Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks
|
|
- Brooke Walsh
- 6 years ago
- Views:
Transcription
1 Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University, Chiba, Japan Abstract This paper presents first-step analytical expressions of non-saturated and saturated throughput for IEEE 80.e Enhanced Distributed Channel Access (EDCA) multi-hop string-topology networks. Internal collisions in each node, concurrent transmission collisions among nodes, differences of CW min and CW max among access categories (ACs), and effects of contention zone are considered. By comparisons with simulation results, the validities of analytical expressions are confirmed. Keywords IEEE 80.e multi-hop networks, throughput analysis, non-saturated throughput, saturated throughput, internal collision, contention zone. I. Introduction The IEEE 80. has become ubiquitous and gains widespread popularity for wireless multi-hop networks. The basic Medium Access Control (MAC) protocol of the IEEE 80. standard is Distributed Coordination Function (DCF) [], which provide no support of Quality of Service (QoS). However, due to a growth of multi-media applications, such as video streaming and voice, importance of supporting QoS is rapidly increasing. For supporting QoS, IEEE 80.e Enhanced Distributed Channel Access (EDCA) is extended from IEEE 80. DCF, which has been standardized in IEEE 80.e []. The EDCA node has four access categories (ACs), which contend channel access independently. It is possible to realize the channel-access-priority differentiations according to ACs by setting the proper EDCA parameters which are CW min, CW max, and arbitration inter frame space number (AIFS N). It is important to obtain analytical expressions of throughput, transmission probability, collision probability, and transmission delay for wireless networks. The analytical expressions provide network performance predictions with very short time and low computation cost compared with network simulators. In addition, it is easy to comprehend the relationships between protocol parameters and network performance when the analytical expressions can be obtained. Therefore, throughput analyses have been carried out for Wireless Local Area Networks (WLANs) with DCF [3]-[5], and EDCA [6]-[0] and for multi-hop networks with DCF []-[3]. There are, however, no theoretical analyses for wireless multi-hop networks with EDCA. Actually, QoS support for wireless multi-hop networks is more difficult and complicated than that for WLANs. Therefore, it is necessary and valuable to establish theoretical analysis procedure for wireless multi-hop networks with EDCA, which provides intuit comprehensions of the network dynamics and design strategies of QoS-aware protocol for multi-hop networks. This paper presents first-step analytical expressions of non-saturated and saturated throughput for wireless multi-hop string-topology networks. Internal collisions in each node, concurrent-transmission collisions among nodes, differences of CW min, and CW max among ACs, and AIFS-differentiation effects are considered and expressed in this analysis. The obtained analytical expressions are verified from comparisons with simulation results. II. Related work A. IEEE 80.e Enhanced Distributed Channel Access (EDCA) IEEE 80.e EDCA is a MAC protocol supporting QoS, which is not considered in IEEE 80. DCF. The node with EDCA has four ACs, which are voice, video, best effort, and background. Each AC of nodes virtually tries to access the channel based on Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA). Figure shows the EDCA diagram with two-class priorities. In Fig., AC is higher priority than AC and AIFS duration of AC k is expressed as d AIFS k. The AIFS duration of AC k is determined by d AIFS k = d S IFS + AIFS N k σ, () where d S IFS is the duration of SIFS, AIFS N k is the AIFS-slot number of AC k, and σ is a system slot time. Table I gives the EDCA parameters standardized in IEEE 80.e []. In Table I, CW min and CW max are the initial and maximum contention window (CW) values, respectively. In IEEE 80.e, voice and video streaming are categorized into high priority ACs, which are expressed as AC[VO] and AC[VI], respectively. Therefore, CW min, CW max and AIFSN of AC[VO] and AC[VI] are smaller than those of other ACs. By applying the EDCA parameters, the frame-transmission-priority differentiation according to ACs can be achieved. In the EDCA, AC k senses a channel state for d AIFS k from a instant when the AC has a transmission frame. After sensing the channel state for d AIFS k, the AC k further senses the channel state during the backoff timer () countdown. The initial value of of AC k in Node i is determined from the range of 0 and CW i,k, where CW i,k is CW of AC k in Node i. At the instant of (a) in Fig., AC in Node can transmit a frame because its is zero. The countdown of Node is stopped at the instant of (a) in Fig. because Node senses channel busy. When the channel becomes idle again, the AC in Node and restart the countdown after waiting for the d AIFS at the instant of (b) in Fig.. There are two types of frame collisions in EDCA. One is
2 Node AC AC daifs d AIFS countdown Carrier sensing Carrier sensing d SIFS Collision d AIFS daifs Select in [0, CW - ] countdown Internal Collision Frame SIFS ACK Time Node AC AC daifs daifs countdown dframe Frame SIFS dack ACK daifs Collision daifs daifs countdown Time Select in [0, CW - ] Select in [0, CW - ] state No Zone No No Zone Channel busy Zone Channel busy Zone Zone Channel busy L[slot] system slot time (a) (b) (c) (d) (e) (f) Fig.. IEEE 80.e EDCA diagram with two-class priorites the frame collisions with other node frames. A frame from AC in Node collides with a frame from AC in Node as shown in the instant of (c) in Fig.. The other is the internal (virtual) collision, which occurs among ACs in the same node. The internal collision occurs when s of multiple ACs in the same node become zero simultaneously as shown in the instant of (f) in Fig.. In Fig., the AC- frame, which is in higher priority, can be transmitted from Node. Many transmission opportunities are obtained in AC compared with AC because d AIFS is smaller than d AIFS. During d AIFS, only AC can transmit a frame. In this paper, the interval when only AC can transmit a frame is expressed as Zone, which is expressed as interval between (d) and (e) in Fig. The slot number of Zone is expressed as L = AIFS N AIFS N. Obviously, internal collisions never occur in Zone. On the other hands, there is possibility that two types of collision occurs after Zone, as shown in Fig. of interval between (e), (f). We call this interval as Zone. Generally, Zones and are also said contention zones [7]-[8], [0]. If a frame transmitted by a certain AC is collided, the AC doubles the CW and resets the. CW value of AC k in Node i is determined by CW i,k ( j) = j (CW mink + ) 0 < j m k, m k (CW mink + ) = CW maxk m k < j R k, where j is the retry transmission number, R k is retry limit, CW maxk + and m k = log CW mink +. When a node can receive a frame, the node returns an ACK frame to the transmitter. The frame transmission is in success when the transmitter receives the ACK frame. B. Analytical Expression Derivations There are many throughput analyses for IEEE 80. DCF [3]-[5]. Bianchi presented the Markov-chain model DCF for WLANs in the saturated condition [3]. A simple transmission-probability expression compared with the Bianchi model was presented in [4]. In the next step, the analyses for non-saturated condition were carried out by combining () the queuing theory and the saturated-condition analysis techniques. Namely, the non-saturated transmission probability can be obtained from saturated transmission probability and non-empty-buffer probability, which is derived from the queuing theory [5]. Additionally, throughput analyses for WLAN with IEEE 80.e EDCA were also carried out [6]-[0]. In [6], Markov-chain model for the countdown with the EDCA was proposed. This model considers the differences of CW min and CW max among ACs. The contention zones were, however, not considered in [6]. In [7] and [8], the strategy for expressing the contention-zone effects was introduced. When all nodes are in the same carrier sensing range, the nodes start the countdown simultaneously. Namely, it can be stated that the collision probability depends on the contention zones. The effects of contention zones can be expressed by considering the collision probabilities of each AC. In [9]-[0], the non-saturated throughput analysis for WLAN with EDCA was carried out, which also applied the queuing theory to the saturated-condition analyses. Recently, throughput analyses for multi-hop networks with DCF were carried out. Throughput analyses in [] and [] were based on the assumption of saturated environment and hidden node existence. Non-saturated throughput analysis in multi-hop networks with DCF appeared with no hidden-node condition [3]. As described above, there are many analytical expressions of throughput for multi-hop networks with different environments. There is, however, no throughput analysis for multi-hop networks with EDCA until now. Due to growth of multi-media applications, it becomes important to support MAC-level QoS control in multi-hop networks. Supporting QoS in multi-hop networks is more difficult and complicated than that in WLANs. The analytical expressions of throughput for multi-hop networks with the EDCA are helpful in comprehensions of the network performance and valuable for the QoS-aware MAC protocol.
3 TABLE I. IEEE 80.e parameters setting AC CWmin CWmax AIFSN BK BE VI 7 5 VO N- N -q 0 q -q Zone Zone -q q q q L- L q Fig.. Network topology used for analysis and simulation -q III. Analytical model The purpose of the analysis in this paper is to obtain end-to-end throughput for each AC in wireless multi-hop networks with IEEE 80.e EDCA as a function of offered load. Figure shows N-hop string topology with one-way flow, which is considered in this paper. In Fig., frames generated at source node 0 are forwarded to the destination node N through the relay nodes. The analysis in this paper based on the following assumptions.. A node can sense frame transmissions of all the other nodes and there is no hidden node for all the nodes. Therefore, only concurrent-frame-transmission collisions occur among nodes. This type of collision occurs in case that two and more nodes start frame transmissions simultaneously.. The channel condition is ideal. Therefore, transmission failures occur due to only the collisions. 3. Each node has two ACs as shown in Fig.. AC has higher priority than AC. The frame size of AC is the same as that of AC. 4. The value of TXOPlimit is zero. 5. ACs in all nodes have a individual and infinite buffer. 6. Only the source node generates a frame. The frames of AC k in the source node is generated according to offered load of AC k, which is expressed as o f f eredload k. The following analysis considers the differences of AIFS N, CW min and, CW max according to ACs, internal collisions due to the EDCA mechanism, and concurrent-transmission collisions among nodes. A. Transmission and collision probabilities The transmission probability for AC k in Node i is expressed as τ i,k = τ i,k p i,k, (3) where τ i,k is the transmission probability of AC k in Node i under the condition that the AC has frames and p i,k is the non-empty buffer probability. Now γ i,k expresses collision probability of frames transmitted from AC k in Node i. By using γ i,k, the transmission probability under the condition that Fig. 3. Markov chain of the system elapsed time (unit: slot) AC k in Node i has frames is expressed as [0] τ i,k = + γ i,k + γ i,k + + γr k i,k b a,0 + b k, γ i,k + b k, γ i,k + + b k,k k γ R k i,k, (4) where b k, j = CW i,k( j)+. Applying the result in [8], γ i,k is given by γ i, = π γ i,, + π γ i,, N = π ( τ j, ) j=0, j i N + π ( τ j, )( τ j, ), (5) j=0, j i N γ i, = ( τ j, ) j=0 N j=0, j i ( τ j, ), (6) where π, and π are the state existing probabilities of Zone and, respectively. Additionally, γ i,,l is the collision probability of Zone l for AC in Node i. Figure 3 shows the Markov-chain model for the elapsed time since d AIFS is ended. From Fig. 3, the state existing probabilities of Zone and are obtained as π = π = + q + q + + ql + q + q + + ql + ql q L q, (7), (8) ( q )( + q + q + + ql + ql q ) where q l is the probability that the channel is idle in Zone l, which are equal to the probability that all nodes transmit no frame, namely, q = q = N ( τ i, ), (9) N ( τ i, )( τ i, ). (0) B. Non-empty buffer probability and frame arrival rate In this paper, the queuing theory is used for obtaining the non-empty buffer probability in each AC, which follows the
4 analysis strategy in [5]. From Assumption 5, each AC can be expressed by using the G/G/ queue model. From the queuing theory and frame arrival rate in [5], the non-empty buffer probability in (3) is given by p i,k = min(, λ i,k y i,k ), () where λ i,k is frame arrival rate of AC k in Node i, y i,k is average MAC service time of AC k in Node i, and the min function prevents p i,k from exceeding. Under the condition that p i,k is lower than, AC k in Node i is in non-saturated state. Conversely, under the condition that p i,k =, AC k in Node i is in saturated state. By using (), it is possible to express both the non-saturated and saturated states. In most throughput analyses for WLANs, it is assumed that all nodes can generate frames by themselves. From Assumption 6, however, relay nodes can have frames only by receiving frames from the previous node. Therefore, the frame arrival rate of a relay node is the same as the throughput of the previous node. From the above discussions, the frame arrival rate is expressed as o f f eredload k, i = 0, λ i,k = s F i,k F, i [, N ], () where s i,k is throughput for AC k in Node i, and F is the payload size. C. Average MAC service time The MAC service time can be defined as the time interval between the instant when a frame reaches the head of queue and that when the ACK frame for the frame transmission is received successfully. The average MAC service time for AC k in Node i is y i,k = X i,k ω k, (3) where X i,k is the average -countdown slot number of AC k in Node i for one-frame-transmission success and ω k is the average time for one slot time of AC k, which includes not only system slot time but carrier sensing one. From (4), we have X i,k = b k,0 + b k, γ i,k + b k, γ i,k + + b k,r k γ R k i,k. (4) The carrier sensing time in Zone is different from that in Zone because of the difference of the channel access opportunities between Zone and Zone. Therefore, the one slot time in Zone and should be considered separately. The decreases when the channel is in the idle state and is kept during other s transmissions. Therefore, we have ω = π ω, + π ω, = π (σq + ε ( q )) + π (σq + ε ( q )), (5) ω = (σq + ε ( q )), (6) where ω,l is the average one-slot time of AC in Zone l, and ε k is the freezing interval for each AC k. The freezing interval is the duration from the instant when the countdown is stopped for the carrier sensing to that when the countdown restarts after AIFS duration. Concretely, ε and ε are ε = d FRAME + d S IFS + d ACK + d AIFS σ, (7) ε = d FRAME + d S IFS + d ACK + d AIFS σ + δ, (8) where d FRAME is frame-transmission duration, d ACK is ACK-transmission duration, and δ is average freezing duration added by the transmission in d AIFS. Note that the freezing interval depends on the ACs because of the difference of AIFSN according to ACs. The freezing duration δ in (8) is the average total duration of AC- transmissions in Zone until d AIFS is ended once. Therefore, we have δ = L j= N ( τ i, )) j ( ( τ i, ))d j N ( L j= N (, (9) N ( τ i, )) j ( ( τ i, )) where d j = d AIFS σ + ( j )σ + d FRAME + d S IFS + d ACK. D. Throughput expressions The throughput for AC k in Node i is expressed as s i,k = = E[Payload information in a slot time] E[Length of a slot time] α i,k F, (0) ω k where α i,k is the frame-transmission-success probability, which is the same as the probability that AC k in Node i transmits a frame and the frame transmission is in success. From (7)-(0), we have α i, = τ i, ( π q τ i, + π q ), () ( τ i, )( τ i, ) α i, = τ i, q τ i,. () Obviously, the end-to-end throughput of AC k is the throughput of AC k in Node N, namely, S k = s N,k. (3) From (3), (5), and (6), 4N algebraic equations are obtained as functions of 4N+ unknown variations: τ 0,,, τ N,, τ 0,,, τ N,, γ 0,,, γ N,, γ 0,,, γ N,, o f f eredload, o f f eredload R 4N+. Therefore, when offered loads for each category are given, the other unknown values can be obtained by solving the algebraic equations and the end-to-end throughput of multi-hop network with EDCA can be obtained. IV. Simulation verification For verifying the analytical expressions, ns- simulations are carried out. The network topology for the simulations is the same as that in Fig.. Table II gives the system parameters used in analytical derivations and simulations. The EDCA parameters for ACs and follows the those for AC[VO] and AC[BE], respectively, which are given in Table I. In ns- simulations, the transmission frames are generated randomly in only Node 0, and are forwarded to node N by using static-route
5 End to end throughput of AC-k [Mbps] TABLE II. System parameters Packer payload(data) 04 bytes MAC header 8 bytes PHY header 4 bytes ACK size 0 bytes Data rate 8 Mbps ACK bit rate Mbps Transmission range 60 m Carrier sensing range 5 m Distance of each node 5 m SIFS time 6 µsec σ (slot time) 9 µsec R k (Retry limit) 7 Simulation for AC Simulation for AC Analysis for AC Analysis for AC (b) (a) Offered load per AC [Mbps] Maximum End-to-End Throughput [Mbps] Fig Analysis forac Analysis for AC Simulation for AC Simulation for AC Number of hops Maximum end-to-end throughputs of ACs as the number of hops each AC in each Node. The obtained analytical expressions are verified from comparison with simulations results. Acknowledgment This research was partially supported by Scholarship Foundation and Grant-in-Aid for scientific research (No and No ) of JSPS, Japan. References Fig. 4. End-to-end throughputs of three-hop network for ACs as a function of offered load settings. Additionally, the frame generation probability of AC is the same as that of AC. Figure 4 shows the end-to-end throughputs of three-hop network for both ACs as a function of each offered load. For (a) and (b) in Fig. 4, the end-to-end throughputs of AC and AC are saturated because the AC and AC in the source node are in saturated state. However, the ACs of relay nodes are never in saturated state. Namely, the end-to-end throughputs of ACs depend on the state of ACs of source node in topology of Fig.. Figure 5 shows the maximum end-to-end throughputs of N-hop network for both ACs as a function of hop numbers. It is seen from Fig. 4 and Fig. 5 that the analytical predictions agree with the simulation results well, which show the validity of the analytical expressions in this paper. V. Conclusion This paper has presented first-step analytical expressions for non-saturated and saturated throughput for multi-hop string topology networks with EDCA. In this analysis, the obtained expressions offered transmission and collision probabilities for [] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Nov. 997, P80. [] IEEE Std 80.e specific requirements Part : Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 8:Medium Access Control (MAC) Quality of Service Enhancements, 005. [3] G. Bianchi, Performance analysis of the IEEE 80. distributed coodination function IEEE J. Sel Commun., vol. 8, no. 3, pp , Mar [4] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, New insights from a fixed point analysis of single cell IEEE 80. Wireless LANs, IEEE/ACM Trans. Netw., vol. 5, no. 3, Jun [5] Q. Zhao, D. H. K. Tsang, and T. Sakurai, A Simple and Approximate Model for Nonsaturated IEEE 80. DCF, IEEE Transactions on Mobile Computing, vol. 8, no., pp , 009. [6] Y. Xiao, Performance Analysis for Priority Schemes for IEEE 80. and IEEE 80.e Wireless LANs, IEEE Trans. Wireless Comm., vol. 4, no. 4, pp , 005. [7] J. W. Robinson and T. S. Randhawa, Saturation throughput analysis of IEEE 80.e enhanced distributed coordination function, IEEE J. Sel. Areas Commun., vol., no. 5, pp , Jun [8] V. Ramaiyan, A. Kumar, and E. Altman, Fixed point analysis of single cell IEEE 80.e WLANs: Uniqueness, multistability and throughput differentiation, in Proc. ACM SIGMETRICS 005, Banff, Alberta, Canada, Jun. 005, pp [9] P.E. Engelstad and O.N. Osterbo, Non-Saturation and Saturation Analysis of IEEE 80.e EDCA with Starvation Prediction, Proc. Eighth ACM Int l Symp. Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 05), pp. 4-33, 005.
6 [0] Q.Zhao, D. H. Tsang, and T. Sakurai, A Simple Nonsaturated IEEE 80.e EDCA model, Proc. of Int. Symp. on Performance Evaluation of Computer Systems and Telecommunication Systems, SPECTS 0. [] Y. Gao, D. Chui, and J. C. S. Lui, Determining the end-to-end throughput capacity in multi-hop networks: methodology applications, Proc. The SIGMETRICS/Performance 006, pp , June [] M. Inaba, Y. Tsuchiya, H. Sekiya, S. Sakata, and K. Yagyu, Analysis and experiments of maximum throughput in wireless multi-hop networks for VoIP application, IEICE Trans. on Communications, vol.e9-b, no., pp , Nov [3] Y. D. Barowski, S. Biaz, P. Agrawal, Towards the Performance Analysis of IEEE 80. in Multi-hop Ad-Hoc Networks, in: IEEE Wireless Communications and Networking Conference, vol., March, 005, pp
Performance Analysis of Transmissions Opportunity Limit in e WLANs
Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationOn Improving Voice Capacity in Infrastructure Networks
On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in
More informationPerformance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationIEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract
More informationPerformance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability
Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering,
More informationSPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks
SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationAnalysis of DCF with Heterogeneous Non-Saturated Nodes
Analysis of 80.11 DCF with Heterogeneous Non-Saturated Nodes Hamed M. K. Alazemi Dept. of Computer Engineering Kuwait University Kuwait hamed@eng.kuniv.kw A. Margolis, J. Choi, R. Viayakumar, S. Roy Dept.
More informationResearch Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs
Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and
More informationMaximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs
Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington
More informationPerformance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes
Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationCross-layer Design of MIMO-enabled WLANs with Network Utility Maximization
1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationMIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna
More informationEffect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm
Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,
More informationGenerating Function Analysis of Wireless Networks and ARQ Systems
Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical
More informationEnd-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference
End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationMedium Access Cooperations for Improving VoIP Capacity over Hybrid / Cognitive Radio Networks
Medium Access Cooperations for Improving VoIP Capacity over Hybrid 802.16/802.11 Cognitive Radio Networks Deyun Gao 1, Jianfei Cai 2 and Chuan Heng Foh 2 1 School of Electronics and Information Engineering,
More informationTHE use of wireless networks in everyday computing has
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 191 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, and J. Morris
More informationAnalysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks
Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013
More informationA new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks
A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,
More informationAnalysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network
PIERS ONLINE, VOL. 5, NO. 2, 2009 171 Analysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network Chuzo Ninagawa 1 and Yasumitsu Miyazaki 2 1 Mitsubishi Heavy Industries,
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationAdaptation of MAC Layer for QoS in WSN
Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types
More informationMESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS
MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationNovel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor
2615 PAPER Special Section on Wide Band Systems Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor Wataru HORIE a) and Yukitoshi SANADA b), Members SUMMARY In this paper, a novel
More informationPower-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks
Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex
More informationMedium access control and network planning in wireless networks
Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2010 Medium access control and network planning in wireless networks Zakhia Abichar Iowa State University Follow
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationOn Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes
On Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes Mohammed Hirzallah 1, Yong Xiao 1, and Marwan Krunz 1,2 1 Department of Electrical and Computer Engineering, University
More informationSaturation throughput analysis of error-prone wireless networks
Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,
More informationMAC Performance Modeling of IEEE based WBANs over Rician-faded channels
MAC Performance Modeling of IEEE 802.15.6 -based WBANs over Rician-faded channels Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson
More informationPerformance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation
2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationThe de facto standard for wireless Internet. Interference Estimation in IEEE Networks
Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationWi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering
Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This
More informationSynchronization and Beaconing in IEEE s Mesh Networks
Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute
More informationA Control Theoretic Approach for Throughput Optimization in IEEE e EDCA WLANs
DOI 10.1007/s11036-008-011-x A Control Theoretic Approach for Throughput Optimization in IEEE 80.11e EDCA WLANs Paul Patras Albert Banchs Pablo Serrano Springer Science + Business Media, LLC 008 Abstract
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationQoS-based Dynamic Channel Allocation for GSM/GPRS Networks
QoS-based Dynamic Channel Allocation for GSM/GPRS Networks Jun Zheng 1 and Emma Regentova 1 Department of Computer Science, Queens College - The City University of New York, USA zheng@cs.qc.edu Deaprtment
More informationarxiv: v1 [cs.it] 21 Feb 2015
1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationMAC design for WiFi infrastructure networks: a game-theoretic approach
MAC design for WiFi infrastructure networks: a game-theoretic approach Ilenia Tinnirello, Laura Giarré and Giovanni Neglia arxiv:8.4463v [cs.gt] 6 Aug Abstract In WiFi networks, mobile nodes compete for
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationOutline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationOn the Coexistence of Overlapping BSSs in WLANs
On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.
More informationA MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks
A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University
More informationCognitive Radio Spectrum Access with Prioritized Secondary Users
Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access
More informationON CROSS-LAYER ADAPTIVE IEEE E EDCA MAC DESIGN FOR OPTIMIZED H.264 VIDEO DELIVERY OVER WIRELESS MESH NETWORKS
ON CROSS-LAYER ADAPTIVE IEEE 82.11E EDCA MAC DESIGN FOR OPTIMIZED H.264 VIDEO DELIVERY OVER WIRELESS MESH NETWORKS Byung Joon Oh 1, Chang Wen Chen 2, Ivica Kostanic 3, Seung Ho Shin 4 and Ki Young Lee
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationIEEE 802 Layers. The IEEE 802 family and its relation to the OSI model
WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationPerformance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs
Wireless Networks 9, 495 507, 003 003 Kluwer Academic Publishers. Manufactured in The Netherlands. Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs V. VITSAS Department
More informationAn Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks
1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,
More informationChannel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks
Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing
More informationAchieving Temporal Fairness in Multi-Rate WLANs with Capture Effect
Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson
More information[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES Mr. Jogendra Raghuwanshi*, Mr. Girish
More informationDynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009
Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy
More informationDelay Performance Modeling and Analysis in Clustered Cognitive Radio Networks
Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon
More informationOn the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network
On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network Abstract With the rapid increase in the number of wireless enabled devices, contention for wireless
More informationDecentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework
Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University
More informationAnalysis of cognitive radio networks with imperfect sensing
Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo
More informationInter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules
Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules TOHZAKA Yuji SAKAMOTO Takafumi DOI Yusuke Accompanying the expansion of the Internet of Things (IoT), interconnections
More informationCognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels
Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133
More informationGeoMAC: Geo-backoff based Co-operative MAC for V2V networks.
GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th
More informationCarrier Sensing based Multiple Access Protocols for Cognitive Radio Networks
Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationDesign of Node Locations for Indoor Wireless Mesh Network
276 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.9, NO.2 August 2011 Design of Node Locations for Indoor Wireless Mesh Network Sukunya Sauram 1, Peerapong Uthansakul 2, and
More informationAnalysis of CSAT performance in Wi-Fi and LTE-U Coexistence
Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationWIRELESS body area networks (WBANs) consist of a
IEEE SYSTEMS JOURNAL 1 Improving Reliability of Emergency Data Frame Transmission in IEEE 80.15.6 Wireless Body Area Networks Kayiparambil S. Deepak and Anchare V. Babu Abstract Wireless body area networks
More informationMAC design for WiFi infrastructure networks: a game-theoretic approach
MAC design for WiFi infrastructure networks: a game-theoretic approach Ilenia Tinnirello, Laura Giarré and Giovanni Neglia Abstract In WiFi networks, mobile nodes compete for accessing a shared channel
More informationLocation Enhancement to IEEE DCF
Location Enhancement to IEEE 82.11 DCF Tamer Nadeem, Lusheng Ji, Ashok Agrawala, Jonathan Agre Department of Computer Science University of Maryland, College Park, MD 2742 {nadeem, agrawala}@cs.umd.edu
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationDelay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence
Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence Sihua Shao and Abdallah Khreishah Abstract The coexistence of omnidirectional
More informationODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks
ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks Xenofon Fafoutis DTU Informatics Technical University of Denmark xefa@imm.dtu.dk Nicola Dragoni DTU Informatics Technical
More informationWIRELESS communications have shifted from bit rates
IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas
More informationAn Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks
An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU
More informationAnalysis of Bottleneck Delay and Throughput in Wireless Mesh Networks
Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,
More informationAnalytical Modeling of Ad Hoc Networks that Utilize Space-Time Coding
Analytical Modeling of Ad Hoc Networks that Utilize Space-Time Coding Marcelo M. Carvalho Computer Engineering Department University of California Santa Cruz Santa Cruz, CA 9564 USA carvalho@soe.ucsc.edu
More informationTHE Wireless LAN (WLAN) technology is nowadays
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 8, AUGUST 010 1057 Providing Service Guarantees in 80.11e EDCA WLANs with Legacy Stations Albert Banchs, Member, IEEE, Pablo Serrano, Member, IEEE, and
More informationEnhancement of Wide Bandwidth Operation in IEEE ac Networks
Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationIMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
More informationMaximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users
Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Ahmed El Shafie and Tamer Khattab Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt. Electrical
More informationChutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.
Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS
More information