Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Size: px
Start display at page:

Download "Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks"

Transcription

1 Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University, Chiba, Japan Abstract This paper presents first-step analytical expressions of non-saturated and saturated throughput for IEEE 80.e Enhanced Distributed Channel Access (EDCA) multi-hop string-topology networks. Internal collisions in each node, concurrent transmission collisions among nodes, differences of CW min and CW max among access categories (ACs), and effects of contention zone are considered. By comparisons with simulation results, the validities of analytical expressions are confirmed. Keywords IEEE 80.e multi-hop networks, throughput analysis, non-saturated throughput, saturated throughput, internal collision, contention zone. I. Introduction The IEEE 80. has become ubiquitous and gains widespread popularity for wireless multi-hop networks. The basic Medium Access Control (MAC) protocol of the IEEE 80. standard is Distributed Coordination Function (DCF) [], which provide no support of Quality of Service (QoS). However, due to a growth of multi-media applications, such as video streaming and voice, importance of supporting QoS is rapidly increasing. For supporting QoS, IEEE 80.e Enhanced Distributed Channel Access (EDCA) is extended from IEEE 80. DCF, which has been standardized in IEEE 80.e []. The EDCA node has four access categories (ACs), which contend channel access independently. It is possible to realize the channel-access-priority differentiations according to ACs by setting the proper EDCA parameters which are CW min, CW max, and arbitration inter frame space number (AIFS N). It is important to obtain analytical expressions of throughput, transmission probability, collision probability, and transmission delay for wireless networks. The analytical expressions provide network performance predictions with very short time and low computation cost compared with network simulators. In addition, it is easy to comprehend the relationships between protocol parameters and network performance when the analytical expressions can be obtained. Therefore, throughput analyses have been carried out for Wireless Local Area Networks (WLANs) with DCF [3]-[5], and EDCA [6]-[0] and for multi-hop networks with DCF []-[3]. There are, however, no theoretical analyses for wireless multi-hop networks with EDCA. Actually, QoS support for wireless multi-hop networks is more difficult and complicated than that for WLANs. Therefore, it is necessary and valuable to establish theoretical analysis procedure for wireless multi-hop networks with EDCA, which provides intuit comprehensions of the network dynamics and design strategies of QoS-aware protocol for multi-hop networks. This paper presents first-step analytical expressions of non-saturated and saturated throughput for wireless multi-hop string-topology networks. Internal collisions in each node, concurrent-transmission collisions among nodes, differences of CW min, and CW max among ACs, and AIFS-differentiation effects are considered and expressed in this analysis. The obtained analytical expressions are verified from comparisons with simulation results. II. Related work A. IEEE 80.e Enhanced Distributed Channel Access (EDCA) IEEE 80.e EDCA is a MAC protocol supporting QoS, which is not considered in IEEE 80. DCF. The node with EDCA has four ACs, which are voice, video, best effort, and background. Each AC of nodes virtually tries to access the channel based on Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA). Figure shows the EDCA diagram with two-class priorities. In Fig., AC is higher priority than AC and AIFS duration of AC k is expressed as d AIFS k. The AIFS duration of AC k is determined by d AIFS k = d S IFS + AIFS N k σ, () where d S IFS is the duration of SIFS, AIFS N k is the AIFS-slot number of AC k, and σ is a system slot time. Table I gives the EDCA parameters standardized in IEEE 80.e []. In Table I, CW min and CW max are the initial and maximum contention window (CW) values, respectively. In IEEE 80.e, voice and video streaming are categorized into high priority ACs, which are expressed as AC[VO] and AC[VI], respectively. Therefore, CW min, CW max and AIFSN of AC[VO] and AC[VI] are smaller than those of other ACs. By applying the EDCA parameters, the frame-transmission-priority differentiation according to ACs can be achieved. In the EDCA, AC k senses a channel state for d AIFS k from a instant when the AC has a transmission frame. After sensing the channel state for d AIFS k, the AC k further senses the channel state during the backoff timer () countdown. The initial value of of AC k in Node i is determined from the range of 0 and CW i,k, where CW i,k is CW of AC k in Node i. At the instant of (a) in Fig., AC in Node can transmit a frame because its is zero. The countdown of Node is stopped at the instant of (a) in Fig. because Node senses channel busy. When the channel becomes idle again, the AC in Node and restart the countdown after waiting for the d AIFS at the instant of (b) in Fig.. There are two types of frame collisions in EDCA. One is

2 Node AC AC daifs d AIFS countdown Carrier sensing Carrier sensing d SIFS Collision d AIFS daifs Select in [0, CW - ] countdown Internal Collision Frame SIFS ACK Time Node AC AC daifs daifs countdown dframe Frame SIFS dack ACK daifs Collision daifs daifs countdown Time Select in [0, CW - ] Select in [0, CW - ] state No Zone No No Zone Channel busy Zone Channel busy Zone Zone Channel busy L[slot] system slot time (a) (b) (c) (d) (e) (f) Fig.. IEEE 80.e EDCA diagram with two-class priorites the frame collisions with other node frames. A frame from AC in Node collides with a frame from AC in Node as shown in the instant of (c) in Fig.. The other is the internal (virtual) collision, which occurs among ACs in the same node. The internal collision occurs when s of multiple ACs in the same node become zero simultaneously as shown in the instant of (f) in Fig.. In Fig., the AC- frame, which is in higher priority, can be transmitted from Node. Many transmission opportunities are obtained in AC compared with AC because d AIFS is smaller than d AIFS. During d AIFS, only AC can transmit a frame. In this paper, the interval when only AC can transmit a frame is expressed as Zone, which is expressed as interval between (d) and (e) in Fig. The slot number of Zone is expressed as L = AIFS N AIFS N. Obviously, internal collisions never occur in Zone. On the other hands, there is possibility that two types of collision occurs after Zone, as shown in Fig. of interval between (e), (f). We call this interval as Zone. Generally, Zones and are also said contention zones [7]-[8], [0]. If a frame transmitted by a certain AC is collided, the AC doubles the CW and resets the. CW value of AC k in Node i is determined by CW i,k ( j) = j (CW mink + ) 0 < j m k, m k (CW mink + ) = CW maxk m k < j R k, where j is the retry transmission number, R k is retry limit, CW maxk + and m k = log CW mink +. When a node can receive a frame, the node returns an ACK frame to the transmitter. The frame transmission is in success when the transmitter receives the ACK frame. B. Analytical Expression Derivations There are many throughput analyses for IEEE 80. DCF [3]-[5]. Bianchi presented the Markov-chain model DCF for WLANs in the saturated condition [3]. A simple transmission-probability expression compared with the Bianchi model was presented in [4]. In the next step, the analyses for non-saturated condition were carried out by combining () the queuing theory and the saturated-condition analysis techniques. Namely, the non-saturated transmission probability can be obtained from saturated transmission probability and non-empty-buffer probability, which is derived from the queuing theory [5]. Additionally, throughput analyses for WLAN with IEEE 80.e EDCA were also carried out [6]-[0]. In [6], Markov-chain model for the countdown with the EDCA was proposed. This model considers the differences of CW min and CW max among ACs. The contention zones were, however, not considered in [6]. In [7] and [8], the strategy for expressing the contention-zone effects was introduced. When all nodes are in the same carrier sensing range, the nodes start the countdown simultaneously. Namely, it can be stated that the collision probability depends on the contention zones. The effects of contention zones can be expressed by considering the collision probabilities of each AC. In [9]-[0], the non-saturated throughput analysis for WLAN with EDCA was carried out, which also applied the queuing theory to the saturated-condition analyses. Recently, throughput analyses for multi-hop networks with DCF were carried out. Throughput analyses in [] and [] were based on the assumption of saturated environment and hidden node existence. Non-saturated throughput analysis in multi-hop networks with DCF appeared with no hidden-node condition [3]. As described above, there are many analytical expressions of throughput for multi-hop networks with different environments. There is, however, no throughput analysis for multi-hop networks with EDCA until now. Due to growth of multi-media applications, it becomes important to support MAC-level QoS control in multi-hop networks. Supporting QoS in multi-hop networks is more difficult and complicated than that in WLANs. The analytical expressions of throughput for multi-hop networks with the EDCA are helpful in comprehensions of the network performance and valuable for the QoS-aware MAC protocol.

3 TABLE I. IEEE 80.e parameters setting AC CWmin CWmax AIFSN BK BE VI 7 5 VO N- N -q 0 q -q Zone Zone -q q q q L- L q Fig.. Network topology used for analysis and simulation -q III. Analytical model The purpose of the analysis in this paper is to obtain end-to-end throughput for each AC in wireless multi-hop networks with IEEE 80.e EDCA as a function of offered load. Figure shows N-hop string topology with one-way flow, which is considered in this paper. In Fig., frames generated at source node 0 are forwarded to the destination node N through the relay nodes. The analysis in this paper based on the following assumptions.. A node can sense frame transmissions of all the other nodes and there is no hidden node for all the nodes. Therefore, only concurrent-frame-transmission collisions occur among nodes. This type of collision occurs in case that two and more nodes start frame transmissions simultaneously.. The channel condition is ideal. Therefore, transmission failures occur due to only the collisions. 3. Each node has two ACs as shown in Fig.. AC has higher priority than AC. The frame size of AC is the same as that of AC. 4. The value of TXOPlimit is zero. 5. ACs in all nodes have a individual and infinite buffer. 6. Only the source node generates a frame. The frames of AC k in the source node is generated according to offered load of AC k, which is expressed as o f f eredload k. The following analysis considers the differences of AIFS N, CW min and, CW max according to ACs, internal collisions due to the EDCA mechanism, and concurrent-transmission collisions among nodes. A. Transmission and collision probabilities The transmission probability for AC k in Node i is expressed as τ i,k = τ i,k p i,k, (3) where τ i,k is the transmission probability of AC k in Node i under the condition that the AC has frames and p i,k is the non-empty buffer probability. Now γ i,k expresses collision probability of frames transmitted from AC k in Node i. By using γ i,k, the transmission probability under the condition that Fig. 3. Markov chain of the system elapsed time (unit: slot) AC k in Node i has frames is expressed as [0] τ i,k = + γ i,k + γ i,k + + γr k i,k b a,0 + b k, γ i,k + b k, γ i,k + + b k,k k γ R k i,k, (4) where b k, j = CW i,k( j)+. Applying the result in [8], γ i,k is given by γ i, = π γ i,, + π γ i,, N = π ( τ j, ) j=0, j i N + π ( τ j, )( τ j, ), (5) j=0, j i N γ i, = ( τ j, ) j=0 N j=0, j i ( τ j, ), (6) where π, and π are the state existing probabilities of Zone and, respectively. Additionally, γ i,,l is the collision probability of Zone l for AC in Node i. Figure 3 shows the Markov-chain model for the elapsed time since d AIFS is ended. From Fig. 3, the state existing probabilities of Zone and are obtained as π = π = + q + q + + ql + q + q + + ql + ql q L q, (7), (8) ( q )( + q + q + + ql + ql q ) where q l is the probability that the channel is idle in Zone l, which are equal to the probability that all nodes transmit no frame, namely, q = q = N ( τ i, ), (9) N ( τ i, )( τ i, ). (0) B. Non-empty buffer probability and frame arrival rate In this paper, the queuing theory is used for obtaining the non-empty buffer probability in each AC, which follows the

4 analysis strategy in [5]. From Assumption 5, each AC can be expressed by using the G/G/ queue model. From the queuing theory and frame arrival rate in [5], the non-empty buffer probability in (3) is given by p i,k = min(, λ i,k y i,k ), () where λ i,k is frame arrival rate of AC k in Node i, y i,k is average MAC service time of AC k in Node i, and the min function prevents p i,k from exceeding. Under the condition that p i,k is lower than, AC k in Node i is in non-saturated state. Conversely, under the condition that p i,k =, AC k in Node i is in saturated state. By using (), it is possible to express both the non-saturated and saturated states. In most throughput analyses for WLANs, it is assumed that all nodes can generate frames by themselves. From Assumption 6, however, relay nodes can have frames only by receiving frames from the previous node. Therefore, the frame arrival rate of a relay node is the same as the throughput of the previous node. From the above discussions, the frame arrival rate is expressed as o f f eredload k, i = 0, λ i,k = s F i,k F, i [, N ], () where s i,k is throughput for AC k in Node i, and F is the payload size. C. Average MAC service time The MAC service time can be defined as the time interval between the instant when a frame reaches the head of queue and that when the ACK frame for the frame transmission is received successfully. The average MAC service time for AC k in Node i is y i,k = X i,k ω k, (3) where X i,k is the average -countdown slot number of AC k in Node i for one-frame-transmission success and ω k is the average time for one slot time of AC k, which includes not only system slot time but carrier sensing one. From (4), we have X i,k = b k,0 + b k, γ i,k + b k, γ i,k + + b k,r k γ R k i,k. (4) The carrier sensing time in Zone is different from that in Zone because of the difference of the channel access opportunities between Zone and Zone. Therefore, the one slot time in Zone and should be considered separately. The decreases when the channel is in the idle state and is kept during other s transmissions. Therefore, we have ω = π ω, + π ω, = π (σq + ε ( q )) + π (σq + ε ( q )), (5) ω = (σq + ε ( q )), (6) where ω,l is the average one-slot time of AC in Zone l, and ε k is the freezing interval for each AC k. The freezing interval is the duration from the instant when the countdown is stopped for the carrier sensing to that when the countdown restarts after AIFS duration. Concretely, ε and ε are ε = d FRAME + d S IFS + d ACK + d AIFS σ, (7) ε = d FRAME + d S IFS + d ACK + d AIFS σ + δ, (8) where d FRAME is frame-transmission duration, d ACK is ACK-transmission duration, and δ is average freezing duration added by the transmission in d AIFS. Note that the freezing interval depends on the ACs because of the difference of AIFSN according to ACs. The freezing duration δ in (8) is the average total duration of AC- transmissions in Zone until d AIFS is ended once. Therefore, we have δ = L j= N ( τ i, )) j ( ( τ i, ))d j N ( L j= N (, (9) N ( τ i, )) j ( ( τ i, )) where d j = d AIFS σ + ( j )σ + d FRAME + d S IFS + d ACK. D. Throughput expressions The throughput for AC k in Node i is expressed as s i,k = = E[Payload information in a slot time] E[Length of a slot time] α i,k F, (0) ω k where α i,k is the frame-transmission-success probability, which is the same as the probability that AC k in Node i transmits a frame and the frame transmission is in success. From (7)-(0), we have α i, = τ i, ( π q τ i, + π q ), () ( τ i, )( τ i, ) α i, = τ i, q τ i,. () Obviously, the end-to-end throughput of AC k is the throughput of AC k in Node N, namely, S k = s N,k. (3) From (3), (5), and (6), 4N algebraic equations are obtained as functions of 4N+ unknown variations: τ 0,,, τ N,, τ 0,,, τ N,, γ 0,,, γ N,, γ 0,,, γ N,, o f f eredload, o f f eredload R 4N+. Therefore, when offered loads for each category are given, the other unknown values can be obtained by solving the algebraic equations and the end-to-end throughput of multi-hop network with EDCA can be obtained. IV. Simulation verification For verifying the analytical expressions, ns- simulations are carried out. The network topology for the simulations is the same as that in Fig.. Table II gives the system parameters used in analytical derivations and simulations. The EDCA parameters for ACs and follows the those for AC[VO] and AC[BE], respectively, which are given in Table I. In ns- simulations, the transmission frames are generated randomly in only Node 0, and are forwarded to node N by using static-route

5 End to end throughput of AC-k [Mbps] TABLE II. System parameters Packer payload(data) 04 bytes MAC header 8 bytes PHY header 4 bytes ACK size 0 bytes Data rate 8 Mbps ACK bit rate Mbps Transmission range 60 m Carrier sensing range 5 m Distance of each node 5 m SIFS time 6 µsec σ (slot time) 9 µsec R k (Retry limit) 7 Simulation for AC Simulation for AC Analysis for AC Analysis for AC (b) (a) Offered load per AC [Mbps] Maximum End-to-End Throughput [Mbps] Fig Analysis forac Analysis for AC Simulation for AC Simulation for AC Number of hops Maximum end-to-end throughputs of ACs as the number of hops each AC in each Node. The obtained analytical expressions are verified from comparison with simulations results. Acknowledgment This research was partially supported by Scholarship Foundation and Grant-in-Aid for scientific research (No and No ) of JSPS, Japan. References Fig. 4. End-to-end throughputs of three-hop network for ACs as a function of offered load settings. Additionally, the frame generation probability of AC is the same as that of AC. Figure 4 shows the end-to-end throughputs of three-hop network for both ACs as a function of each offered load. For (a) and (b) in Fig. 4, the end-to-end throughputs of AC and AC are saturated because the AC and AC in the source node are in saturated state. However, the ACs of relay nodes are never in saturated state. Namely, the end-to-end throughputs of ACs depend on the state of ACs of source node in topology of Fig.. Figure 5 shows the maximum end-to-end throughputs of N-hop network for both ACs as a function of hop numbers. It is seen from Fig. 4 and Fig. 5 that the analytical predictions agree with the simulation results well, which show the validity of the analytical expressions in this paper. V. Conclusion This paper has presented first-step analytical expressions for non-saturated and saturated throughput for multi-hop string topology networks with EDCA. In this analysis, the obtained expressions offered transmission and collision probabilities for [] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Nov. 997, P80. [] IEEE Std 80.e specific requirements Part : Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 8:Medium Access Control (MAC) Quality of Service Enhancements, 005. [3] G. Bianchi, Performance analysis of the IEEE 80. distributed coodination function IEEE J. Sel Commun., vol. 8, no. 3, pp , Mar [4] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, New insights from a fixed point analysis of single cell IEEE 80. Wireless LANs, IEEE/ACM Trans. Netw., vol. 5, no. 3, Jun [5] Q. Zhao, D. H. K. Tsang, and T. Sakurai, A Simple and Approximate Model for Nonsaturated IEEE 80. DCF, IEEE Transactions on Mobile Computing, vol. 8, no., pp , 009. [6] Y. Xiao, Performance Analysis for Priority Schemes for IEEE 80. and IEEE 80.e Wireless LANs, IEEE Trans. Wireless Comm., vol. 4, no. 4, pp , 005. [7] J. W. Robinson and T. S. Randhawa, Saturation throughput analysis of IEEE 80.e enhanced distributed coordination function, IEEE J. Sel. Areas Commun., vol., no. 5, pp , Jun [8] V. Ramaiyan, A. Kumar, and E. Altman, Fixed point analysis of single cell IEEE 80.e WLANs: Uniqueness, multistability and throughput differentiation, in Proc. ACM SIGMETRICS 005, Banff, Alberta, Canada, Jun. 005, pp [9] P.E. Engelstad and O.N. Osterbo, Non-Saturation and Saturation Analysis of IEEE 80.e EDCA with Starvation Prediction, Proc. Eighth ACM Int l Symp. Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 05), pp. 4-33, 005.

6 [0] Q.Zhao, D. H. Tsang, and T. Sakurai, A Simple Nonsaturated IEEE 80.e EDCA model, Proc. of Int. Symp. on Performance Evaluation of Computer Systems and Telecommunication Systems, SPECTS 0. [] Y. Gao, D. Chui, and J. C. S. Lui, Determining the end-to-end throughput capacity in multi-hop networks: methodology applications, Proc. The SIGMETRICS/Performance 006, pp , June [] M. Inaba, Y. Tsuchiya, H. Sekiya, S. Sakata, and K. Yagyu, Analysis and experiments of maximum throughput in wireless multi-hop networks for VoIP application, IEICE Trans. on Communications, vol.e9-b, no., pp , Nov [3] Y. D. Barowski, S. Biaz, P. Agrawal, Towards the Performance Analysis of IEEE 80. in Multi-hop Ad-Hoc Networks, in: IEEE Wireless Communications and Networking Conference, vol., March, 005, pp

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

On Improving Voice Capacity in Infrastructure Networks

On Improving Voice Capacity in Infrastructure Networks On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in

More information

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract

More information

Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability

Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering,

More information

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Analysis of DCF with Heterogeneous Non-Saturated Nodes

Analysis of DCF with Heterogeneous Non-Saturated Nodes Analysis of 80.11 DCF with Heterogeneous Non-Saturated Nodes Hamed M. K. Alazemi Dept. of Computer Engineering Kuwait University Kuwait hamed@eng.kuniv.kw A. Margolis, J. Choi, R. Viayakumar, S. Roy Dept.

More information

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization 1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance 1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna

More information

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,

More information

Generating Function Analysis of Wireless Networks and ARQ Systems

Generating Function Analysis of Wireless Networks and ARQ Systems Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Medium Access Cooperations for Improving VoIP Capacity over Hybrid / Cognitive Radio Networks

Medium Access Cooperations for Improving VoIP Capacity over Hybrid / Cognitive Radio Networks Medium Access Cooperations for Improving VoIP Capacity over Hybrid 802.16/802.11 Cognitive Radio Networks Deyun Gao 1, Jianfei Cai 2 and Chuan Heng Foh 2 1 School of Electronics and Information Engineering,

More information

THE use of wireless networks in everyday computing has

THE use of wireless networks in everyday computing has IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 191 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, and J. Morris

More information

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Analysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network

Analysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network PIERS ONLINE, VOL. 5, NO. 2, 2009 171 Analysis of Collided Signal Waveform on the Long Transmission Line of UART-CSMA/CD Control Network Chuzo Ninagawa 1 and Yasumitsu Miyazaki 2 1 Mitsubishi Heavy Industries,

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Adaptation of MAC Layer for QoS in WSN

Adaptation of MAC Layer for QoS in WSN Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types

More information

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor 2615 PAPER Special Section on Wide Band Systems Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor Wataru HORIE a) and Yukitoshi SANADA b), Members SUMMARY In this paper, a novel

More information

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex

More information

Medium access control and network planning in wireless networks

Medium access control and network planning in wireless networks Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2010 Medium access control and network planning in wireless networks Zakhia Abichar Iowa State University Follow

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

On Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes

On Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes On Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes Mohammed Hirzallah 1, Yong Xiao 1, and Marwan Krunz 1,2 1 Department of Electrical and Computer Engineering, University

More information

Saturation throughput analysis of error-prone wireless networks

Saturation throughput analysis of error-prone wireless networks Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,

More information

MAC Performance Modeling of IEEE based WBANs over Rician-faded channels

MAC Performance Modeling of IEEE based WBANs over Rician-faded channels MAC Performance Modeling of IEEE 802.15.6 -based WBANs over Rician-faded channels Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson

More information

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation 2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

Synchronization and Beaconing in IEEE s Mesh Networks

Synchronization and Beaconing in IEEE s Mesh Networks Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute

More information

A Control Theoretic Approach for Throughput Optimization in IEEE e EDCA WLANs

A Control Theoretic Approach for Throughput Optimization in IEEE e EDCA WLANs DOI 10.1007/s11036-008-011-x A Control Theoretic Approach for Throughput Optimization in IEEE 80.11e EDCA WLANs Paul Patras Albert Banchs Pablo Serrano Springer Science + Business Media, LLC 008 Abstract

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

QoS-based Dynamic Channel Allocation for GSM/GPRS Networks

QoS-based Dynamic Channel Allocation for GSM/GPRS Networks QoS-based Dynamic Channel Allocation for GSM/GPRS Networks Jun Zheng 1 and Emma Regentova 1 Department of Computer Science, Queens College - The City University of New York, USA zheng@cs.qc.edu Deaprtment

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

MAC design for WiFi infrastructure networks: a game-theoretic approach

MAC design for WiFi infrastructure networks: a game-theoretic approach MAC design for WiFi infrastructure networks: a game-theoretic approach Ilenia Tinnirello, Laura Giarré and Giovanni Neglia arxiv:8.4463v [cs.gt] 6 Aug Abstract In WiFi networks, mobile nodes compete for

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards. Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks

A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University

More information

Cognitive Radio Spectrum Access with Prioritized Secondary Users

Cognitive Radio Spectrum Access with Prioritized Secondary Users Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access

More information

ON CROSS-LAYER ADAPTIVE IEEE E EDCA MAC DESIGN FOR OPTIMIZED H.264 VIDEO DELIVERY OVER WIRELESS MESH NETWORKS

ON CROSS-LAYER ADAPTIVE IEEE E EDCA MAC DESIGN FOR OPTIMIZED H.264 VIDEO DELIVERY OVER WIRELESS MESH NETWORKS ON CROSS-LAYER ADAPTIVE IEEE 82.11E EDCA MAC DESIGN FOR OPTIMIZED H.264 VIDEO DELIVERY OVER WIRELESS MESH NETWORKS Byung Joon Oh 1, Chang Wen Chen 2, Ivica Kostanic 3, Seung Ho Shin 4 and Ki Young Lee

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs Wireless Networks 9, 495 507, 003 003 Kluwer Academic Publishers. Manufactured in The Netherlands. Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs V. VITSAS Department

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson

More information

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES Mr. Jogendra Raghuwanshi*, Mr. Girish

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network

On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network On the Energy Efficiency of Cognitive Radios - A Simulation Study of the Ad Hoc Wireless LAN Network Abstract With the rapid increase in the number of wireless enabled devices, contention for wireless

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules

Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules Inter-Device Synchronous Control Technology for IoT Systems Using Wireless LAN Modules TOHZAKA Yuji SAKAMOTO Takafumi DOI Yusuke Accompanying the expansion of the Internet of Things (IoT), interconnections

More information

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Design of Node Locations for Indoor Wireless Mesh Network

Design of Node Locations for Indoor Wireless Mesh Network 276 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.9, NO.2 August 2011 Design of Node Locations for Indoor Wireless Mesh Network Sukunya Sauram 1, Peerapong Uthansakul 2, and

More information

Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence

Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

WIRELESS body area networks (WBANs) consist of a

WIRELESS body area networks (WBANs) consist of a IEEE SYSTEMS JOURNAL 1 Improving Reliability of Emergency Data Frame Transmission in IEEE 80.15.6 Wireless Body Area Networks Kayiparambil S. Deepak and Anchare V. Babu Abstract Wireless body area networks

More information

MAC design for WiFi infrastructure networks: a game-theoretic approach

MAC design for WiFi infrastructure networks: a game-theoretic approach MAC design for WiFi infrastructure networks: a game-theoretic approach Ilenia Tinnirello, Laura Giarré and Giovanni Neglia Abstract In WiFi networks, mobile nodes compete for accessing a shared channel

More information

Location Enhancement to IEEE DCF

Location Enhancement to IEEE DCF Location Enhancement to IEEE 82.11 DCF Tamer Nadeem, Lusheng Ji, Ashok Agrawala, Jonathan Agre Department of Computer Science University of Maryland, College Park, MD 2742 {nadeem, agrawala}@cs.umd.edu

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence

Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence Delay Analysis of Unsaturated Heterogeneous Omnidirectional-Directional Small Cell Wireless Networks: The Case of RF-VLC Coexistence Sihua Shao and Abdallah Khreishah Abstract The coexistence of omnidirectional

More information

ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks

ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks Xenofon Fafoutis DTU Informatics Technical University of Denmark xefa@imm.dtu.dk Nicola Dragoni DTU Informatics Technical

More information

WIRELESS communications have shifted from bit rates

WIRELESS communications have shifted from bit rates IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas

More information

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU

More information

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,

More information

Analytical Modeling of Ad Hoc Networks that Utilize Space-Time Coding

Analytical Modeling of Ad Hoc Networks that Utilize Space-Time Coding Analytical Modeling of Ad Hoc Networks that Utilize Space-Time Coding Marcelo M. Carvalho Computer Engineering Department University of California Santa Cruz Santa Cruz, CA 9564 USA carvalho@soe.ucsc.edu

More information

THE Wireless LAN (WLAN) technology is nowadays

THE Wireless LAN (WLAN) technology is nowadays IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 8, AUGUST 010 1057 Providing Service Guarantees in 80.11e EDCA WLANs with Legacy Stations Albert Banchs, Member, IEEE, Pablo Serrano, Member, IEEE, and

More information

Enhancement of Wide Bandwidth Operation in IEEE ac Networks

Enhancement of Wide Bandwidth Operation in IEEE ac Networks Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users Ahmed El Shafie and Tamer Khattab Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt. Electrical

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information