Improved Performance of Enhanced Receiver Initiated Packet Train (E-RIPT) for Underwater Acoustic Networks
|
|
- Osborne Williams
- 5 years ago
- Views:
Transcription
1 Improved Performance of Enhanced Receiver Initiated Packet Train (E-RIPT) for Underwater Acoustic Networks Nuttarit Leelapisut 1, Nitthita Chirdchoo 3, Teerawat Issariyakul 2, Lunchakorn Wuttisittikulkij 1 Department of Electrical Engineering,Chulalongkorn University 1, TOT Public Company Limited 2 ensor Network and Embedded ystem Research Unit,Nakhon Pathom Rajabhat University 3 1
2 Outline Introduction Protocol Design imulation & Results Conclusion 2
3 Introduction Why Underwater? The ocean covers 71% of the Earth's surface and contains 97% of the planet's water. More than 95% of the underwater world remains unexplored. Examples of Application in underwater Detect polluting chemical and biological substances Monitor oceanic wind and current Tsunami warning 3
4 Introduction What is the difference between terrestrial and underwater wireless networks? Terrestrial networks use radio wave but underwater use acoustic waves. Limit bandwidth Long propagation delay. Limited energy Examples of MAC in UAN MACA-U, RIPT, E-RIPT, MACA-APT 4
5 RIPT RIPT was proposed by Chirdchoo et al.(2008) is handshaking with Receiver-Initiated protocol. use packet-train that can send more than one DATA packet in each handshake round. 5
6 E-RIPT E-RIPT (2014) Use slot for reservation packet. Receive information before assign DATA slot. 6
7 ME-RIPT Dmax D t Firstslot t busy max D max Dmax B t out,b Handshake Period Data Reception REV REV-ACK ORDER Broadcasted NTF1 NTF2 DATA DATA Guard time (if necessary) ME-RIPT stands for Modify Enhanced Receiver- Initiated Packet Train Remove unnecessary control packet to alleviates exposed node problems of E-RIPT 7
8 ME-RIPT and E-RIPT ME-RIPT B Dmax D t Firstslot t busy max D max Dmax t out,b Handshake Period Data Reception E-RIPT t0 B O Dmax REV REV-ACK ORDER t NTF1 D t t Firstslot busy max REV REV-ACK ORDER Broadcasted NTF1 NTF2 DATA DATA tntf2 t t D rx,bstart out1 max Broadcasted NTF1 NTF2 DATA DATA Guard time (if necessary) Guard time (if necessary) t out,b 8
9 Node state RIPT, E-RIPT ME-RIPT 9
10 imulation Model The open source simulator N-3 version is deployed with UAN module. Network topology has 196 nodes, only data of 36 nodes in the center of network topology are collected
11 Throughput per node Normalized throughput per node RIPT M max E-RIPT M max E-RIPT M max = 50 MACA-U ME-RIPT M max ME-RIPT M max = Offered load per node 11
12 Delay Delay (s/packet) RIPT M max E-RIPT M max E-RIPT M max = 50 MACA-U ME-RIPT M max ME-RIPT M max = Offered load per node 12
13 Fairness (D of No. of transmission) tandard Division of Number transmission packets RIPT M max E-RIPT M max E-RIPT M max = 50 MACA-U ME-RIPT M max ME-RIPT M max = Offered load per node 13
14 Conclusion ME-RIPT alleviates exposed node problems that its predecessors RIPT and E-RIPT experience. The simulation results show the improvement in throughput, delay, and fairness. 14
15 Q & A 15
16 Thank you 16
Achieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationA Practical TDMA Protocol for Underwater Acoustic Networks Based on Relative Clock
A Practical DMA Protocol for Underwater Acoustic Networks Based on Relative Clock Jiarong Zhang, Can Wang, and Gang Qiao National Laboratory of Underwater Acoustic echnology, Harbin Engineering University,
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. E3 Error and flow control
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione E3 Error and flow control Exercise 1 o o Consider a satellite channel with a rate of 1 Mb/s. Assuming that the propagation delay
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationMedium Access Control Protocol for WBANS
Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee
More informationInternational Journal Of Engineering Research & Management Technology
International Journal Of Engineering Research Email: editor@ijermt.org & Management Technology Volume-1, Issue-2 Underwater Energy Efficient Wireless Voice Transfer and Tsunami Detection System B.Navya,
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationLow Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness
Low Spreading Loss in Underwater Acoustic Networks Reduces RTS/CTS Effectiveness Jim Partan 1,2, Jim Kurose 1, Brian Neil Levine 1, and James Preisig 2 1 Dept. of Computer Science, University of Massachusetts
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationCross Layer Design for Localization in Large-Scale Underwater Sensor Networks
Sensors & Transducers, Vol. 64, Issue 2, February 204, pp. 49-54 Sensors & Transducers 204 by IFSA Publishing, S. L. http://www.sensorsportal.com Cross Layer Design for Localization in Large-Scale Underwater
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 Special 10(14): pages 92-96 Open Access Journal Performance Analysis
More informationOn the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study
On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study Beatrice Tomasi, Prof. James C. Preisig, Prof. Michele Zorzi Objectives and motivations Underwater
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationEngineering Project Proposals
Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationOn Spatial Reuse and Capture in Ad Hoc Networks
On patial Reuse and Capture in Ad Hoc Networks Naveen anthapuri University of outh Carolina Email: santhapu@cse.sc.edu rihari Nelakuditi University of outh Carolina Email: srihari@cse.sc.edu Romit Roy
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationSMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.
SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationfor Vehicular Ad Hoc Networks
Distributed Fair Transmit Power Adjustment for Vehicular Ad Hoc Networks Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 06) Reston, VA,
More informationWireless replacement for cables in CAN Network Pros and Cons. by Derek Sum
Wireless replacement for cables in CAN Network Pros and Cons by Derek Sum TABLE OF CONTENT - Introduction - Concept of wireless cable replacement - Wireless CAN cable hardware - Real time performance and
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationEnergy Optimization with Delay Constraints in Underwater Acoustic Networks
Energy Optimization with Delay Constraints in Underwater Acoustic Networks Poongovan Ponnavaikko, Kamal Yassin arah Kate Wilson, Milica Stojanovic, JoAnne Holliday Dept. of Electrical Engineering, Dept.
More informationNetwork Dimensionality Estimation of Wireless Sensor Network Using Cross Correlation Function
American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-5, pp-245-249 www.ajer.org Research Paper Open Access Network Dimensionality Estimation of Wireless
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationA CDMA-Based Medium Access Control for Underwater Acoustic Sensor Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., APRIL 2009 1899 A CDMA-Based Medium Access Control for Underwater Acoustic Sensor Networks Dario Pompili, Member, IEEE, Tommaso Melodia, Member,
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationChannel Sharing for Underwater Acoustic Networks. Borja M. Peleato-Iñarrea Advisor: Milica Stojanovic
Channel Sharing for Underwater Acoustic Networks. Borja M. Peleato-Iñarrea Advisor: Milica Stojanovic January 15, 2007 Abstract This thesis proposes two channel sharing protocols for cellular and ad-hoc
More informationRaveon Technologies Corporation iot.raveon.com
RTK Communications with Raveon LoRa Radios August 2016 Raveon Technologies Corporation 2461 Impala Drive Carlsbad, CA 92010 USA +1-760-444-5995 Raveon Technologies Corporation www.raveon.com www.ravtrack.com
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li Heilongjiang University Georgia State University Outline Introduction Protocols Design Theoretical Analysis Performance Evaluation Conclusions
More informationInterference Management for Medium Access Control in CDMA Underwater Acoustic Sensor Networks
Interference Management for Medium Access Control in CMA Underwater Acoustic Sensor Networks Hwee-Pink Tan, Colman O Sullivan and Winston K. G. Seah Center for Telecommunications Value-chain Research,
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationDynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications
IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationA MAC Interaction Aware Routing Metric in Wireless Networks
A MAC Interaction Aware Routing Metric in Wireless Networks Saquib Razak 1 Vinay Kolar 1 Nael Abu-Ghazaleh 1,2 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Computer
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationModeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University
Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless
More informationEnergy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas
Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Anique Akhtar Department of Electrical Engineering aakhtar13@ku.edu.tr Buket Yuksel Department
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationPolitecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone
Politecnico di Milano Facoltà di Ingegneria dell Informazione 3 Basic concepts Wireless Networks Prof. Antonio Capone Wireless Networks Wireless or wired, what is better? Well, it depends on the situation!
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationMASTER THESIS. TITLE: Desenvolupament, proves de camp i anàlisi de resultats en una xarxa de sensors
MASTER THESIS TITLE: Desenvolupament, proves de camp i anàlisi de resultats en una xarxa de sensors MASTER DEGREE: Master in Science in Telecommunication Engineering & Management AUTHOR: Antonio Mansilla
More informationQuick Introduction to Communication Systems
Quick Introduction to Communication Systems p. 1/26 Quick Introduction to Communication Systems Aly I. El-Osery, Ph.D. elosery@ee.nmt.edu Department of Electrical Engineering New Mexico Institute of Mining
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationSmart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005
Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas
More informationStochastic Modelling for Wireless Communication Networks-Multiple Access Methods.
Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:
More informationMeasurement Driven Deployment of a Two-Tier Urban Mesh Access Network
Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network J. Camp, J. Robinson, C. Steger, E. Knightly Rice Networks Group MobiSys 2006 6/20/06 Two-Tier Mesh Architecture Limited Gateway Nodes
More informationBattery Efficient Operation of Radio MAC Protocol
September 1991 DOC.: IEEE P802.11/91-102 Battery Efficient Operation of Radio MAC Protocol K. S. Natarajan Chia-Chi Huang IBM Thomas J. Watson Research Center P.O. Box 704, Yorktown Heights, NY 10598 Abstract
More informationLTE Aida Botonjić. Aida Botonjić Tieto 1
LTE Aida Botonjić Aida Botonjić Tieto 1 Why LTE? Applications: Interactive gaming DVD quality video Data download/upload Targets: High data rates at high speed Low latency Packet optimized radio access
More informationLocal Density Estimation for Contention Window Adaptation in Vehicular Networks
Local Density Estimation for Contention Window Adaptation in Vehicular Networks Razvan Stanica, Emmanuel Chaput, André-Luc Beylot University of Toulouse Institut de Recherche en Informatique de Toulouse
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationNotations. Background
Modeling Interplanetary Communications after Telecommunication Networks, With Layering and Dynamic Satellite Management Examiner Jeffrey Nickerson, USPTO Abstract: Interplanetary communications can be
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationTHE use of sensor fields to monitor phenomena in underwater
Communication Protocols for Underwater Data Collection using a Robotic ensor Network Geoffrey A. Hollinger, Member, IEEE, unav Choudhary, tudent Member, IEEE, Parastoo Qarabaqi, tudent Member, IEEE, Christopher
More informationTERAPOD. Terahertz based Ultra High Bandwidth Wireless Access Networks
TERAPOD Terahertz based Ultra High Bandwidth Wireless Access Networks To investigate and demonstrate the feasibility of ultra high bandwidth wireless access networks operating in the Terahertz (THz) band.
More informationMulti-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation
More informationLecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationDesign and Implementation of Short Range Underwater Acoustic Communication Channel using UNET
Design and Implementation of Short Range Underwater Acoustic Communication Channel using UNET Pramod Bharadwaj N Harish Muralidhara Dr. Sujatha B.R. Software Engineer Design Engineer Associate Professor
More informationWUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol
WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol S. Mahlknecht, M. Spinola Durante Institute of Computer Technology Vienna University of Technology Vienna, Austria {mahlknecht,spinola}@ict.tuwien.ac.at
More informationConcept of Self-synchronized Automatic Dependent Surveillance using Satellite
ACP WGC7/WP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group-C - 7 th meeting Montreal, Canada 19-23 April 2004 Agenda item : Concept of Self-synchronized Automatic Dependent Surveillance using Satellite
More informationNetworking Devices over White Spaces
Networking Devices over White Spaces Ranveer Chandra Collaborators: Thomas Moscibroda, Rohan Murty, Victor Bahl Goal: Deploy Wireless Network Base Station (BS) Good throughput for all nodes Avoid interfering
More informationOn the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks
On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks Francesco Zorzi, Milica Stojanovic and Michele Zorzi Dipartimento di Ingegneria dell Informazione, Università degli
More informationPart I: Introduction to Wireless Sensor Networks. Alessio Di
Part I: Introduction to Wireless Sensor Networks Alessio Di Mauro Sensors 2 DTU Informatics, Technical University of Denmark Work in Progress: Test-bed at DTU 3 DTU Informatics, Technical
More informationReliable Broadcast of Safety Messages in Vehicular Ad hoc Networks. Farzad Hassanzadeh
Reliable Broadcast of Safety Messages in Vehicular Ad hoc Networks by Farzad Hassanzadeh A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department
More informationCOGNITIVE SPECTRUM ACCESS FOR UNDERWATER ACOUSTIC COMMUNICATIONS
COGNITIVE SPECTRUM ACCESS FOR UNDERWATER ACOUSTIC COMMUNICATIONS N. Baldo, P. Casari and M. Zorzi MITSG 8-53J Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 2139
More informationWireless TDMA Mesh Networks
Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development
More informationEfficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios
Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationEvaluation of the 6TiSCH Network Formation
Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University
More informationETSI work on IoT connectivity: LTN, CSS, Mesh and Others. Josef BERNHARD Fraunhofer IIS
ETSI work on IoT connectivity: LTN, CSS, Mesh and Others Josef BERNHARD Fraunhofer IIS 1 Outline ETSI produces a very large number of standards covering the entire domain of telecommunications and related
More informationINFUSE: A TDMA BASED DATA DISSEMINATION PROTOCOL FOR SENSOR NETWORKS. Sandeep S. Kulkarni and Mahesh Arumugam
INFUSE: A TDMA BASED DATA DISSEMINATION PROTOCOL FOR SENSOR NETWORKS Sandeep S. Kulkarni and Mahesh Arumugam ABSTRACT Computer Science and Engineering Michigan State University, East Lansing, MI 88 Email:
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationComparing MAC Layer Implementations using Contiki-OS
Comparing MAC Layer Implementations using Contiki-OS Shantanoo Desai prepared for: Prof. Dr. Anna Förster Sustainable Communication Networks University of Bremen November 20, 2015 1 Outline Parameters
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationData Communications. Unguided Media Multiplexing
Data Communications Unguided Media Multiplexing Fiber-Optic Cable A fiber-optic cable is made of glass or plastic and transmits signals in the form of light. If a ray of light traveling through one substance
More information