. 4, 2005, pp [5] T.-S. Kim, J. C. Hou, and H. Lim, Improving spatial reuse through tuning transmit power, carrier sense threshold, and data rate in multihop wireless networks, in Proc. ACM MobiCom 06, 2006, pp [6] T. Y. Lin and J. C. Hou, Interplay of spatial reuse and SINR-determined data rates in CSMA/CA-based, multi-hop, multi-rate wireless networks, in Proc. IEEE INFOCOM 07, 2007, pp dBm dBm 9dBm dBm 5 94dBm (a) d = 50m 89dBm dBm 9dBm dBm 5 94dBm (b) d = 75m 89dBm dBm 9dBm dBm 5 94dBm (c) d = 00m 89dBm 90dBm 9dBm 5 92dBm 94dBm (d) d = 00m Fig. 4. n = 5
Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationCalculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme
Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationOn Spatial Reuse and Capture in Ad Hoc Networks
On patial Reuse and Capture in Ad Hoc Networks Naveen anthapuri University of outh Carolina Email: santhapu@cse.sc.edu rihari Nelakuditi University of outh Carolina Email: srihari@cse.sc.edu Romit Roy
More informationPerformance Analysis of Transmissions Opportunity Limit in e WLANs
Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationSPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks
SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can
More informationNon-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks
Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationMIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna
More informationMaximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs
Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationWireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationA MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks
A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University
More informationEffective Carrier Sensing in CSMA Networks under Cumulative Interference
Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Soung Chang Liew, Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong Shatin, New
More informationPerformance of b/g in the Interference Limited Regime
Performance of 82.11b/g in the Interference Limited Regime Vinay Sridhara Hweechul Shin Stephan Bohacek vsridhar@udel.edu shin@eecis.udel.edu bohacek@udel.edu University of Delaware Department of Electrical
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationResearch Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs
Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and
More informationA Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks
1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac
More informationCapacity and Interference modeling of CSMA/CA networks using SSI point processes
Capacity and Interference modeling of CSMA/CA networks using SSI point processes Anthony Busson and Guillaume Chelius University Paris-Sud 11 Centre Scientifique d Orsay 9145 Orsay Cedex, France anthony.busson@u-psud.fr
More informationImproving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques
1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,
More informationSaturation Throughput Analysis for a Wireless Network with Multiple Channels
Saturation Throughput Analysis for a Wireless Network with Multiple Channels Wiktor Pronobis T-Labs Berlin TU-Berlin A thesis submitted for the degree of Bachelor of Science (B.Sc.) 05.03.2011 ii Contents
More informationLiving with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington
Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling
More informationCross-layer Design of MIMO-enabled WLANs with Network Utility Maximization
1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationA Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization
A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationWireless Networks Do Not Disturb My Circles
Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys
More informationUnderstanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks
Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2
More informationMESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS
MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental
More informationUsing Channel Hopping to Increase Resilience to Jamming Attacks
Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University
More informationOn Improving Voice Capacity in Infrastructure Networks
On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationAutomatic power/channel management in Wi-Fi networks
Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance
More informationEnd-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference
End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern
More informationFairness Analysis of Physical Layer Capture Effects in IEEE Networks
Fairness Analysis of Physical Layer Capture Effects in IEEE 802.11 Networks Yigal Bejerano Bell Labs, Alcatel-Lucent Murray Hill, NJ, USA bej@research.bell-labs.com Hyoung-Gyu Choi Department of Computer
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationA new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks
A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationSpatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks
Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks A. Singh, P. Ramanathan and B. Van Veen Department of Electrical and Computer Engineering University of Wisconsin-Madison
More informationEffective Carrier Sensing in CSMA Networks under Cumulative Interference
Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Member, IEEE, Soung Chang Liew, Fellow, IEEE, and Jianwei Huang, Senior Member, IEEE Abstract This paper proposes the
More informationPerformance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation
2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation
More informationLimitations, performance and instrumentation of closed-loop feedback based distributed adaptive transmit beamforming in WSNs
Limitations, performance and instrumentation of closed-loop feedback based distributed adaptive transmit beamforming in WSNs Stephan Sigg, Rayan Merched El Masri, Julian Ristau and Michael Beigl Institute
More informationANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau
ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu
More informationA Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks
A Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks Anna Maria Vegni 1, Gabriele Tamea 2,Tiziano Inzerilli 2 and Roberto Cusani 2 Abstract Vertical handover (VHO)
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationMobile Communications: Technology and QoS
Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH
More informationPower-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks
Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex
More informationWIRELESS communications have shifted from bit rates
IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas
More informationMIMAC: A Rate Adaptive MAC Protocol for MIMO-based Wireless Networks
MIMAC: A Rate Adaptive MAC Protocol for MIMO-based Wireless Networks UCLA Computer Science Department Technical Report # 040035 December 20, 2004 Gautam Kulkarni Alok Nandan Mario Gerla Mani Srivastava
More informationChannel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks
Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationPartial overlapping channels are not damaging
Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationIEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract
More informationCombination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control
Combination of Dynamic-TDD and Static-TDD Based on Adaptive Power Control Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationVirtual MISO Triggers in Wi-Fi-like Networks
Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April, Signal Outage in Fading Channels Thursday, April, Signal Outage in Fading Channels x Power Zero Throughput
More informationCross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment
Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper
More informationDistance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks
Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper
More informationAn Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks
1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationPerformance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes
Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,
More informationCRMA: Collision-Resistant Multiple Access
CRMA: Collision-Resistant Multiple Access Tianji Li 1,2 Mi Kyung Han 1 Apurv Bhartia 1 Lili Qiu 1 Eric Rozner 1 Yin Zhang 1 Brad Zarikoff 2 The University of Texas at Austin 1, National University of Ireland
More informationImproved Directional Perturbation Algorithm for Collaborative Beamforming
American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved
More informationGenerating Function Analysis of Wireless Networks and ARQ Systems
Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical
More informationTHE rapidly growing demand of wireless network services
1 Wi-Fi Coexistence with Duty Cycled LTE-U Yimin Pang, Alireza Babaei, Jennifer Andreoli-Fang and Belal Hamzeh arxiv:166.7972v3 [cs.it] 2 Dec 216 Abstract Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U)
More informationRandom access on graphs: Capture-or tree evaluation
Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual
More informationTHE wireless local area network (WLAN) has been an
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., OCTOBER 06 2705 Joint Access Point Placement and Channel Assignment for 802. Wireless LANs Xiang Ling and Kwan Lawrence Yeung, Senior Member,
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationExercise Data Networks
(due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How
More informationDynamic Frequency Hopping in Cellular Fixed Relay Networks
Dynamic Frequency Hopping in Cellular Fixed Relay Networks Omer Mubarek, Halim Yanikomeroglu Broadband Communications & Wireless Systems Centre Carleton University, Ottawa, Canada {mubarek, halim}@sce.carleton.ca
More informationEffective Carrier Sensing in CSMA Networks under Cumulative Interference
Effective Carrier Sensing in CSMA Networks under Cumulative Interference Liqun Fu, Member, IEEE, Soung Chang Liew, Fellow, IEEE, and Jianwei Huang, Senior Member, IEEE Abstract This paper proposes the
More informationAchieving Temporal Fairness in Multi-Rate WLANs with Capture Effect
Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson
More informationMesh Networks with Two-Radio Access Points
802.11 Mesh Networks with Two-Radio Access Points Jing Zhu Sumit Roy jing.z.zhu@intel.com roy@ee.washington.edu Communications Technology Lab Dept. of Electrical Engineering Intel Corporation, 2111 NE
More informationDynamic Resource Allocation for Multi Source-Destination Relay Networks
Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,
More informationAverage Delay in Asynchronous Visual Light ALOHA Network
Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands
More informationPower Controlled Random Access
1 Power Controlled Random Access Aditya Dua Department of Electrical Engineering Stanford University Stanford, CA 94305 dua@stanford.edu Abstract The lack of an established infrastructure, and the vagaries
More informationMobility and Fading: Two Sides of the Same Coin
1 Mobility and Fading: Two Sides of the Same Coin Zhenhua Gong and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {zgong,mhaenggi}@nd.edu Abstract
More informationDelay Performance Modeling and Analysis in Clustered Cognitive Radio Networks
Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon
More informationThe de facto standard for wireless Internet. Interference Estimation in IEEE Networks
Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet
More informationLink Activation with Parallel Interference Cancellation in Multi-hop VANET
Link Activation with Parallel Interference Cancellation in Multi-hop VANET Meysam Azizian, Soumaya Cherkaoui and Abdelhakim Senhaji Hafid Department of Electrical and Computer Engineering, Université de
More informationAn Efficient Multi-Slot Transmission Scheme for Bluetooth Systems
An Efficient Multi-Slot Transmission Scheme for Bluetooth Systems Chae Young Lee and Ki Won Sung Dept. of Industrial Engineering, KAIST, 7- Kusung Dong, Yusung Gu, Taejon, Korea {cylee, bestre}@mail.kaist.ac.kr
More informationCross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks
Cross-Layer Optimized Congestion, Contention and Power Control in Wireless Ad Hoc Networks Eren Gürses Centre for Quantifiable QoS in Communication Systems Norwegian University of Science and Technology,
More informationMobile Radio Propagation: Small-Scale Fading and Multi-path
Mobile Radio Propagation: Small-Scale Fading and Multi-path 1 EE/TE 4365, UT Dallas 2 Small-scale Fading Small-scale fading, or simply fading describes the rapid fluctuation of the amplitude of a radio
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More information